<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Investigations Archives - Riskhouse International Limited</title>
	<atom:link href="https://riskhouse.co.ke/category/investigations/feed/" rel="self" type="application/rss+xml" />
	<link>https://riskhouse.co.ke/category/investigations/</link>
	<description>Forensic Investigation, Risk Management &#38; Compliance Services </description>
	<lastBuildDate>Thu, 12 Mar 2026 13:38:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://riskhouse.co.ke/wp-content/uploads/2022/02/favicon-68x70.png</url>
	<title>Investigations Archives - Riskhouse International Limited</title>
	<link>https://riskhouse.co.ke/category/investigations/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Asset Tracing</title>
		<link>https://riskhouse.co.ke/asset-tracing/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 13:35:48 +0000</pubDate>
				<category><![CDATA[Asset Tracing]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=9337</guid>

					<description><![CDATA[<p>Asset tracing is the systematic process of identifying, locating, and tracking assets that have been hidden, misappropriated, or unlawfully transferred. It also involves establishing ownership links between assets and individuals or organizations.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/asset-tracing/">Asset Tracing</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Asset tracing is the systematic process of identifying, locating, and tracking assets that have been hidden, misappropriated, or unlawfully transferred. It also involves establishing ownership links between assets and individuals or organizations.</p>



<p>In an increasingly complex financial landscape, asset tracing has become a critical tool in combating fraud, money laundering, corruption, embezzlement, and other financial crimes. Globally, it plays a vital role in protecting economic integrity and advancing financial justice.</p>



<p><strong>The Objective of Asset Tracing</strong></p>



<p>The primary goal of asset tracing is to uncover assets deliberately concealed through complex financial structures such as offshore accounts, shell companies, layered transactions, or third-party holdings. Individuals engaged in financial misconduct often attempt to obscure the origin and beneficial ownership of illicit funds to evade detection.</p>



<p>Asset tracing seeks to dismantle these structures and reveal the true flow of funds.</p>



<p><strong>Key Stages in Asset Tracing</strong></p>



<p>Asset tracing typically involves three core stages:</p>



<p> 1. <strong>Identification</strong></p>



<ol class="wp-block-list"></ol>



<ol class="wp-block-list"></ol>



<ol class="wp-block-list"></ol>



<p>Investigators determine what assets exist and who ultimately controls them. This may include bank accounts, real estate, company shares, intellectual property, luxury assets, and other holdings.</p>



<p>2. <strong>Tracking</strong></p>



<p>This stage focuses on following the movement of assets across financial accounts, jurisdictions, corporate entities, and digital platforms to establish patterns and connections.</p>



<p>3. <strong>Recovery</strong></p>



<p>Where appropriate, legal measures are initiated to freeze, seize, or facilitate the return of assets to their rightful owners through civil or criminal proceedings.</p>



<p><strong>Expertise and Tools</strong></p>



<p>Asset tracing is a multidisciplinary effort involving forensic accountants, legal professionals, financial investigators, and, in some cases, law enforcement agencies.</p>



<p>Modern investigations increasingly rely on advanced technologies such as data analytics, artificial intelligence, digital forensics, and access to international financial intelligence databases to detect unusual transactions and ownership patterns.</p>



<p><strong>Civil and Criminal Applications</strong></p>



<p>In civil matters, asset tracing supports the recovery of misappropriated funds and the enforcement of judgments or compensation claims.</p>



<p>In criminal proceedings, it provides evidentiary support for prosecution by establishing financial trails and demonstrating illicit enrichment or unlawful transfers.</p>



<p><strong>Challenges in Asset Tracing</strong></p>



<p>Despite its effectiveness, asset tracing presents notable challenges, including:</p>



<ul class="wp-block-list">
<li>Banking secrecy laws in certain jurisdictions</li>



<li>Limited transparency in corporate ownership structures</li>



<li>Cross-border legal complexities</li>



<li>The growing use of digital currencies and anonymized financial platforms</li>
</ul>



<p>However, stronger regulatory frameworks, international cooperation, and technological advancements are steadily improving investigative outcomes.</p>



<p><strong>Conclusion</strong></p>



<p>Asset tracing is a powerful mechanism for uncovering hidden wealth, restoring accountability, and reinforcing financial integrity. As financial crimes continue to evolve in sophistication, the role of asset tracing remains indispensable in promoting transparency, justice, and ethical financial conduct worldwide.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/asset-tracing/">Asset Tracing</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Riskhouse International: Protecting Your Interests</title>
		<link>https://riskhouse.co.ke/riskhouse-international-protecting-your-interests/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 07:27:53 +0000</pubDate>
				<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=9232</guid>

					<description><![CDATA[<p>In today’s fast-moving and increasingly complex business environment, risks are often hidden beneath the surface. Fraud, undisclosed liabilities, reputational exposure, and concealed assets can quietly undermine financial stability and erode trust.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/riskhouse-international-protecting-your-interests/">Riskhouse International: Protecting Your Interests</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today’s fast-moving and increasingly complex business environment, risks are often hidden beneath the surface. Fraud, undisclosed liabilities, reputational exposure, and concealed assets can quietly undermine financial stability and erode trust.</p>



<p>At <strong>RISKHOUSE INTERNATIONAL LIMITED</strong>, we specialize in uncovering the truth through discreet, professional investigations that empower our clients to make informed and confident decisions.</p>



<ol class="wp-block-list">
<li><strong>Fraud Investigations</strong></li>
</ol>



<p>Fraud does more than cause financial loss, it damages credibility, stakeholder confidence, and long-term growth.</p>



<p>Our investigative team applies advanced methodologies to detect, analyse, and document fraudulent activity, including:</p>



<ul class="wp-block-list">
<li><strong>Forensic Accounting</strong> – Identifying irregularities, misstatements, and financial manipulation.</li>



<li><strong>Digital Forensics</strong> – Uncovering hidden communications, data breaches, and system misuse.</li>



<li><strong>Evidence Collection &amp; Documentation</strong> – Developing defensible reports to support litigation, regulatory action, or internal disciplinary processes.</li>
</ul>



<p>We deliver clarity where suspicion exists.</p>



<p>2. <strong>Due Diligence</strong></p>



<p>Every investment, acquisition, partnership, or major transaction carries inherent risk. Effective due diligence is not optional, it is essential.</p>



<p>Our due diligence services provide comprehensive insights into:</p>



<ul class="wp-block-list">
<li>Financial standing and operational stability</li>



<li>Regulatory compliance status</li>



<li>Litigation history and reputational exposure</li>



<li>Undisclosed liabilities or conflicts of interest</li>
</ul>



<p>We help clients enter transactions with full visibility and reduced uncertainty.</p>



<p>3. <strong>Background Checks</strong></p>



<p>Trust is important, verification is critical.</p>



<p>Our background screening services help organizations and individuals confirm credibility before making hiring, partnership, or investment decisions. We:</p>



<ul class="wp-block-list">
<li>Verify employment history, academic credentials, and professional certifications</li>



<li>Authenticate documents and qualifications</li>



<li>Review criminal and civil records where applicable</li>



<li>Identify potential reputational or integrity concerns</li>
</ul>



<p>Sound decisions begin with verified information.</p>



<p>4. <strong>Asset Tracing</strong></p>



<p>Hidden or undisclosed assets can complicate fraud investigations, debt recovery, shareholder disputes, and matrimonial matters.</p>



<p>Our asset tracing services establish:</p>



<ul class="wp-block-list">
<li>The physical existence and location of property or individuals</li>



<li>Ownership structures and beneficial interests</li>



<li>Asset movement patterns and economic status analysis</li>



<li>Links between entities and individuals through ownership trail reviews</li>
</ul>



<p>We uncover what others attempt to conceal.</p>



<p><strong>Conclusion</strong></p>



<p>Fraud, hidden liabilities, and undisclosed assets pose serious threats to business continuity and personal financial security.</p>



<p>At <strong>RISKHOUSE INTERNATIONAL</strong>, we combine forensic expertise, rigorous investigation, and timely reporting to provide accurate, actionable intelligence. Our work equips clients with the clarity they need to mitigate risk, protect their interests, and make informed strategic decisions.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/riskhouse-international-protecting-your-interests/">Riskhouse International: Protecting Your Interests</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Uncover the truth, secure the cloud</title>
		<link>https://riskhouse.co.ke/uncover-the-truth-secure-the-cloud/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Fri, 06 Feb 2026 13:24:06 +0000</pubDate>
				<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=9010</guid>

					<description><![CDATA[<p>In today’s data-driven world, cloud technology powers efficiency, flexibility, and growth but it also introduces new risks. At Riskhouse International, we provide Digital Forensic Investigation for Cloud Servers to help organizations uncover digital evidence, trace cyber incidents, and safeguard their data</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/uncover-the-truth-secure-the-cloud/">Uncover the truth, secure the cloud</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today’s data-driven world, cloud technology powers efficiency, flexibility, and growth but it also introduces new risks. At Riskhouse International, we provide Digital Forensic Investigation for Cloud Servers to help organizations uncover digital evidence, trace cyber incidents, and safeguard their data. Our expert-led forensic services ensure rapid, compliant, and reliable investigation of cloud-based threats.</p>



<p><strong>WHY CLOUD FORENSICS MATTERS</strong></p>



<ul class="wp-block-list">
<li><strong>In Digital Forensic Investigation, it helps to;</strong></li>



<li><strong>Identify the Source of Incidents:</strong> We determine how, when, and where a breach occurred by analyzing logs, file activity, and metadata within cloud environments.</li>



<li><strong>Preserve Digital Evidence:</strong> Our team follows strict chain-of-custody procedures, maintaining integrity for legal or regulatory use.</li>



<li><strong>Reconstruct Attack Timelines:</strong> Advanced forensic tools allow us to map events across systems, accounts, and virtual environments.</li>



<li><strong>Ensure Legal &amp; Compliance Readiness:</strong> Our reports meet evidentiary and audit standards to support investigations or litigation.</li>



<li><strong>Minimize Business Disruption:</strong> We conduct investigations with minimal impact on your active systems and operations.</li>



<li><strong>In Cloud Security &amp; Incident Response, it helps to;</strong></li>



<li><strong>Detect Misconfigurations &amp; Insider Threats:</strong> We uncover access loopholes and suspicious user activity that compromise cloud integrity.</li>



<li><strong>Accelerate Breach Response:</strong> Our structured approach helps you contain incidents quickly and restore systems securely.</li>



<li><strong>Strengthen Future Defenses:</strong> Insights from investigations guide improvements to policies, controls, and staff awareness.</li>
</ul>



<p><strong>WHY CHOOSE RISKHOUSE INTERNATIONAL?</strong></p>



<p>Our certified experts combine deep knowledge of cloud infrastructure, cybersecurity, and legal compliance to deliver accurate and actionable findings. Whether you use AWS, Azure, Google Cloud, or hybrid environments, we tailor our forensic process to your systems while ensuring visibility, accountability, and resilience. We don’t just find the evidence; we help you prevent the next attack.</p>



<p><strong>Take Action Now</strong></p>



<p>When data is compromised, every second counts. Contact <strong>RISKHOUSE INTERNATIONAL</strong> today to strengthen your cloud security posture or investigate a potential breach. You may reach us through our:-</p>



<ul class="wp-block-list">
<li><strong>LinkedIn:</strong> <a href="https://ke.linkedin.com/company/risk-house-international">https://ke.linkedin.com/company/risk-house-international</a></li>



<li><strong>Phone:</strong> 0726748889</li>
</ul>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/uncover-the-truth-secure-the-cloud/">Uncover the truth, secure the cloud</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Trace every threat, strengthen your network</title>
		<link>https://riskhouse.co.ke/trace-every-threat-strengthen-your-network/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Fri, 06 Feb 2026 13:18:25 +0000</pubDate>
				<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=9006</guid>

					<description><![CDATA[<p>Your network is the foundation of your digital operations; carrying critical data, communications, and transactions every moment. As cyber threats grow in sophistication, even one breach can disrupt operations and damage trust. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/trace-every-threat-strengthen-your-network/">Trace every threat, strengthen your network</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Your network is the foundation of your digital operations; carrying critical data, communications, and transactions every moment. As cyber threats grow in sophistication, even one breach can disrupt operations and damage trust. At Riskhouse International, we deliver Digital Forensic Investigation for Networks to help organizations uncover, analyze, and resolve incidents quickly and effectively. Our expertise ensures accuracy, compliance, and business continuity.</p>



<p><strong>Why network forensics matters</strong></p>



<ul class="wp-block-list">
<li><strong>For Digital Forensic Investigation, it helps to;</strong></li>



<li><strong>Identify breach origins:</strong> We trace attacks through network logs, traffic analysis, and device forensics to determine where and how compromise occurred.</li>



<li><strong>Preserve critical evidence:</strong> Our investigators maintain full chain-of-custody to ensure integrity for legal or regulatory use.</li>



<li><strong>Reconstruct attack timelines:</strong> Using advanced forensic tools, we recreate the sequence of intrusion events for complete visibility.</li>



<li><strong>Support compliance and legal action:</strong> Our detailed reports meet evidentiary and audit requirements, strengthening your position during investigations.</li>



<li><strong>Maintain operations:</strong> We conduct forensic work with minimal disruption to your ongoing business.</li>



<li><strong>For Network Security &amp; Incident Response, it helps to;</strong></li>



<li><strong>Expose hidden threats:</strong> Detect unauthorized access, data exfiltration, and malware communication across your network.</li>



<li><strong>Assess security gaps:</strong> Evaluate firewalls, intrusion detection systems, and configurations to identify vulnerabilities.</li>



<li><strong>Contain and recover faster:</strong> Our experts isolate affected systems, eliminate threats, and guide secure restoration.</li>



<li><strong>Build long-term resilience:</strong> Findings from investigations help improve network monitoring, controls, and staff awareness.</li>
</ul>



<p><strong>Why choose riskhouse international</strong></p>



<p>Our certified specialists combine deep knowledge of network infrastructure, cybersecurity, and digital forensics to provide accurate, actionable results. Whether your systems are on-premise, cloud-connected, or hybrid, we tailor our approach to deliver transparency, accountability, and strengthened defense. We don’t just respond to incidents; we help you prevent the next one.</p>



<p><strong>Take Control!</strong></p>



<p>When a network breach occurs, time is critical. Contact Riskhouse International today to investigate suspicious activity or assess your network’s resilience. You may reach us through our:-</p>



<ul class="wp-block-list">
<li><strong>LinkedIn:</strong> <a href="https://ke.linkedin.com/company/risk-house-international">https://ke.linkedin.com/company/risk-house-international</a></li>



<li><strong>Phone:</strong> <a>0726748889</a></li>
</ul>



<p></p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/trace-every-threat-strengthen-your-network/">Trace every threat, strengthen your network</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025: Is your Business Ready for March 2026?</title>
		<link>https://riskhouse.co.ke/the-anti-money-laundering-and-combating-of-terrorism-financing-laws-amendment-act-2025-is-your-business-ready-for-march-2026/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 08:59:04 +0000</pubDate>
				<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8990</guid>

					<description><![CDATA[<p>Starting March 2026, the Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025 will be fully effective. This act applies to many everyday businesses, such as Betting and Mining, Professional services such as accounting, real estate and even the Public Benefit Organizations (PBOs).</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-anti-money-laundering-and-combating-of-terrorism-financing-laws-amendment-act-2025-is-your-business-ready-for-march-2026/">The Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025: Is your Business Ready for March 2026?</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Starting March 2026, the <a>Anti-Money Laundering and Combating of Terrorism Financing Laws </a>(Amendment) Act 2025 will be fully effective. This act applies to many everyday businesses, such as Betting and Mining, Professional services such as accounting, real estate and even the Public Benefit Organizations (PBOs).</p>



<p><strong>Sector Specific Compliance Obligations</strong></p>



<ol class="wp-block-list">
<li><strong>Betting, SACCOs, Retirement Schemes, Mining, Real Estate, Accounting, Legal &amp; Compliance Secretarial Services, key obligations include:</strong></li>



<li>Implement Customer Due Diligence (CDD) and customer identity verification.</li>



<li>Reporting suspicious transaction to the Financial Reporting Centre (FRC).</li>



<li>Proper recording keeping of transactions.</li>



<li>Staff training on AML/CFT risks and developing internal compliance controls.</li>
</ol>



<ul class="wp-block-list">
<li><strong>Public Benefit Organizations (PBOs):</strong></li>
</ul>



<p><em>Regulation, supervision and enforcement of compliance for AML purposes including:</em></p>



<ul class="wp-block-list">
<li>Implementing internal controls to prevent abuse of terrorism financing, including due diligence on donors and beneficiaries, record-keeping, and reporting suspicious activities.</li>



<li>Developing focused, proportionate and risk-based actions to address Terrorism Financing Risks posed by such public benefit organizations.</li>



<li>Periodically conducting an assessment of the terrorism financing risks posed to such public benefit organizations.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Dealers in Precious Metals and Dealers in precious stone, key obligations include:</strong></li>



<li>Registering as an officially reporting entity.</li>



<li>Implementing Customer Due Diligence (CDD) and customer identity verification.</li>



<li>Monitoring high value transactions including when engaging in any cash transaction with a customer equal to or above fifteen thousand US Dollars ($15000).</li>



<li>Avoiding informal trading practices that could raise red flags.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Members of Professional Bodies (ICPAK, ICPSK, Estate Agents Board, LSK), key obligations include:</strong></li>



<li>Integrating AML/CFT practices into daily operations.</li>



<li>Complying with professional body supervision requirements.</li>



<li>Preventing misuse of professional services for illicit activities.</li>
</ul>



<p><strong>If your business falls in any of the above, you need to ask:</strong></p>



<ol class="wp-block-list">
<li>Have you assessed the money-laundering and terrorism-financing risks covering you customer base, services &amp; products, geographic exposure, and transaction types and limits?</li>



<li>Are your identification, verification and screening procedures including beneficial ownership up to date? (<em>including Enhanced Due Diligence (EDD</em>))</li>



<li>Are your records properly maintained (transactions, client identities) and internal reviews for the required period?</li>



<li>Do you have documented AML/CFT policies, periodic training, framework, internal audits and a designated compliance officer?</li>



<li>Do you have procedures in place to flag and report suspicious transactions to the Financial Reporting Centre (FRC) or other competent authority?</li>



<li>Do you provide training to your staff and enforce internal controls (segregation of duties, approval thresholds, monitoring)?</li>



<li>Is senior management aware and accountable? Are there oversight procedures including sanctions, non-compliance, and escalation processes?</li>



<li>Are you prepared for regulatory inspection, peer review or audits of your compliance framework?</li>
</ol>



<p>Even businesses with internal compliance teams or Artificial Intelligence (AI) compliance systems often discover gaps only during regulator inspections, the right independent review from a consultant will not only save your business from financial and reputational risks but boost regulatory confidence.</p>



<p><strong>In addition, the Act outlines heavy fines and imprisonment as part of penalties for Non-Compliance:</strong></p>



<p><em>General Provisions (All Sectors and Reporting Institutions):</em></p>



<ul class="wp-block-list">
<li><strong>Financial fines:</strong></li>



<li>Of between Kes. 5M to Kes. 20M for legal persons and between Kes. 1M to Kes.10M for natural persons.</li>



<li>Additional penalties not exceeding one hundred thousand shillings in each case for each day or part thereof during which such violation or non-compliance continues.</li>



<li><strong>Imprisonment</strong>: financing of terrorism attracts a term not exceeding 20 years for a natural person or a fine not exceeding Kes. 20 M for a legal person.</li>
</ul>



<p>The March 2026 deadline is only four months away, being proactive reduces exposure to fines, imprisonment, and reputational risk while strengthening both investor and regulatory confidence.&nbsp; At Riskhouse International Limited, our free 30 minutes AML/CFT Health Check &amp; Independent Assessment gives you clarity on your obligations and breaks what needs to be done into practical, sector-specific obligations, whether you are a PBO, Betting or Precious Dealer. &nbsp;</p>



<p>At <strong>RISKHOUSE INTERNATIONAL</strong>, our multi-disciplinary team combines legal, risk, and compliance to provide an objective review of policies and controls, specialized guidance in ESG, Crypto, and AI governance, AML/CFT policies, access to benchmarking and best practices from multiple industries, and efficient implementation support. This allows your internal teams to focus on execution while ensuring that your governance framework is comprehensive, practical, and strategically aligned, turning policies into organizational growth.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/the-anti-money-laundering-and-combating-of-terrorism-financing-laws-amendment-act-2025-is-your-business-ready-for-march-2026/">The Anti-Money Laundering and Combating of Terrorism Financing Laws (Amendment) Act 2025: Is your Business Ready for March 2026?</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital Credit and Data Protection in Kenya</title>
		<link>https://riskhouse.co.ke/digital-credit-and-data-protection-in-kenya/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Mon, 08 Dec 2025 08:37:11 +0000</pubDate>
				<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8982</guid>

					<description><![CDATA[<p>In Kenya, the creation of digital credit apps has opened access to small-loans for many who are under-banked. However, alongside this growth have come serious concerns about misuse of personal data, unethical recovery practices, and breaches of privacy rights. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/digital-credit-and-data-protection-in-kenya/">Digital Credit and Data Protection in Kenya</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In Kenya, the creation of digital credit apps has opened access to small-loans for many who are under-banked. However, alongside this growth have come serious concerns about misuse of personal data, unethical recovery practices, and breaches of privacy rights. The combination of sensitive data collection, weak enforcement, and aggressive debt-collection tactics has made this a major consumer-protection issue.</p>



<p>Mobile/digital credit providers in Kenya have been flagged for various data protection and harassment practices:</p>



<ul class="wp-block-list">
<li>In 2022 the Office of the Data Protection Commissioner (ODPC) reported that by 30<sup>th</sup> September it had received 1,030 complaints; of those, 555 were admitted, with 299 relating to digital lenders.</li>



<li>Some lenders were found to be accessing borrowers’ phone contacts, sending messages to those contacts, sharing data with third-parties, or posting personal data of defaulters.</li>



<li>One lender, White path Company Limited (owner of several apps) was fined Kes. 5 million after about 150 complaints for mining contacts and sending unsolicited messages.</li>



<li>Another provider, Mulla Pride Ltd (apps: Ke Credit, Fair Cash) was fined Kes 2.9 million for using names/contacts obtained from third parties to shame borrowers.</li>



<li>There have been reports of apps requesting access to messages, location, calendar, contacts and then using that data for credit scoring or post-default pressure.</li>
</ul>



<p>While digital credit can promote access, many apps operate with little transparency, and misuse of personal data is widespread.</p>



<p><strong>Mechanisms of Data Collection &amp; Abuse</strong></p>



<p><strong><em>What data is collected?</em></strong></p>



<p>Many of these loan apps request wide permissions when installed:</p>



<ul class="wp-block-list">
<li>Access to contacts and call logs.</li>



<li>Access to messages, mobile money transaction history, location, calendar.</li>



<li>Some share data with third-party analytics / marketing firms or credit bureaus without clear consent.</li>
</ul>



<p><strong><em>How misuse happens</em></strong></p>



<ul class="wp-block-list">
<li>Debt-shaming tactics: Borrower defaults, app uses contact list to message friends/family of borrower, or threatening calls to contacts.</li>



<li>Unauthorized sharing of borrower data with third party debt collectors or marketing firms.</li>



<li>Lack of informed consent: Borrowers may not understand the extent of data being collected or how it’s used.</li>



<li>Unlicensed or rogue apps: Some apps operate without being properly regulated/licensed, thus operate with fewer safeguards.</li>
</ul>



<p><strong>Regulatory &amp; Legal Responses</strong></p>



<p><strong><em>Key laws &amp; rules</em></strong></p>



<ul class="wp-block-list">
<li><strong>The Data Protection Act, 2019 (Kenya)</strong> lays out rights of data subjects, obligations of data controllers/processors including breach-notification duties.</li>



<li>The <strong>Central Bank of Kenya (CBK)’s Digital Credit Providers Regulations 2021</strong>: Lenders must be licensed as Data Controllers and Processors, they must avoid unauthorised calls to contacts, must not harass borrowers, must obtain consent for third-party data sharing.</li>



<li>The ODPC has powers under Section 63 of the Data Protection Act to impose penalties for non-compliance.</li>



<li>Platform rules: Google (Play Store) updated policy in 2023, banning personal-loan apps from accessing photos/contacts unless essential.</li>
</ul>



<p><strong>What borrowers Should Do</strong></p>



<ul class="wp-block-list">
<li><strong>Check licensing</strong>: Before borrowing from a mobile-loan app, verify whether it is a licensed DCP (digital credit provider) under CBK regulations.</li>



<li><strong>Review permissions</strong>: When installing the loan app, look at what permissions you are granting (contacts, SMS, location) and whether those are reasonable for a loan-app.</li>



<li><strong>Read the privacy policy</strong>: Though often lengthy, see whether the app clearly states how your data will be used, with whom data will be shared, and what rights you have.</li>



<li><strong>Limit access</strong>: If an app is requesting access to data not clearly required (e.g., contacts, photos), you may consider declining or using a different provider.</li>



<li><strong>Protect your contacts</strong>: Be mindful of which apps have access to your address book; avoid granting unnecessary permissions when possible.</li>



<li><strong>Report abuses</strong>: If you receive harassing messages/calls from a lender or your contacts are being targeted, lodge a complaint with the ODPC.</li>



<li><strong>Budget carefully</strong>: Borrow only what you can repay, understand the interest and penalty structure, and avoid rolling over short-term apps into deeper debt.</li>
</ul>



<p><strong>Conclusion</strong></p>



<p>The rise of mobile-loan apps in Kenya has created both opportunities and risks. On one hand, they provide quick access to credit. On the other, they have been implicated in serious breaches of data protection, harassment of borrowers and misuse of contacts and device data. The regulatory framework is evolving, with enforcement actions increasingly visible, but gaps remain. Borrowers must remain vigilant, understand their rights, and take care in choosing loan apps and controlling the data they share. At <strong>RISKHOUSE INTERNATIONAL</strong>, we have a team of professionals with the expertise to offer continuous data protection training, data protection impact assessment (DPIA), data protection compliance among others. We would be happy to serve you! Contact us at <a href="mailto:info@riskhouse.co.ke">info@riskhouse.co.ke</a> .</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/digital-credit-and-data-protection-in-kenya/">Digital Credit and Data Protection in Kenya</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Emerging trends in digital forensics: A constantly evolving field</title>
		<link>https://riskhouse.co.ke/emerging-trends-in-digital-forensics-a-constantly-evolving-field/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 14:01:46 +0000</pubDate>
				<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Personal Injury]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8936</guid>

					<description><![CDATA[<p>With our increasing digital world, the field of digital forensics is evolving at an unprecedented pace. New issues and emerging trends are emerging on a daily basis, requiring investigators to up-skill and continue adapting on a continuous basis. These trends emphasize the need for professional development through regular training and acquiring relevant certifications in order to lead and catch up. This blog aims to discover and demystify the 6 biggest new digital forensics </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/emerging-trends-in-digital-forensics-a-constantly-evolving-field/">Emerging trends in digital forensics: A constantly evolving field</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>With our increasing digital world, the field of digital forensics is evolving at an unprecedented pace. New issues and emerging trends are emerging on a daily basis, requiring investigators to up-skill and continue adapting on a continuous basis. These trends emphasize the need for professional development through regular training and acquiring relevant certifications in order to lead and catch up. This blog aims to discover and demystify the 6 biggest new digital forensics trends, provide hands-on advice on how to conquer them, and outline how continuous learning and accreditation can keep examiners ahead of the curve in this ever-evolving industry.</p>



<p>With our fast-digitalizing world, the field of digital forensics is evolving quicker than ever. New trends and challenges keep surfacing, forcing investigators to acquire new skillsets and adapt daily. They stress the absolute necessity of law enforcement and intelligence in being updated on a constant basis with the emergence of new technology and solutions.</p>



<p><strong>Digital forensics is revolutionized by some significant trends, including:</strong></p>



<ol class="wp-block-list">
<li><strong>Mobile Forensics</strong></li>
</ol>



<p>Mobiles are everywhere, and they contain so much information. Mobile forensics, therefore, is a potent force that cannot be taken lightly by investigators. Leading companies like Cellebrite provide specialized tools and services for mobile data and evidence recovery and analysis. Some of the largest criminal cases determination in the world today have relied on mobile evidence and data to reach their verdicts. Refine your skills and keep yourself up to date with these technologies and learn about the various operating systems and their security controls.</p>



<ol class="wp-block-list" start="2">
<li><strong>Cloud Forensics</strong></li>
</ol>



<p>As more data is moved to the cloud, investigators must understand how to access and analyse this data as efficiently as possible. Cloud forensics entails an understanding of the layout of various cloud-based services and the implications of accessing off-premises data in the eyes of the law. Improve your expertise in this area by further refining your understanding of cloud environments and their accompanying security measures and staying abreast with the evolving legal framework surrounding access to cloud data.</p>



<ol class="wp-block-list" start="3">
<li><strong>IoT Forensics &#8211; the Internet of Things (IoT)</strong></li>
</ol>



<p>A network of connected devices ranging from smart appliances to vehicles — presents another rich data source for investigators. However, extracting and interpreting data from these devices can be complex, which I’m sure you’re familiar with. Deepen your skill by building knowledge about IoT devices, their communication protocols, and how to retrieve and analyse their data.</p>



<ol class="wp-block-list" start="4">
<li><strong>Artificial Intelligence in Forensics</strong></li>
</ol>



<p>AI arrived — and it&#8217;s all anyone can talk about. AI and machine learning are fantastic weapons that can sift through millions of data points to uncover trends and evidence human analysts might miss. Take advantage of the trend by learning more about AI and machine learning basics and how to apply the tools in your investigations to make your work even better—and faster.</p>



<ol class="wp-block-list" start="5">
<li><strong>Encryption Barriers</strong></li>
</ol>



<p>As privacy protections are strengthened, so are the barriers to accessing encrypted data. Knowledge of decryption functions and legal boundaries around encryption are most important to investigators. Stay ahead of the trend by developing expertise around ever-evolving encryption models, emerging decryption techniques, the laws of encrypted data, and the compliance laws that govern them.</p>



<ol class="wp-block-list" start="6">
<li><strong>Remote Forensics</strong></li>
</ol>



<p>The COVID-19 pandemic accelerated the movement towards remote digital forensics — and it&#8217;s not going anywhere. This entails remote access to and examination of digital evidence when in-person access to a device or network is not feasible or safe. Enhance your skillset by becoming proficient in remote access tools and methods and knowing how to preserve the integrity of digital evidence remotely. These are just some of the large trends that will shape the future of digital forensics. You may know them already, but a reminder doesn&#8217;t hurt — especially if you are not yet certified, or your certification has lapsed. Having knowledge of these trends and developing your skills will keep you in the lead. Don&#8217;t forget, in the rapidly changing digital age today, keeping abreast through continuous learning and flexibility is the way to achieve success.</p>



<p><strong>Conclusion</strong></p>



<p>The field of digital forensics continuously adapts to meet new technologies and emerging cyber threat scenarios. Keeping abreast of these emerging trends, law enforcement and intelligence agents can enhance their investigative capabilities and aid the successful closure of cases.</p>



<p>At <strong>RISKHOUSE INTERNATIONAL</strong>, we adopt a comprehensive policy of managing digital investigations. Our operations strictly adhere to the laws of Kenya specifically the constitution of Kenya 2010 and the data protection Act 2019.</p>



<p>Moreover, our experts have experience using some of the best tools in the industry and licensed forensic software.</p>



<p>In case you any query about our service or if you would like to have an idea of your matters discussed in detail with us, please contact the Business Development Team on.</p>



<p>For further information about this and to catch up on our other news and alerts you can have a look at our blog on our website at https <a href="https://rb.gy/hvxqzj">https://rb.gy/hvxqzj</a>.</p>



<p>At <strong>RISKHOUSE INTERNATIONAL</strong>, we boast of a team of expert investigators who have continually assisted clients and their legal advisors, through a mix of analysis of publicly available information, human source inquiries and overt investigations. Our team incorporates specialists in intelligence analysis, financial investigations, cyber security and legal advisory allowing us to advise and assist clients by following the proper legal channels. Please reach us on email at <a href="mailto:info@riskhouse.co.ke">info@riskhouse.co.ke</a> and phone @ 0792603759.</p>



<p>To catch up on our other news and alerts, you may visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/emerging-trends-in-digital-forensics-a-constantly-evolving-field/">Emerging trends in digital forensics: A constantly evolving field</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Anti-Bribery and Anti-Corruption Assistance</title>
		<link>https://riskhouse.co.ke/anti-bribery-and-anti-corruption-assistance/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Mon, 15 May 2023 07:58:03 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Anti bribery]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8890</guid>

					<description><![CDATA[<p>Anti-Bribery and Anti-Corruption Assistance Occupational fraud typologies highlight different forms of fraud, one of which is corruption. Business corruption is categorized as the second most common type of occupational fraud, with the primary examples being bribery, conflict of interest, improper gratuities, and economic extortion. Bribery and corruption pose significant risks to organizations as they may [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/anti-bribery-and-anti-corruption-assistance/">Anti-Bribery and Anti-Corruption Assistance</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong>Anti-Bribery and Anti-Corruption Assistance</strong></h4>
<p>Occupational fraud typologies highlight different forms of fraud, one of which is corruption. Business corruption is categorized as the second most common type of occupational fraud, with the primary examples being bribery, conflict of interest, improper gratuities, and economic extortion. Bribery and corruption pose significant risks to organizations as they may be subjected to legal, regulatory, and reputational damage. Additionally, a history of corruption can constitute a reputational risk that if not mitigated, may drive away investors, partners, clients, and future employees.</p>
<p>Therefore, zero tolerance for bribery and corruption is essential as it ensures sustainability and business integrity in any organization. Organizations should have robust policies, procedures, and programs to mitigate bribery and corruption risks. Organizations should also train and educate stakeholders to increase their understanding and awareness. An effective Anti-Bribery and Anti-Corruption program should lay focus on the following key areas: &#8211;</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Top management commitment</strong> – this entails tone at the top and senior management commitment to upholding ethical conduct and integrity.</li>
<li><strong>Risk Assessment</strong> – this entails assessments and subsequent assessments of the organization’s bribery and corruption risks.</li>
<li><strong>Proportionate Procedures</strong> – this involves developing procedures based on risk assessment and ensuring that there is an investigation procedure in place.</li>
<li><strong>Training and Information Communication</strong> – this involves training all levels of employees on whistleblowing and mechanisms of reporting bribery and corruption.</li>
<li><strong>Due Diligence</strong> – this involves applying appropriate due diligence procedures to third parties including name screening, integrity, and corruption checks.</li>
<li><strong>Monitoring and Review</strong> – this involves a continuous evaluation and validation of anti-bribery and anti-corruption programs.</li>
</ul>
</li>
</ul>
<p>At <strong>Riskhouse International</strong>, we help organizations spanning multiple jurisdictions to define, assess and respond to bribery and corruption issues. Further, we help organizations identify gaps and provide recommendations for mitigating bribery and corruption risks. We also support organizations with comprehensive Anti-Bribery &amp; Anti-corruption (ABAC) reviews, reviews of the existing relevant legislation, review of the existing policies and procedures, conducting transactions reviews and verifications of third parties.</p>
<p>To learn more about this and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/anti-bribery-and-anti-corruption-assistance/">Anti-Bribery and Anti-Corruption Assistance</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat detection spectrum and advanced threat hunting.</title>
		<link>https://riskhouse.co.ke/threat-detection-spectrum-and-advanced-threat-hunting/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Thu, 04 May 2023 05:53:49 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Threat detection spectrum]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8885</guid>

					<description><![CDATA[<p>Threat detection spectrum and advanced threat hunting. A network environment can be defined as a communications system that ties multiple users together. In such an environment, there is a need to establish control measures to detect advanced threats in the network. The security mechanism measures should identify the threat’s movement in, out, and laterally within [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/threat-detection-spectrum-and-advanced-threat-hunting/">Threat detection spectrum and advanced threat hunting.</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong>Threat detection spectrum and advanced threat hunting.</strong></h4>
<p>A network environment can be defined as a communications system that ties multiple users together. In such an environment, there is a need to establish control measures to detect advanced threats in the network. The security mechanism measures should identify the threat’s movement in, out, and laterally within the environment.</p>
<p>There is a need to establish a network detection response (NDR) that can identify and allow rapid and efficient response to threat incidents and analyze the network traffic matrix. This will enable the identification of zero-day exploits and unknown unidentified threats to enhance advanced security threat hunting and detection capabilities.</p>
<p>The organization should embrace the following practices to prevent the threats: &#8211;</p>
<ol>
<li>Human expertise &#8211; security experts should have the ability to observe and act on incidents for the purpose of preventing major damages the business may encounter.</li>
<li>An automated response &#8211; there is a need for integration and automation of security appliances to be capable of taking actions to block and mitigate potential threats as they are detected. This can be done by automatically blocking traffic from active IP addresses that are identified as known threats.</li>
<li>Artificial Intelligence/ Threat Intelligence – this is the integration of network devices and other applications by use of intelligence that feeds up-to-date information on known threats and cybercrime attackers on a network.</li>
</ol>
<p>At Riskhouse International, we assist the management and organizations to develop policies and standards that assess security control measures and embrace a healthy network environment. To learn more about this service and to catch up on our updates and alerts you can visit our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke</a>.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/threat-detection-spectrum-and-advanced-threat-hunting/">Threat detection spectrum and advanced threat hunting.</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Customer Due Diligence is Necessary in Combating Money Laundering</title>
		<link>https://riskhouse.co.ke/why-customer-due-diligence-is-necessary-in-combating-money-laundering/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Tue, 25 Apr 2023 09:18:45 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[Financial]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8879</guid>

					<description><![CDATA[<p>Customer Due Diligence (CDD) is the process of verifying the identity of customers before establishing a business relationship with them as well as assessing their risk level. CDD assists businesses to manage risks of financial crime which include money laundering and terrorist financing. Criminals launder money mainly using the financial system to transfer funds. Financial [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/why-customer-due-diligence-is-necessary-in-combating-money-laundering/">Why Customer Due Diligence is Necessary in Combating Money Laundering</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Customer Due Diligence (CDD) is the process of verifying the identity of customers before establishing a business relationship with them as well as assessing their risk level. CDD assists businesses to manage risks of financial crime which include money laundering and terrorist financing.</p>
<p>Criminals launder money mainly using the financial system to transfer funds. Financial institutions, especially banks, are most vulnerable to abuse for laundering purposes. To protect themselves, financial institutions must have adequate controls and procedures in place that enable them to know the person whom they are dealing with. Enhanced due diligence on new and existing customers is a key part of these controls.</p>
<p>The application of thorough Customer Due Diligence (CDD) measures by financial institutions and a high degree of transparency is crucial to fight money laundering and the financing of terrorism effectively. Customer Due Diligence should be applied upon the establishment of a business relationship. Enhanced Due Diligence should also be applied where there is a receipt of a significant cash amount above normal threshold receipts. Customer Due Diligence measures should also be applied whenever financial institutions suspect money laundering or terrorist financing activities.</p>
<p><strong>The Legal Framework for Customer Due Diligence in Kenya.</strong></p>
<p>In Kenya, CDD is a legal requirement under the Proceeds of Crime and Anti-money Laundering Regulations, 2013. Under the regulations, reporting institutions which include banks, insurance companies, and microfinance institutions must undertake due diligence procedures before establishing a business relationship.</p>
<p>Specifically, institutions are required to identify customers using independent source documents, data, or information, verify the identity of beneficial owners and conduct ongoing due diligence on the business relationship to ensure that transactions being undertaken are consistent with the financial institution’s knowledge of the customer, their business and risk profile.</p>
<p><strong>Importance of Customer Due Diligence for Financial Institutions in Kenya</strong></p>
<p>One of the key benefits of conducting customer due diligence is the protection of the institution against reputational risk. Another benefit is the maintenance of customer trust. Lastly, CDD ensures the avoidance of regulatory fines and penalties. In Kenya, a reporting institution that contravenes the provisions of the regulations commits an offence and is liable to a fine not exceeding five million Kenya shillings or imprisonment for a term not exceeding three years or both.</p>
<p><strong>Riskhouse International Limited</strong> assists organizations to examine the effectiveness of their Anti-money laundering and Combating Financial Terrorism programs by offering AML/CFT Health Checks, KYC Diligence, Screening, and Remediation, AML/CFT Analytics, Monitoring, and Investigation, and AML/CFT Training and Awareness.</p>
<p>To learn more about this and to catch up on our other news and alerts you can visit our blog on our website at <a href="https://riskhouse.co.ke/blog/">https://riskhouse.co.ke/blog/</a></p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/why-customer-due-diligence-is-necessary-in-combating-money-laundering/">Why Customer Due Diligence is Necessary in Combating Money Laundering</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
