The Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025: Is your Business Ready for March 2026?
Starting March 2026, the Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025 will be fully effective. This act applies to many everyday businesses, such as Betting and Mining, Professional services such as accounting, real estate and even the Public Benefit Organizations (PBOs).
Digital Credit and Data Protection in Kenya
In Kenya, the creation of digital credit apps has opened access to small-loans for many who are under-banked. However, alongside this growth have come serious concerns about misuse of personal data, unethical recovery practices, and breaches of privacy rights.
Emerging trends in digital forensics: A constantly evolving field
With our increasing digital world, the field of digital forensics is evolving at an unprecedented pace. New issues and emerging trends are emerging on a daily basis, requiring investigators to up-skill and continue adapting on a continuous basis. These trends emphasize the need for professional development through regular training and acquiring relevant certifications in order to lead and catch up. This blog aims to discover and demystify the 6 biggest new digital forensics
Anti-Bribery and Anti-Corruption Assistance
Anti-Bribery and Anti-Corruption Assistance Occupational fraud typologies highlight different forms of fraud, one of which is corruption. Business corruption is categorized as the second most common type of occupational fraud, with the primary examples being bribery, conflict of interest, improper gratuities, and economic extortion. Bribery and corruption pose significant risks to organizations as they may […]
Threat detection spectrum and advanced threat hunting.
Threat detection spectrum and advanced threat hunting. A network environment can be defined as a communications system that ties multiple users together. In such an environment, there is a need to establish control measures to detect advanced threats in the network. The security mechanism measures should identify the threat’s movement in, out, and laterally within […]
Why Customer Due Diligence is Necessary in Combating Money Laundering
Customer Due Diligence (CDD) is the process of verifying the identity of customers before establishing a business relationship with them as well as assessing their risk level. CDD assists businesses to manage risks of financial crime which include money laundering and terrorist financing. Criminals launder money mainly using the financial system to transfer funds. Financial […]
Fraud risk assessment as a component of a fraud risk management
Fraud risk assessment as a component of a fraud risk management Fraud risk assessment is a component of fraud risk management strategy that helps an organization and its stakeholders protect itself against fraud. It is a technique by management to detect and understand their fraud exposure, fraud risks, and the efficiency of existing anti-fraud controls […]
Asset Tracing as a means of debt recovery in Corporate Insolvency Litigation
Asset Tracing as a means of debt recovery in Corporate Insolvency Litigation. Introduction In simple terms, asset tracing is the process of identifying assets through investigations for a particular purpose [without going into the details to answer questions as to who has a legal right to the assets so traced]. Asset tracing can be distinguished […]
Preventive Strategies for Brand Infringement
Preventive Strategies for Brand Infringement. Brand protection is the process through which a rights holder puts in place actions/safeguards to protect their brand from any form of infringement. This may involve illegal use of the brand name, logo, or repackaging of products with impure content among other acts which might constitute a breach of your […]
10 key components of an effective data destruction policy
10 key components of an effective data destruction policy; Introduction; The right to erasure or destruction of data is guaranteed to data subjects by Section 40 of the Data Protection Act. Under the Data Protection Act, a data subject may request a data controller or processor to erase or destroy personal data held by them […]
- 1
- 2