<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Financial Archives - Riskhouse International Limited</title>
	<atom:link href="https://riskhouse.co.ke/category/financial/feed/" rel="self" type="application/rss+xml" />
	<link>https://riskhouse.co.ke/category/financial/</link>
	<description>Forensic Investigation, Risk Management &#38; Compliance Services </description>
	<lastBuildDate>Mon, 08 Dec 2025 08:59:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://riskhouse.co.ke/wp-content/uploads/2022/02/favicon-68x70.png</url>
	<title>Financial Archives - Riskhouse International Limited</title>
	<link>https://riskhouse.co.ke/category/financial/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025: Is your Business Ready for March 2026?</title>
		<link>https://riskhouse.co.ke/the-anti-money-laundering-and-combating-of-terrorism-financing-laws-amendment-act-2025-is-your-business-ready-for-march-2026/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 08:59:04 +0000</pubDate>
				<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8990</guid>

					<description><![CDATA[<p>Starting March 2026, the Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025 will be fully effective. This act applies to many everyday businesses, such as Betting and Mining, Professional services such as accounting, real estate and even the Public Benefit Organizations (PBOs).</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-anti-money-laundering-and-combating-of-terrorism-financing-laws-amendment-act-2025-is-your-business-ready-for-march-2026/">The Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025: Is your Business Ready for March 2026?</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Starting March 2026, the <a>Anti-Money Laundering and Combating of Terrorism Financing Laws </a>(Amendment) Act 2025 will be fully effective. This act applies to many everyday businesses, such as Betting and Mining, Professional services such as accounting, real estate and even the Public Benefit Organizations (PBOs).</p>



<p><strong>Sector Specific Compliance Obligations</strong></p>



<ol class="wp-block-list">
<li><strong>Betting, SACCOs, Retirement Schemes, Mining, Real Estate, Accounting, Legal &amp; Compliance Secretarial Services, key obligations include:</strong></li>



<li>Implement Customer Due Diligence (CDD) and customer identity verification.</li>



<li>Reporting suspicious transaction to the Financial Reporting Centre (FRC).</li>



<li>Proper recording keeping of transactions.</li>



<li>Staff training on AML/CFT risks and developing internal compliance controls.</li>
</ol>



<ul class="wp-block-list">
<li><strong>Public Benefit Organizations (PBOs):</strong></li>
</ul>



<p><em>Regulation, supervision and enforcement of compliance for AML purposes including:</em></p>



<ul class="wp-block-list">
<li>Implementing internal controls to prevent abuse of terrorism financing, including due diligence on donors and beneficiaries, record-keeping, and reporting suspicious activities.</li>



<li>Developing focused, proportionate and risk-based actions to address Terrorism Financing Risks posed by such public benefit organizations.</li>



<li>Periodically conducting an assessment of the terrorism financing risks posed to such public benefit organizations.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Dealers in Precious Metals and Dealers in precious stone, key obligations include:</strong></li>



<li>Registering as an officially reporting entity.</li>



<li>Implementing Customer Due Diligence (CDD) and customer identity verification.</li>



<li>Monitoring high value transactions including when engaging in any cash transaction with a customer equal to or above fifteen thousand US Dollars ($15000).</li>



<li>Avoiding informal trading practices that could raise red flags.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Members of Professional Bodies (ICPAK, ICPSK, Estate Agents Board, LSK), key obligations include:</strong></li>



<li>Integrating AML/CFT practices into daily operations.</li>



<li>Complying with professional body supervision requirements.</li>



<li>Preventing misuse of professional services for illicit activities.</li>
</ul>



<p><strong>If your business falls in any of the above, you need to ask:</strong></p>



<ol class="wp-block-list">
<li>Have you assessed the money-laundering and terrorism-financing risks covering you customer base, services &amp; products, geographic exposure, and transaction types and limits?</li>



<li>Are your identification, verification and screening procedures including beneficial ownership up to date? (<em>including Enhanced Due Diligence (EDD</em>))</li>



<li>Are your records properly maintained (transactions, client identities) and internal reviews for the required period?</li>



<li>Do you have documented AML/CFT policies, periodic training, framework, internal audits and a designated compliance officer?</li>



<li>Do you have procedures in place to flag and report suspicious transactions to the Financial Reporting Centre (FRC) or other competent authority?</li>



<li>Do you provide training to your staff and enforce internal controls (segregation of duties, approval thresholds, monitoring)?</li>



<li>Is senior management aware and accountable? Are there oversight procedures including sanctions, non-compliance, and escalation processes?</li>



<li>Are you prepared for regulatory inspection, peer review or audits of your compliance framework?</li>
</ol>



<p>Even businesses with internal compliance teams or Artificial Intelligence (AI) compliance systems often discover gaps only during regulator inspections, the right independent review from a consultant will not only save your business from financial and reputational risks but boost regulatory confidence.</p>



<p><strong>In addition, the Act outlines heavy fines and imprisonment as part of penalties for Non-Compliance:</strong></p>



<p><em>General Provisions (All Sectors and Reporting Institutions):</em></p>



<ul class="wp-block-list">
<li><strong>Financial fines:</strong></li>



<li>Of between Kes. 5M to Kes. 20M for legal persons and between Kes. 1M to Kes.10M for natural persons.</li>



<li>Additional penalties not exceeding one hundred thousand shillings in each case for each day or part thereof during which such violation or non-compliance continues.</li>



<li><strong>Imprisonment</strong>: financing of terrorism attracts a term not exceeding 20 years for a natural person or a fine not exceeding Kes. 20 M for a legal person.</li>
</ul>



<p>The March 2026 deadline is only four months away, being proactive reduces exposure to fines, imprisonment, and reputational risk while strengthening both investor and regulatory confidence.&nbsp; At Riskhouse International Limited, our free 30 minutes AML/CFT Health Check &amp; Independent Assessment gives you clarity on your obligations and breaks what needs to be done into practical, sector-specific obligations, whether you are a PBO, Betting or Precious Dealer. &nbsp;</p>



<p>At <strong>RISKHOUSE INTERNATIONAL</strong>, our multi-disciplinary team combines legal, risk, and compliance to provide an objective review of policies and controls, specialized guidance in ESG, Crypto, and AI governance, AML/CFT policies, access to benchmarking and best practices from multiple industries, and efficient implementation support. This allows your internal teams to focus on execution while ensuring that your governance framework is comprehensive, practical, and strategically aligned, turning policies into organizational growth.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-anti-money-laundering-and-combating-of-terrorism-financing-laws-amendment-act-2025-is-your-business-ready-for-march-2026/">The Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025: Is your Business Ready for March 2026?</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The risk of social media cryptocurrency scams in Kenya despite VASP regulation</title>
		<link>https://riskhouse.co.ke/the-risk-of-social-media-cryptocurrency-scams-in-kenya-despite-vasp-regulation/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Wed, 29 Oct 2025 11:17:37 +0000</pubDate>
				<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8973</guid>

					<description><![CDATA[<p>Kenya’s recent enactment of the Virtual Asset Service Providers (VASP) Bill into Law marks a milestone in regulating the crypto industry. The law imposes clear obligations on Virtual Asset Service Providers (Exchanges, Custodians, Brokers, Investment Advisors, Initial Coin offering providers), including licensing, capital requirements, cybersecurity, AML/CFT compliance and consumer protection, with regulatory oversight from the CBK and CMA. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-risk-of-social-media-cryptocurrency-scams-in-kenya-despite-vasp-regulation/">The risk of social media cryptocurrency scams in Kenya despite VASP regulation</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Kenya’s recent enactment of the Virtual Asset Service Providers (VASP) Bill into Law marks a milestone in regulating the crypto industry. The law imposes clear obligations on Virtual Asset Service Providers (Exchanges, Custodians, Brokers, Investment Advisors, Initial Coin offering providers), including licensing, capital requirements, cybersecurity, AML/CFT compliance and consumer protection, with regulatory oversight from the CBK and CMA.</p>



<p>However, while CBK &amp; CMA aims to protect consumers by licensing and overseeing service providers, it cannot fully eliminate the wave of scams flourishing on social media platforms like Telegram, WhatsApp, TikTok, Twitter/X, and Instagram.</p>



<p><strong>The Psychology Behind Crypto Scams</strong></p>



<p>Scammers and Influencers prey on human psychology, exploiting <strong>greed</strong> and <strong>the fear of missing out (FOMO)</strong>, to lure victims with false promises of quick, guaranteed returns. In addition, buzzwords such as “CBK licensed” or “CMA regulated” will be frequently misused to create a false confidence and to persuade people to invest, often without verifying the legitimacy.</p>



<p><strong>Key Social Media Cryptocurrency Scams to Watch Out for:</strong></p>



<ol class="wp-block-list">
<li><strong>Cryptocurrency-based Ponzi Scheme</strong>: Aggressively advertised on WhatsApp or Telegram groups promising high, risk-free returns.</li>



<li><strong>Cryptocurrency-based Job scams</strong>: Scammers posing as legitimate company employees lure victims through social media posts or text messages offering fake part-time jobs and assigning fake click-based tasks through scam websites.</li>



<li><strong>Pump and dump schemes</strong>: Scammers use social media to artificially hype up a low-value cryptocurrency, spreading false claims to drive up its price and later sell causing the price to crash.</li>



<li><strong>Impersonation Scams</strong>: Fraudulent profiles mimicking exchanges, regulators like CBK or CMA, or industry influencers to gain trust and steal funds.</li>



<li><strong>Fraudulent Celebrity Endorsements</strong>: Deepfake videos/ audio using AI, fake testimonials, or paid influencers on Instagram, TikTok, or Facebook promoting fake ICOs and Coins.</li>



<li><strong>Phishing links:</strong> post pushing a link via DMs to “claim tokens”, verify an account” or “fake transactional approval prompts”, once link is clicked the scammer steals the cryptocurrency.</li>



<li><strong>Pig butchering scams (also known as Romance scams)</strong>: a long-term investment scam, often involving cryptocurrency, where scammers “fatten up” the victim (“the pig”) with trust and affection before “butchering” them, i.e. stealing a large amount of money.</li>
</ol>



<p>According to Chainalysis (Blockchain Analytical firm), approximately $9.9billion was lost to crypto scams globally in the year 2024. In addition, recent reports from Kenya and Nigeria, an estimated amount of $840million was lost by investors, through Crypto Bridge Exchange(CBEX), which advertised itself as a “crypto-powered trading platform backed by artificial intelligence, promising tantalizing returns of up to 100% in just 30 days”,&nbsp; and required only a simple sign-up through a website or app, often shared via WhatsApp or Telegram by trusted friends” (Source: &nbsp;<a href="https://www.chainalysis.com/blog/2024-pig-butchering-scam-revenue-grows-yoy/">Chainalysis.com</a> , <a href="https://kenyanwallstreet.com/special-report-cbex-and-the-echoes-of-crypto-scams/">Kenyanwallstreet.com</a>)</p>



<p>While the VASP Act strengthens oversight of Virtual Asset Service Providers, it does not extend to the informal and fast-moving world of social media where scams thrive. Regulations is critical foundation, but effective protection requires a layered approach, combining consumer education, and expert advice.</p>



<p>At&nbsp;<strong>RISKHOUSE INTERNATIONAL</strong>, we help our clients navigate Kenya’s evolving crypto landscape with confidence. Our tailored services include risk assessments, scam awareness training, Blockchain forensics, and regulatory crypto compliance. We boast of a team of expert investigators who integrate fraud and risk management, regulatory compliance, blockchain forensics, and legal advisory to build frameworks that reflect both the regulator’s expectations and market realities. Partner with <strong>RISKHOUSE INTERNATIONAL</strong>, to assess your readiness, identify exposure, and build crypto compliance systems that work in practice to stay competitive in Kenya’s Crypto regulatory landscape.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-risk-of-social-media-cryptocurrency-scams-in-kenya-despite-vasp-regulation/">The risk of social media cryptocurrency scams in Kenya despite VASP regulation</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Kenya’s virtual asset service providers act, 2025: compliance pillars for the digital asset market</title>
		<link>https://riskhouse.co.ke/kenyas-virtual-asset-service-providers-act-2025-compliance-pillars-for-the-digital-asset-market/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Tue, 28 Oct 2025 09:19:37 +0000</pubDate>
				<category><![CDATA[Financial]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8966</guid>

					<description><![CDATA[<p>The coming into force of Kenya’s Virtual Asset Service Providers Bill, 2025 into law on 15th October 2025 marks a turning point for the country’s fast-growing digital asset market. The Act not only establishes a formal regulatory framework but also redefines how accountability, investor protection, and market stability will shape the crypto regulation sector going forward.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/kenyas-virtual-asset-service-providers-act-2025-compliance-pillars-for-the-digital-asset-market/">Kenya’s virtual asset service providers act, 2025: compliance pillars for the digital asset market</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>“An Act of Parliament to provide a legislative framework to regulate virtual asset service providers and address risks associated with the misuse of virtual assets and virtual asset services, and for connected purposes</em>” <strong>&#8211; Preamble, The Virtual Asset Service Providers Bill, 2025</strong></p>



<p>The coming into force of Kenya’s Virtual Asset Service Providers Bill, 2025 into law on <strong>15<sup>th</sup> October 2025</strong> marks a turning point for the country’s fast-growing digital asset market. The Act not only establishes a formal regulatory framework but also redefines how accountability, investor protection, and market stability will shape the crypto regulation sector going forward.</p>



<p>For crypto traders &amp; enthusiasts, exchanges, and investors, this is more than a legal milestone – it’s a structural shift that determines who thrives under the new rules or legitimacy.</p>



<p><strong>Kenya’s Crypto Adoption</strong></p>



<p>According to Chainalysis (Blockchain Analytical firm) 2024 Global Crypto Adoption Index, Kenyans transacted Kshs 426billion between July 2024 and June 2025 through crypto. In addition, the firm ranked Kenya as fourth globally in its adoption of stablecoin (a cryptocurrency pegged to a dollar). These positions Kenya as leader in East Africa on Crypto adoption and transaction volume. (source: <a href="https://share.google/t10H8EfFRLmVdSGS1">Chainalysis 2024</a>).</p>



<p><strong>What the Law Requires</strong></p>



<p>The Act defines a Virtual Asset (VA) as a <em>“digital representation of value that can be digitally traded or transferred and can be used for payment or investment purposes and does not include digital representation of fiat currencies, e-money, securities and other financial assets”</em></p>



<p>It classifies Virtual Asset Service Providers (VASPs) (Local or Foreign company):</p>



<ol style="list-style-type:upper-roman" class="wp-block-list">
<li>An Exchange &#8211; facilitating the exchange of virtual assets for fiat currency or other virtual assets for fiat currency or other virtual assets on behalf of third parties</li>



<li>Custodian- holding custody or controls virtual assets on behalf of its clients to facilitate an exchange</li>



<li>Broker- purchases virtual assets from a seller when transactions or bids and offers are matched in order to sell them to a buyer,</li>
</ol>



<p>The Act, through Parts III-V, establishes three core compliance pillars for all Virtual Asset Service Providers (VASPS):</p>



<ol class="wp-block-list">
<li><strong>Regulatory Compliance</strong></li>
</ol>



<p>All VASPS must now be licensed by the Capital Markets Authority (CMA) or the Central Bank of Kenya before offering services. They must maintain a registered office in Kenya, demonstrated capital adequacy, solvency, and insurance, and notify the CMA or CBK of ownership or structural changes.&nbsp; VASPs must also meet cybersecurity standards under the Computer Misuse and Cybercrimes Act and satisfy the Authority that they can comply with consumer and data protection laws.</p>



<ul class="wp-block-list">
<li><strong>Customer Protection and Governance</strong></li>
</ul>



<p>VASPs are required to act with fairness, transparency, and integrity, avoiding conflict of interest and safeguarding clients’ assets. All marketing and promotional materials must be fair, clear, transparent, and not misleading. VASPs must also submit audited financial statements, report cyber or solvency incidents, and ensure directors are fit and proper.</p>



<ul class="wp-block-list">
<li><strong>AML/CFT/CPF Obligations</strong></li>
</ul>



<p>VASPS are subject to POCAMLA and the Prevention of Terrorism Act, with full accountability for due diligence, transaction monitoring, sanction screening, and suspicious activity reporting.</p>



<p><strong>Risks of Non-Compliance</strong></p>



<p>Failure to comply may trigger license suspension, banking restrictions, regulatory audits and reputation risks.</p>



<p>In addition, the VASPs may be exposed to financial penalties and criminal liability as stipulated under Section 41: Offences and penalties:</p>



<p>For:</p>



<p>a) Individuals to a fine not exceeding Kshs. 10M($77K) or to imprisonment not exceeding ten years or both;</p>



<p>(b) A company, to a fine not exceeding Kshs. 20M($154K) or suspension.</p>



<p><strong>Why Expert Interpretation Matters</strong></p>



<p>The Act’s principles-based design leaves room for regulatory expectation. Knowing how to apply these standards practically requires expertise across law, risk and blockchain forensics.</p>



<p>At&nbsp;<strong>RISKHOUSE INTERNATIONAL</strong>, we boast of a team of expert investigators who integrate fraud and risk management, regulatory compliance, blockchain forensics, and legal advisory to build frameworks that reflect both the regulator’s expectations and market realities. Partner with <strong>RISKHOUSE INTERNATIONAL</strong>, to assess your readiness, identify exposure, and build crypto compliance systems that work in practice to stay competitive in Kenya’s Crypto regulatory landscape. Request a VASP Compliance Audit today!</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/kenyas-virtual-asset-service-providers-act-2025-compliance-pillars-for-the-digital-asset-market/">Kenya’s virtual asset service providers act, 2025: compliance pillars for the digital asset market</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Land Due Diligence</title>
		<link>https://riskhouse.co.ke/land-due-diligence/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Tue, 19 Aug 2025 09:15:49 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Financial]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8953</guid>

					<description><![CDATA[<p>LAND DUE DILIGENCE is the process of conducting thorough investigations and verifications before purchasing, leasing, or developing a piece of land. It is aimed at uncovering any legal, regulatory, or physical issues that may affect ownership, use, or transferability of the land. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/land-due-diligence/">Land Due Diligence</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>LAND DUE DILIGENCE</strong> is the process of conducting thorough investigations and verifications before purchasing, leasing, or developing a piece of land. It is aimed at uncovering any legal, regulatory, or physical issues that may affect ownership, use, or transferability of the land.&nbsp;</p>



<p>Key aspects of land due diligence include:&nbsp;</p>



<ol start="1" class="wp-block-list">
<li><strong>Title verification</strong> – confirming legal ownership and whether the title is clean, valid, and unencumbered.&nbsp;</li>
</ol>



<ol start="2" class="wp-block-list">
<li><strong>Land use/zoning compliance</strong> – checking if the intended use aligns with planning regulations.&nbsp;</li>
</ol>



<ol start="3" class="wp-block-list">
<li><strong>Historical ownership</strong> – tracing the land’s ownership chain to ensure no prior fraud or illegality.&nbsp;</li>
</ol>



<ol start="4" class="wp-block-list">
<li><strong>Regulatory approvals</strong> – verifying survey plans, environmental clearances, and subdivision approvals.&nbsp;</li>
</ol>



<ol start="5" class="wp-block-list">
<li><strong>Physical inspection</strong> – visiting the site to identify boundary disputes, encroachments, or occupation issues.&nbsp;</li>
</ol>



<p>Land due diligence protects the buyer from legal disputes, fraud, and investment risks by ensuring informed, lawful, and secure land transactions.&nbsp;</p>



<p><strong>CASE STUDY</strong>&nbsp;</p>



<p><strong>SEHMI &amp; ANOTHER V. TARABANA COMPANY LIMITED &amp; 5 OTHERS [2025] KESC 21 (KLR)</strong>&nbsp;</p>



<p><strong>Facts of the Case</strong>&nbsp;</p>



<p>Harcharan Singh Sehmi and Jaswarana Sehmi, the 1<sup>st </sup>and 2<sup>nd </sup>Appellant, are brothers and the initial lessees of the suit property situated in Ngara, Nairobi. The parcel of land was initially leased to the Sehmi family for a 59-year lease beginning 1942. The Lessor was the Government of Kenya. As the lease neared its expiry in 2001, the Sehmi family applied for a renewal of the lease. As part of the lease renewal process, the brothers received letters from both the Commissioner of Lands and Director of Physical Planning, who each confirmed that there were no objections to the lease renewal. Unfortunately for Harcharan Singh Sehmi and Jaswarana Sehmi, the lease was never formally extended due to administrative delays by the Lands Office.&nbsp;&nbsp;</p>



<p>In 2009, the suit property was unlawfully and unprocedurally transferred to Rospatech Limited, (the 2<sup>nd</sup> Respondent). In 2014, Rospatech Limited transferred the suit property to Tarabana Company Limited for a consideration of Kes. 24,000,000/-. Following the transfer to Tarabana, (the 1<sup>st </sup>Respondent), the Sehmi family were evicted from the suit property and the 1<sup>st</sup> Respondent constructed an eight-story building on said property.&nbsp;&nbsp;</p>



<p>The two brothers filed a suit at the Environment and Land Court (ELC) in Nairobi. The ELC determined that Harcharan Singh Sehmi and Jaswarana Sehmi were the rightful owners of the property. The trial court therefore, nullified the 1<sup>st</sup> and 2<sup>nd</sup> Respondents’ titles and reinstated the Sehmi’s titles.&nbsp;&nbsp;</p>



<p>The Respondents then appealed to the Court of Appeal. The Court of Appeal reversed the trial court’s decision, and found that the 1<sup>st </sup>respondent was an innocent purchaser for value, and that therefore, Tarabana Company Limited had a legitimate right over the suit property.&nbsp;&nbsp;</p>



<p>Harcharan Singh Sehmi and Jaswarana Sehmi are now the appellants in this suit before the Supreme Court of Kenya, seeking to quash the decision of the Court of Appeal.&nbsp;&nbsp;</p>



<p><strong>Issues before the Supreme Court of Kenya</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>What is the meaning, scope and extent of applicability of the doctrine of Bona fide/Innocent Purchaser for value without Notice?&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Does the doctrine of Bona fide/ Innocent Purchser for Value Without Notice protect a purchaser of an illegally/irregularly allocated title over Public Land?&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>To what extent, if at all, is the doctrine of Legitimate Expectation applicable to the renewal of leases over public land?&nbsp;</li>
</ul>



<p><strong>Rule of Law</strong>&nbsp;</p>



<p>The Supreme Court of Kenya in reaching its decision relied on the following provisions of law;&nbsp;</p>



<ul class="wp-block-list">
<li>Section 26(1) of the Land Registration Act, 2012&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Article 47 of the Constitution of Kenya&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Principles of legitimate expectation&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Doctrine of innocent purchaser for value&nbsp;</li>
</ul>



<p><strong>Analysis&nbsp;</strong>&nbsp;</p>



<p>(Paragraph 8) “Holders of impugned titles, especially those acquired before the promulgation of the 2010 Constitution always called into service the provisions of section 23 of the Registration of Titles Act (repealed) on indefeasibility of title. Pursuant to section 23, a certificate of title was held as conclusive evidence of proprietorship. Upon repeal (of the Registration of Titles Act), the effects of registration are now governed by section 26 of the Land Registration Act.”&nbsp;</p>



<p>(Paragraph 9) “Section 26 of the Land Registration Act provided that the proprietor shall not be subject to challenge, except on the ground of <strong>fraud or misrepresentation</strong> to which the person is proved to be a party; or <strong>where the certificate of title has been acquired illegally</strong>, <strong>unprocedurally or through a corrupt scheme</strong>. Under the Registration of Titles Act (repealed), a certificate of title was to be regarded by courts as conclusive evidence that the person named therein was the absolute and indefeasible owner of the land. However, under Land Registration Act, a certificate of title was to be regarded by courts as <em>prima facie</em> evidence that the person named therein was the absolute and indefeasible owner of the land. <strong>It was therefore no longer possible for a title holder to erect the certificate of title as a barrier to an inquiry into its legality or otherwise</strong>.” (emphasis ours)&nbsp;</p>



<p>The Supreme Court in reaching its conclusion found that you cannot confer a bad title. A holder of an illegal title cannot possibly confer a legal title. In other words, there is no legality that can arise from an illegality.&nbsp;</p>



<p>The Court further explained that it is not sufficient that a person sites the doctrine of innocent purchaser for value. But such a person claiming under this doctrine must show that, one, he purchased a legal estate/estate was purchased legally, and two, that there was at the time no notice or equitable interest registered against the property.&nbsp; Paragraph 11, “A purchaser would only be regarded as bona fide if he bought property in good faith without notice of any defect or claims against the title. So that <strong>if the title in question was illegal</strong> or obtained through unlawful meant, <strong>the purchaser could not claim protection even if he was not aware of the illegality</strong>.”&nbsp;</p>



<p><strong>Determination of the Court</strong>&nbsp;</p>



<p>The Court determined that the 2<sup>nd</sup> Respondent obtained the suit property illegally. Therefore, having an illegal title of land, the 2<sup>nd</sup> Respondent was incapable of passing a valid title to the 1<sup>st</sup> Respondent. Further, the doctrine of bona fide purchaser for value could not be invoked to protect a title to an illegally acquired public land. The Court emphasized that <strong>due diligence requires more than just reliance on a title deed or registry search</strong>—it includes investigation into how the title was acquired, especially where the land was previously under government lease or occupation.&nbsp;</p>



<p>The Court determined;&nbsp;</p>



<ol start="1" class="wp-block-list">
<li>The Judgment of the Court of Appeal, dated 8<sup>th</sup> October 2021 is overturned&nbsp;</li>
</ol>



<ol start="2" class="wp-block-list">
<li>The Petition of Appeal dated 23<sup>rd</sup> November 2023 is allowed&nbsp;</li>
</ol>



<ol start="3" class="wp-block-list">
<li>The Chief Land Registrar (3<sup>rd</sup> Respondent) is directed to effect a cancellation of the 1<sup>st</sup> Respondent’s title from the Proprietorship Section of the Land Register&nbsp;</li>
</ol>



<ol start="4" class="wp-block-list">
<li>The Chief Land Registrar (3<sup>rd</sup> Respondent) is directed to make an entry in the Proprietorship Section of the Land Register to reflect the appellants as the proprietors of the suit property in accordance with the provisions of the Land Registration Act&nbsp;</li>
</ol>



<ol start="5" class="wp-block-list">
<li><strong>The structures and developments erected by the 1</strong><strong><sup>st</sup></strong><strong> Respondent on the suit property be removed and demolished by the 1</strong><strong><sup>st</sup></strong><strong> Respondent within six months from the date of this Judgment</strong> under the supervision of the 5<sup>th</sup> respondent&nbsp;</li>
</ol>



<p><strong>CONCLUSION</strong>&nbsp;</p>



<p>Land due diligence is not just a procedural step; it is a critical safeguard in any real estate transaction. By thoroughly investigating legal titles, zoning regulations, environmental conditions, and other potential encumbrances, stakeholders can mitigate risks, prevent costly disputes, and make informed investment decisions. Whether you&#8217;re a developer, investor, or end-user, comprehensive due diligence ensures that your land acquisition is not only legally sound but strategically wise. In an industry where oversights can lead to long-term setbacks, due diligence is your first and most essential line of defence.&nbsp;&nbsp;</p>



<p>In <strong>Sehmi &amp; another V. Tarabana Company Limited &amp; 5 others [2025] KESC 21 (KLR)</strong>, the Supreme Court recognised the huge investment made by the 1<sup>st</sup> Respondent on the suit property but determined that even equity cannot cure an illegality. This decision by the highest Court in the country places greater responsibility on buyers, lawyers, and developers to investigate the authenticity of titles and avoid complicity in irregular allocations.&nbsp;</p>



<p><strong>Due diligence</strong> is not a box-ticking exercise. Land buyers especially, must go beyond the surface; verifying not just the existence of a title but also its valid origin and compliance with legal processes. Further, <strong>a registered title acquired through illegality cannot be protected</strong>. The need to uphold rule of law, land governance principles, and constitutional protections outweighed the financial loss incurred by the developer.&nbsp;</p>



<p>At <strong>RISKHOUSE INTERNATIONAL</strong>, we boast of a team of expert investigators who have continually assisted our clients with their due diligence needs, through a mix of analysis of publicly available information, human source inquiries and overt investigations. Our team incorporates specialists in intelligence analysis, financial investigations, cyber security and legal advisory allowing our clients to make informed decisions and manage or avoid altogether, potential risks. Kindly reach us on email at <a href="mailto:info@riskhouse.co.ke" target="_blank" rel="noreferrer noopener">info@riskhouse.co.ke</a>. We are capable, willing and would be happy to help you with all your background checks needs.&nbsp;</p>



<p></p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/land-due-diligence/">Land Due Diligence</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Asset Tracing?</title>
		<link>https://riskhouse.co.ke/what-is-asset-tracing/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Fri, 04 Jul 2025 13:46:27 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Financial]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8932</guid>

					<description><![CDATA[<p>Asset tracing is a crucial process used to locate assets that have been hidden, misappropriated, or unlawfully acquired. This procedure is often employed in various contexts, including fraud investigations, divorce settlements, and debt collection. Understanding the basics of asset tracing and recovery can be vital for businesses and individuals dealing with financial disputes or fraud. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/what-is-asset-tracing/">What is Asset Tracing?</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Understanding Asset Tracing</strong>&nbsp;</p>



<p>Asset tracing is the process of identifying and locating assets that are concealed or difficult to find. This involves following a trail of financial transactions, ownership records, and other documentation to track down assets. Effective tracing and recovering assets are crucial in cases of commercial disputes and civil fraud. It plays a key role in the recovery of the proceeds and is a core component of specialised recovery services aimed at addressing financial misconduct and fulfilling legal obligations.&nbsp;</p>



<p><strong>Importance of Asset Tracing&nbsp;</strong>&nbsp;</p>



<p><strong>Asset tracing </strong>plays a crucial role in maintaining financial integrity and ensuring justice in various scenarios. Here are a few reasons why this process is important:&nbsp;</p>



<p><strong>Fraud Prevention</strong>&nbsp;</p>



<p>Asset tracing helps to uncover civil fraud and recover stolen or misappropriated assets. By identifying hidden assets and methods used to conceal assets, it becomes possible to address and rectify financial misconduct.&nbsp;</p>



<p><strong>Debt Collection</strong>&nbsp;</p>



<p>For creditors and businesses, asset recovery is crucial for collecting outstanding debts. Using recovery services to trace funds ensures that creditors can pursue repayment and secure the assets needed to satisfy financial claims.&nbsp;</p>



<p><strong>Divorce Settlements</strong>&nbsp;</p>



<p>In divorce proceedings, asset tracing can help ensure that marital assets are fairly divided. Identifying hidden assets ensures an equitable settlement and protects the financial interests of both parties.&nbsp;</p>



<p><strong>Legal Compliance</strong>&nbsp;</p>



<p>Asset recovery supports legal compliance by ensuring that individuals and entities meet their financial obligations. It helps uphold contractual agreements, enforce judgments, and resolve disputes. Legal advice from a specialist is often crucial in navigating these processes, ensuring that recovery efforts are aligned with legal requirements and effectively managed.&nbsp;</p>



<p><strong>Aset tracing </strong>is a vital process for locating assets that may be hidden or disputed. By employing a combination of investigative techniques and legal actions, individuals and businesses can address financial misconduct, recover debts, and ensure fair asset distribution. Understanding the principles and methods of asset tracing and recovery can help in effectively managing financial disputes and protecting one’s financial interests.&nbsp;</p>



<p>At Riskhouse International, this is one of the key services we offer to law firms, financial institutions, NGOS, SMES, individuals and other reputable organizations. If you have any questions about our service or would like to discuss your matters with us in greater detail, please contact the Business Development Team on 0792603759.&nbsp;&nbsp;</p>



<p>To learn more about this and catch up on our other news and alerts you may visit our blog on our website at <a href="https://riskhouse.co.ke/blog/" target="_blank" rel="noreferrer noopener">https://riskhouse.co.ke/blog/</a>.&nbsp;&nbsp;</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/what-is-asset-tracing/">What is Asset Tracing?</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Anti-Bribery and Anti-Corruption Assistance</title>
		<link>https://riskhouse.co.ke/anti-bribery-and-anti-corruption-assistance/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Mon, 15 May 2023 07:58:03 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Anti bribery]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8890</guid>

					<description><![CDATA[<p>Anti-Bribery and Anti-Corruption Assistance Occupational fraud typologies highlight different forms of fraud, one of which is corruption. Business corruption is categorized as the second most common type of occupational fraud, with the primary examples being bribery, conflict of interest, improper gratuities, and economic extortion. Bribery and corruption pose significant risks to organizations as they may [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/anti-bribery-and-anti-corruption-assistance/">Anti-Bribery and Anti-Corruption Assistance</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong>Anti-Bribery and Anti-Corruption Assistance</strong></h4>
<p>Occupational fraud typologies highlight different forms of fraud, one of which is corruption. Business corruption is categorized as the second most common type of occupational fraud, with the primary examples being bribery, conflict of interest, improper gratuities, and economic extortion. Bribery and corruption pose significant risks to organizations as they may be subjected to legal, regulatory, and reputational damage. Additionally, a history of corruption can constitute a reputational risk that if not mitigated, may drive away investors, partners, clients, and future employees.</p>
<p>Therefore, zero tolerance for bribery and corruption is essential as it ensures sustainability and business integrity in any organization. Organizations should have robust policies, procedures, and programs to mitigate bribery and corruption risks. Organizations should also train and educate stakeholders to increase their understanding and awareness. An effective Anti-Bribery and Anti-Corruption program should lay focus on the following key areas: &#8211;</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Top management commitment</strong> – this entails tone at the top and senior management commitment to upholding ethical conduct and integrity.</li>
<li><strong>Risk Assessment</strong> – this entails assessments and subsequent assessments of the organization’s bribery and corruption risks.</li>
<li><strong>Proportionate Procedures</strong> – this involves developing procedures based on risk assessment and ensuring that there is an investigation procedure in place.</li>
<li><strong>Training and Information Communication</strong> – this involves training all levels of employees on whistleblowing and mechanisms of reporting bribery and corruption.</li>
<li><strong>Due Diligence</strong> – this involves applying appropriate due diligence procedures to third parties including name screening, integrity, and corruption checks.</li>
<li><strong>Monitoring and Review</strong> – this involves a continuous evaluation and validation of anti-bribery and anti-corruption programs.</li>
</ul>
</li>
</ul>
<p>At <strong>Riskhouse International</strong>, we help organizations spanning multiple jurisdictions to define, assess and respond to bribery and corruption issues. Further, we help organizations identify gaps and provide recommendations for mitigating bribery and corruption risks. We also support organizations with comprehensive Anti-Bribery &amp; Anti-corruption (ABAC) reviews, reviews of the existing relevant legislation, review of the existing policies and procedures, conducting transactions reviews and verifications of third parties.</p>
<p>To learn more about this and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/anti-bribery-and-anti-corruption-assistance/">Anti-Bribery and Anti-Corruption Assistance</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat detection spectrum and advanced threat hunting.</title>
		<link>https://riskhouse.co.ke/threat-detection-spectrum-and-advanced-threat-hunting/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Thu, 04 May 2023 05:53:49 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Threat detection spectrum]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8885</guid>

					<description><![CDATA[<p>Threat detection spectrum and advanced threat hunting. A network environment can be defined as a communications system that ties multiple users together. In such an environment, there is a need to establish control measures to detect advanced threats in the network. The security mechanism measures should identify the threat’s movement in, out, and laterally within [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/threat-detection-spectrum-and-advanced-threat-hunting/">Threat detection spectrum and advanced threat hunting.</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong>Threat detection spectrum and advanced threat hunting.</strong></h4>
<p>A network environment can be defined as a communications system that ties multiple users together. In such an environment, there is a need to establish control measures to detect advanced threats in the network. The security mechanism measures should identify the threat’s movement in, out, and laterally within the environment.</p>
<p>There is a need to establish a network detection response (NDR) that can identify and allow rapid and efficient response to threat incidents and analyze the network traffic matrix. This will enable the identification of zero-day exploits and unknown unidentified threats to enhance advanced security threat hunting and detection capabilities.</p>
<p>The organization should embrace the following practices to prevent the threats: &#8211;</p>
<ol>
<li>Human expertise &#8211; security experts should have the ability to observe and act on incidents for the purpose of preventing major damages the business may encounter.</li>
<li>An automated response &#8211; there is a need for integration and automation of security appliances to be capable of taking actions to block and mitigate potential threats as they are detected. This can be done by automatically blocking traffic from active IP addresses that are identified as known threats.</li>
<li>Artificial Intelligence/ Threat Intelligence – this is the integration of network devices and other applications by use of intelligence that feeds up-to-date information on known threats and cybercrime attackers on a network.</li>
</ol>
<p>At Riskhouse International, we assist the management and organizations to develop policies and standards that assess security control measures and embrace a healthy network environment. To learn more about this service and to catch up on our updates and alerts you can visit our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/threat-detection-spectrum-and-advanced-threat-hunting/">Threat detection spectrum and advanced threat hunting.</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Customer Due Diligence is Necessary in Combating Money Laundering</title>
		<link>https://riskhouse.co.ke/why-customer-due-diligence-is-necessary-in-combating-money-laundering/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Tue, 25 Apr 2023 09:18:45 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8879</guid>

					<description><![CDATA[<p>Customer Due Diligence (CDD) is the process of verifying the identity of customers before establishing a business relationship with them as well as assessing their risk level. CDD assists businesses to manage risks of financial crime which include money laundering and terrorist financing. Criminals launder money mainly using the financial system to transfer funds. Financial [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/why-customer-due-diligence-is-necessary-in-combating-money-laundering/">Why Customer Due Diligence is Necessary in Combating Money Laundering</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Customer Due Diligence (CDD) is the process of verifying the identity of customers before establishing a business relationship with them as well as assessing their risk level. CDD assists businesses to manage risks of financial crime which include money laundering and terrorist financing.</p>
<p>Criminals launder money mainly using the financial system to transfer funds. Financial institutions, especially banks, are most vulnerable to abuse for laundering purposes. To protect themselves, financial institutions must have adequate controls and procedures in place that enable them to know the person whom they are dealing with. Enhanced due diligence on new and existing customers is a key part of these controls.</p>
<p>The application of thorough Customer Due Diligence (CDD) measures by financial institutions and a high degree of transparency is crucial to fight money laundering and the financing of terrorism effectively. Customer Due Diligence should be applied upon the establishment of a business relationship. Enhanced Due Diligence should also be applied where there is a receipt of a significant cash amount above normal threshold receipts. Customer Due Diligence measures should also be applied whenever financial institutions suspect money laundering or terrorist financing activities.</p>
<p><strong>The Legal Framework for Customer Due Diligence in Kenya.</strong></p>
<p>In Kenya, CDD is a legal requirement under the Proceeds of Crime and Anti-money Laundering Regulations, 2013. Under the regulations, reporting institutions which include banks, insurance companies, and microfinance institutions must undertake due diligence procedures before establishing a business relationship.</p>
<p>Specifically, institutions are required to identify customers using independent source documents, data, or information, verify the identity of beneficial owners and conduct ongoing due diligence on the business relationship to ensure that transactions being undertaken are consistent with the financial institution’s knowledge of the customer, their business and risk profile.</p>
<p><strong>Importance of Customer Due Diligence for Financial Institutions in Kenya</strong></p>
<p>One of the key benefits of conducting customer due diligence is the protection of the institution against reputational risk. Another benefit is the maintenance of customer trust. Lastly, CDD ensures the avoidance of regulatory fines and penalties. In Kenya, a reporting institution that contravenes the provisions of the regulations commits an offence and is liable to a fine not exceeding five million Kenya shillings or imprisonment for a term not exceeding three years or both.</p>
<p><strong>Riskhouse International Limited</strong> assists organizations to examine the effectiveness of their Anti-money laundering and Combating Financial Terrorism programs by offering AML/CFT Health Checks, KYC Diligence, Screening, and Remediation, AML/CFT Analytics, Monitoring, and Investigation, and AML/CFT Training and Awareness.</p>
<p>To learn more about this and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a></p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/why-customer-due-diligence-is-necessary-in-combating-money-laundering/">Why Customer Due Diligence is Necessary in Combating Money Laundering</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fraud risk assessment as a component of a fraud risk management</title>
		<link>https://riskhouse.co.ke/fraud-risk-assessment-as-a-component-of-a-fraud-risk-management/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Wed, 19 Apr 2023 06:22:52 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Fraud risk assessment]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8868</guid>

					<description><![CDATA[<p>Fraud risk assessment as a component of a fraud risk management Fraud risk assessment is a component of fraud risk management strategy that helps an organization and its stakeholders protect itself against fraud. It is a technique by management to detect and understand their fraud exposure, fraud risks, and the efficiency of existing anti-fraud controls [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/fraud-risk-assessment-as-a-component-of-a-fraud-risk-management/">Fraud risk assessment as a component of a fraud risk management</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Fraud risk assessment as a component of a fraud risk management</strong></p>
<p>Fraud risk assessment is a component of fraud risk management strategy that helps an organization and its stakeholders protect itself against fraud. It is a technique by management to detect and understand their fraud exposure, fraud risks, and the efficiency of existing anti-fraud controls and solutions.</p>
<p>Fraud risk assessment involves a comprehensive examination of fraud vulnerabilities, control environment evaluation, determining the likelihood of fraud risk, identifying material gaps, remediation, regular revalidation, and control implementation approval.</p>
<p>The objective of the risk assessment process is to evaluate hazards and, if required, mitigate them by improving control measures. The four primary aspects of fraud risk assessment are:</p>
<ul>
<li><strong>Asset Misappropriation,</strong>which evaluates the indicators of missing cash, inventories, and other assets</li>
<li><strong>Non-financial and financial reporting,</strong>which evaluates inconsistencies that can indicate fraud in financial and non-financial reporting</li>
<li><strong>Illegal actions,</strong>which evaluate any fraudulent activities within an organization&#8217;s operation</li>
<li><strong>Regulatory compliance,</strong>which evaluates compliance with industry regulations and the organization&#8217;s efforts to meet regulatory standards.</li>
</ul>
<p>A fraud risk assessment is critical in assisting organizations to proactively identify external and internal risks that can damage their reputation and assets and expose them to criminal or civil liability.</p>
<p>As a result, Riskhouse International can assist your organization in implementing a rigorous fraud risk assessment methodology that includes fraud risk identification and documentation, fraud risk analysis, fraud risk evaluation, and fraud risk treatment. Fraud risk assessment quantifies risks and allows your organization to prioritize more damaging frauds. Riskhouse will adapt a fraud risk-tolerance limit to your organization&#8217;s needs based on the results of the fraud risk assessment.</p>
<p>To learn more about this and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/fraud-risk-assessment-as-a-component-of-a-fraud-risk-management/">Fraud risk assessment as a component of a fraud risk management</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Asset Tracing as a means of debt recovery in Corporate Insolvency Litigation</title>
		<link>https://riskhouse.co.ke/asset-tracing-as-a-means-of-debt-recovery-in-corporate-insolvency-litigation/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Wed, 12 Apr 2023 06:37:39 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Asset Tracing]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8862</guid>

					<description><![CDATA[<p>Asset Tracing as a means of debt recovery in Corporate Insolvency Litigation. Introduction In simple terms, asset tracing is the process of identifying assets through investigations for a particular purpose [without going into the details to answer questions as to who has a legal right to the assets so traced]. Asset tracing can be distinguished [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/asset-tracing-as-a-means-of-debt-recovery-in-corporate-insolvency-litigation/">Asset Tracing as a means of debt recovery in Corporate Insolvency Litigation</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong>Asset Tracing as a means of debt recovery in Corporate Insolvency Litigation</strong><strong>.</strong></h4>
<h5><strong>Introduction </strong></h5>
<p>In simple terms, <strong>asset tracing</strong> is the process of identifying assets through investigations for a particular purpose [without going into the details to answer questions as to who has a legal right to the assets so traced]. Asset tracing can be distinguished from asset recovery which involves the restraining, seizure, confiscating, and return of the assets traced to the rightful owner; it is an assertion of a right.</p>
<p>The nexus between tracing and recovery is that once the tracing exercise is successfully completed, it can then be asked what rights, if any, the claimant can, on his particular facts, assert against the assets traced. These rights can be personal, proprietary, legal, and other equitable rights depending on the subsisting facts.</p>
<p>According to Lord Millett in <strong>Foskett v. McKeown and Others,</strong> tracing assets is neither a claim nor a remedy. It is merely the process by which a claimant demonstrates what has happened to his property, identifies its proceeds and the persons who have handled or received them, and justifies his claim that the proceeds can properly be regarded as representing his property.</p>
<p>Tracing is also distinct from claiming in the following ways: &#8211;</p>
<ol>
<li>It identifies the traceable proceeds of the claimant&#8217;s property.</li>
<li>It enables the claimant to substitute the traceable proceeds for the original asset as the subject matter of his claim, but it does not affect or establish his claim.</li>
</ol>
<h5><strong>When and why Asset tracing should be used? </strong></h5>
<p>The process of asset tracing and recovery is crucial for the successful recovery of misappropriated assets, recovering proceeds of fraud and embezzlement. It is also through asset tracing and identification that financiers can carry out proper due diligence in respect of assets they intend to take as security and investors can access the legitimacy of assets and ventures, they intend to invest in. Additionally, asset tracing and identification is crucial in family law proceedings including succession and divorce as we shall be further discussing in our subsequent articles on this area.</p>
<p>Asset tracing and recovery is also an important tool for creditors as it allows those who are considering instituting claims in court to ascertain unencumbered assets and obtain preservation orders against them to aid in recovery; it also aids in the enforcement of court decrees and judgments which would otherwise be hindered by lack of knowledge of the judgment debtor’s assets.</p>
<h5><strong>Asset Tracing in Corporate Insolvency Litigation</strong></h5>
<p>In insolvency-related matters, asset tracing is also crucial in the tracing and recovery of property that may have been misappropriated by the directors of the company. <strong><em>Case in point</em></strong>:- in liquidation matters, the insolvency practitioner may need to trace misappropriated assets in the event that he intends to pursue the directors for an offence of fraudulent trading or seek orders against delinquent directors as contemplated in our insolvency laws.</p>
<p>Where specific misappropriated assets can be identified, the liquidator can follow the trail and obtain freezing orders or injunctions and disclosure orders on behalf of the Company in liquidation to prevent the delinquent directors from dissipating the assets as to have the effect of prejudicing the interests of the entire body of creditors.</p>
<p>The liquidator, the official receiver, or the creditor can also invoke the power of the Insolvency Court under <strong>Section 504 of the Insolvency Act</strong> to undertake an examination into the conduct of the person in relation to whom the application was made. Where the Court finds that the person has misappropriated the company’s assets, the Court may make orders compelling the person: &#8211;</p>
<ol>
<li>to repay, restore or account for the money or property or any part of it, with interest at such rate as the Court considers appropriate; or</li>
<li>to contribute such amount to the company&#8217;s assets as compensation for the misfeasance, breach of fiduciary or other duty as the Court considers fair and reasonable.</li>
</ol>
<h5><strong>How can we help? </strong></h5>
<p>At Riskhouse, we combine our skills in forensic accounting, forensic investigations, financial &amp; intelligence analysis, understanding of the insolvency process, and digital investigations to perform complex analyses and identify and trace assets of the relevant subjects to satisfy our clients’ needs including; due diligence, recovery of debts and/or proceeds of fraud, enforcement of legal orders,  identification of assets for distribution in family law proceedings, money laundering, resolution of disputes and assessment of cost-benefit of instituting debt recovery claim. With our support, our clients can identify and also assume control of available assets subject to the subsisting contractual relationship with the relevant subject.</p>
<p>To learn more about this and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/asset-tracing-as-a-means-of-debt-recovery-in-corporate-insolvency-litigation/">Asset Tracing as a means of debt recovery in Corporate Insolvency Litigation</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
