ANTI-MONEY LAUNDERING (AML) POLICY

“Money laundering” is the practice of engaging in a series of financial transactions to conceal the ownership, source, control or destination of illegally gained money. Ultimately, it is the process by which the proceeds of crime are made to appear to have a legitimate origin. RhoKIT and our technology partner, CoralCommerce, are committed to preventing money laundering through our service and compliance procedures.

Implemented Procedures

RhoKIT aims at implementing strict anti-laundering policies to ensure that customers will be identified for any suspicious transactions. At the same time we will minimise the procedural complications for genuine and legitimate customers.

In order to fulfil commitments to provide full assistance to government agencies combating illegal financial transactions, RhoKIT has developed a technologically advanced and reliable electronic verification system which authenticates clients and is also able to store detailed records of all previous financial transactions.

RhoKIT is obliged to report suspicious transactions. By misusing the service you may face criminal prosecution as we are bound to automatically report such behaviour to the authorities. To discourage money laundering and related illegal activities, RhoKIT does not accept any cash transactions.

RhoKIT reserves the right to suspend or refuse to process a transaction at any stage, where it believes the transaction to be connected in any way to money laundering or criminal activity. In accordance with international law RhoKIT is not obliged to inform the Client that it has reported the Client’s suspicious activity to the relevant compliance regime.

RhoKIT will establish a compliance regime in order to fulfill its formal legal requirement. It will entail the appointment of a compliance officer responsible for policy making, and regular review of the AML policy implementation including internal procedures and those of delivery partners.

RhoKIT is also committed to regularly updating its electronic system for inspection of suspicious transactions and for verification of client identification records, in accordance with any new regulations as they are promulgated, as well as providing training for its employees on enhancements to anti-money laundering procedures that may be required by new regulations.

RhoKIT and Affiliates adhere to the Central Bank of Kenya (CBK), Capital Markets Authority (CMA), and the Financial Reporting Centre (FRC) rules, in addition to UK Office of Financial Assets Control (OFAC) regulations.

Additional Disclosure Regarding Deposits and Withdrawals

In the event of money transfers from the mobile money platforms, the sender name must match the name of the customer present in RhoKIT’s records. No third-party transfers are allowed in this case.

Similarly in case of money withdrawal, recipient name must match the name of account holder who is transferring the money.

If you wish to make a complaint, contact our Customer Support immediately. All complaints should be notified to us as soon as possible. You must also provide your User ID in the subject title of your email for all complaints for ease of referencing and facilitate swift fulfillment.

We have no product or services for children and our products are gateway protected.

RhoKIT is committed to fully complying with the Children’s Online Privacy Protection Act (COPPA) of 1998. According to which, it is necessary for us to obtain parental permission for all children under the age of 13 to register as a member, or sign up for any email newsletters in sites that we might create or manage.

We will not knowingly accept any information of minors under the age of 18 on behalf of our clients and will take all reasonable steps to prevent this process from being subverted.

  1. Introduction

This policy document encompasses all aspects of security surrounding confidential RhoKIT information and must be distributed to all RhoKIT employees.

All RhoKIT employees must read this document in its entirety and sign the form confirming they have read and understand this policy fully.

This document will be reviewed and updated by management on an annual basis or when relevant to include newly developed security standards into the policy and distribute it all employees and contracts as applicable

  1. Information Security Policy

RhoKIT does not handle sensitive cardholder information on any basis.

RhoKIT requires no access and has no access to cardholder data.

RhoKIT handles sensitive merchant information daily, including but not limited to the following: know your customer information (KYC), certified copies of utility bills and passports, merchant financial information and merchant financial results.

Sensitive Information must have adequate safeguards in place to protect it, to protect merchant privacy, to ensure compliance with various regulations and to guard the future of the organisation. RhoKIT commits to respecting the privacy of all its customers and to protecting any data about customers from outside parties.

To this end management are committed to maintaining a secure environment in which to process information so that we can meet these customer and other stakeholder promises.

Employees handling sensitive data should ensure to proactively practice the following:

  • Handle information in a manner that fits with its sensitivity
  • Limit personal use of RhoKIT information and telecommunication systems and ensure such use does not interfere with your job performance
  • RhoKIT reserves the right to monitor, access, review, audit, copy, store, or delete any electronic communications, equipment, systems and network traffic for any purpose
  • Do not use email, internet and other RhoKIT resources to engage in any action that is offensive, threatening, discriminatory, defamatory, slanderous, pornographic, obscene, harassing or illegal;
  • Do not disclose personal or any RhoKIT personnel information unless authorised
  • Protect sensitive information
  • Keep passwords and accounts secure
  • Request approval from management prior to establishing any new software or hardware, third party  connections, etc.
  • Do not install unauthorised software or hardware, including modems and wireless access unless you have explicit management approval
  • Always leave desks clear of sensitive data and lock computer screens when unattended
  • Information security incidents must be reported, without delay, to the individual responsible for your locality for incident responses
  • We each have a responsibility for ensuring our RhoKIT systems and data are protected from unauthorised access and improper use
  • If you are unclear about any of the policies detailed herein you should seek advice and guidance from your line manager
  • RhoKIT does not handle sensitive cardholder information on any basis
  • RhoKIT requires no and has no access to cardholder data
  1. Acceptable Use Policy

The Management’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to RhoKIT’s established culture of openness, trust and integrity.

Management is committed to protecting the employees, partners and RhoKIT from illegal or damaging actions by individuals, either knowingly or unknowingly.

RhoKIT does not manage, maintain, supply, offer, sell, handle, service, repair or deal in any way with Point of Sale (POS) devices and Personal Identification Number (PIN) entry devices.

RhoKIT will maintain an approved list of technologies and devices and personnel with access to such devices as detailed in Appendix B.  In addition:

  • Employees are responsible for exercising good judgement regarding the reasonableness of personal use
  • Employees should ensure that they have appropriate credentials and are authenticated for the use of technologies
  • Employees should take all necessary steps to prevent unauthorised access to confidential data which includes their own personal data
  • Employees should ensure that technologies are set-up, started and used in acceptable network locations
  • Keep passwords secure and do not share accounts unless as explicitly permitted
  • Authorised users are responsible for the security of their passwords and accounts
  • All PCs, laptops and workstations should be secured with a password protected screen saver with the automatic activation feature at most after 5 minutes
  • All POS and PIN entry devices should be appropriately protected and secured so they cannot be tampered or altered
  • Because information contained on portable computers is especially vulnerable, special care should be exercised with both password protection and safe handling of equipment
  • Postings by employees from a RhoKIT email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of the RhoKIT, unless posting is in the course of business duties
  • Employees must use extreme caution when opening email attachments received from unknown senders which may contain viruses, e-mail bombs, or Trojan horse code

RhoKIT does not manage, maintain, supply, offer, sell, handle, service, repair or deal in any way with any POS devices and PIN entry devices.

  1. Disciplinary Action

Violation of the standards, policies and procedures presented in this document by an employee will result in disciplinary action, from warnings or reprimands up to and including termination of employment.

Claims of ignorance, negligence, good intentions or poor judgement will not be used as excuses for non-compliance.

  1. Protect Stored Data
  • All sensitive data stored and handled by RhoKIT and its employees must be securely protected against unauthorised use at all times
  • Any sensitive data that is no longer required by RhoKIT for business reasons must be discarded in a secure and irrecoverable manner
  • If there is no specific need to see the full Permanent Account Number (PAN), it has to be masked when displayed
  • PAN’S which are not protected as stated above should not be sent to an outside network via end-to-end user messaging technologies like chats, WhatsApp, ICQ messenger, etc.
  • It is strictly prohibited to possess and store for any reason:

o   The contents of the payment card magnetic stripe (track data) on any media whatsoever

o   The CVV/CVC (the 3 or 4 digit number on the signature panel, or on the reverse of the payment card) on any media whatsoever

o   The PIN or the encrypted PIN Block under any circumstance

  1. Information Classification

Data and media containing data must always be labelled to indicate sensitivity level

  • Confidential data might include information assets for which there are legal requirements for preventing disclosure or financial penalties for disclosure, or data that would cause severe damage to RhoKIT if disclosed or modified
  • Confidential data includes merchant data
  • Internal Use data might include information that the data owner feels should be protected to prevent unauthorised disclosure
  • Public data is information that may be freely disseminated
  1. Access to the Sensitive Cardholder Data

Payment Card Industry Data Security Standard (PCI-DSS)

  • RhoKIT requires no access and has no access to cardholder data
  • If RhoKIT were in the future duly authorised and fully PCI-DSS compliant, then the following would apply:

o   All Access to sensitive cardholder data should be controlled and authorised. Any Job functions that require access to cardholder data should be clearly defined

o   Any display of the cardholder should be restricted at a minimum of the first 6 and the last 4 digits of the cardholder data

o   Access rights to privileged User ID should be restricted to least privileges necessary to perform job responsibilities

o   Privileges should be assigned to individuals based on job classification and function (Role based access control)

o   Access to sensitive cardholder information such as PANs, personal information and business data is restricted to employees that have a legitimate need to view such information

o   No other employees should have access to this confidential data unless they have a genuine business need

o   If cardholder data is shared with a Service Provider (third party) then a list of such Service Providers will be maintained as detailed in Appendix B

o   Ensure a written agreement that includes an acknowledgement is in place that the Service Provider will be responsible for the cardholder data that the Service Provider possess

o   Ensure that a there is an established process including proper due diligence is in place before engaging with a Service Provider

o   Have a process in place to monitor the PCI DSS compliance status of the Service Provider

o   RhoKIT requires no access and has no access to cardholder data

If RhoKIT were in future duly authorised and fully PCI-DSS compliant, then the above paragraph 7 would apply.

  1. Physical Security
  • RhoKIT does not manage, maintain, supply, offer, sell, handle, service, repair or deal in any way with any POS devices nor PIN entry devices
  • Access to sensitive information in both hard and soft media format must be physically restricted to prevent unauthorised individuals from obtaining sensitive data
  • Employees are responsible for exercising good judgement regarding the reasonableness of personal use
  • Employees should ensure that they have appropriate credentials and are authenticated for the use of technologies
  • Employees should take all necessary steps to prevent unauthorised access to confidential data which includes merchant data
  • Employees should ensure that technologies should be set-up, started and used in acceptable network locations
  • A list of devices that accept data should be maintained:

o   The list should include make, model and location of the device

o   The list should have the serial number or a unique identifier of the device

o   The list should be updated when devices are added, removed or relocated

  • POS device surfaces should be periodically inspected to detect tampering or substitution
  • Personnel using the devices should be trained and aware of handling procedures of POS devices
  • Personnel using the devices should verify the identity of any third party personnel claiming to repair or run maintenance tasks on the devices, install new devices or replace existing devices
  • Personnel using the devices should be trained to report suspicious behaviour and indications of tampering of the devices to the appropriate personnel
  • A Visitor, further defined below, is a vendor, guest of an employee, service personnel, or anyone who needs to enter the premises for a short duration, usually not more than one day.  Guests should be declared at least 24 hours in advance to undergo required security checks as needed
  • Visitors and RhoKIT personnel including employees and consultants should keep passwords secure and at no time share accounts
  • Visitors must always be escorted by a trusted employee when in areas that hold sensitive information
  • Procedures must be in place to help all personnel easily distinguish between employees and Visitors, especially in areas where sensitive data is accessible

o   An Employee refers to full-time and part-time employees, temporary employees and personnel, and consultants who are permanently based on RhoKIT sites

o   A Visitor is defined as a vendor, guest of an employee, service personnel, or anyone who needs to enter the premises for a short duration, usually not more than one day

  • Authorised users are responsible for the security of their passwords and accounts as well as to other personnel to whom they delegated authorities, as permitted by management
  • Media is defined as any printed or handwritten paper, received faxes, floppy disks, back-up tapes, computer hard drive, etc by an Employee or Visitor
  • Media containing sensitive information must be handled and distributed in a secure manner by trusted individuals
  • Network jacks located in public and areas accessible to visitors must be disabled and enabled when network access is explicitly authorised
  • All POS and PIN entry devices should be appropriately protected and secured so they cannot be tampered or altered
  • Strict control is maintained over the external or internal distribution of any media containing data and has to be approved by management
  • Strict control is maintained over the storage and accessibility of media
  • All computers that store sensitive data must have a password protected screen saver enabled to prevent unauthorised use
  • RhoKIT does not manage, maintain, supply, offer, sell, handle, service, repair or deal in any way with any POS devices and PIN entry devices
  1. Protect Data in Transit
  • All sensitive data must be protected securely if it is to be transported physically or electronically
  • Data must never be sent over the internet via email, instant chat or any other end user technologies unless explicitly prescribed by management
  • If there is a business justification to send data via email or via the internet or any other modes then it should be done after authorization and by using a strong encryption mechanism (e.g. AES encryption, PGP encryption, SSH, SSL, TLS, IPSEC, GSM, GPRS, Wireless technologies etc.)
  • The transportation of media containing sensitive data to another location must be authorised by management, logged and inventoried before leaving the premises. Only secure courier services may be used for the transportation of such physical media. The status of the shipment should be monitored until it has been delivered to its new location (such as a tracking number) and verified by the recipients in writing
  1. Disposal of Stored Data
  • All data must be securely disposed of when no longer required by RhoKIT, regardless of the media or application type on which it is stored
  • An automatic process must exist to permanently delete on-line data, when no longer required
  • All hard copies of data must be manually destroyed as when no longer required for valid and justified business reasons. A quarterly process must be in place to confirm that all non-electronic data has been appropriately disposed of in a timely manner
  • RhoKIT will have procedures for the destruction of hard copy (paper) materials. These will require that all hard copy materials are cross-cut shredded, incinerated or pulped so they cannot be reconstructed
  • RhoKIT will have documented procedures for the destruction of electronic media. These will require:

o   All data on electronic media must be rendered unrecoverable when deleted e.g. through degaussing or electronically wiped using military grade secure deletion processes or the physical destruction of the media

o   If secure wipe programs are used, the process must define the industry accepted standards followed for secure deletion

o   All data awaiting destruction must be held in lockable storage containers clearly marked To Be Shredded.  Access to these containers must be restricted

  1. Security Awareness and Procedures
  • The policies and procedures outlined below must be incorporated into RhoKIT practice to maintain a high level of security awareness. The protection of sensitive data demands regular training of all employees and contractors:

o   Review handling procedures for sensitive information and hold periodic security awareness meetings to incorporate these procedures into day to day RhoKIT practice

o   Distribute this security policy document to all RhoKIT employees to read. It is required that all employees confirm that they understand the content of this security policy document by signing an acknowledgement form (see Appendix A)

o   All employees that handle sensitive data will undergo background checks (such as criminal and credit record checks, within the limits of the local law) before they commence their employment with the RhoKIT

o   All third parties with access to credit card account numbers are contractually obligated to comply with card association security standards (PCI/DSS)

  • RhoKIT security policies must be reviewed annually and updated as needed
  1. Network Security and Firewalls
  • Firewalls must be implemented at each internet connection and any external or Visitors zone with the internal RhoKIT network
  • A network diagram detailing all the inbound and outbound connections must be maintained and reviewed every 6 months
  • A firewall and router configuration document must be maintained which includes a documented list of services, protocols and ports including a business justification
  • Firewall and router configurations must restrict connections between untrusted networks and any systems in the data environment.
  • Stateful Firewall technology must be implemented where the internet enters RhoKIT network to mitigate known and on-going threats. Firewalls must also be implemented to protect local network segments and the information technology resources attached to those segments such as the business network, and open network
  • All inbound and outbound traffic must be restricted to that which is required for the data environment
  • All inbound network traffic is blocked by default, unless explicitly allowed and the restrictions have to be documented.
  • All outbound traffic has to be authorised by management (e.g. what are the white listed category of sites that can be visited by the employees) and the restrictions have to be documented
  • RhoKIT will have firewalls between any wireless networks and the data environment
  • RhoKIT will quarantine wireless users into a Visotors Zone (or De-militarised Zone DMZ, in LAN parlance), where they will be authenticated and fire walled as if they were coming in from the internet
  • Disclosure of private IP addresses to external entities must be authorised
  • A topology of the firewall environment has to be documented and has to be updated in accordance to the changes in the network
  • The firewall rules will be reviewed on a six month basis to ensure validity and the firewall is to have a clean up rule at the bottom of the rule base
  • RhoKIT has to quarantine wireless users into a DMZ, where they were authenticated and fire walled as if they were coming in from the internet
  • No direct connections from the internet to the data environment will be permitted. All traffic has to traverse through a firewall
  1. System and Password Policy
  • All users, including contractors and vendors with access to RhoKIT systems, are responsible for taking the appropriate steps, as outlined below, to select and secure their passwords
  • A system configuration standard must be developed along industry accepted hardening standards (SANS, NIST, ISO)
  • System configurations should be updated as new issues are identified (as defined in PCI-DSS requirement 6.1)
  • System configurations must include common security parameter settings
  • The systems configuration standard should be applied to any news systems configured
  • All vendor default accounts and passwords for the systems have to be changed at the time of provisioning the system/device into RhoKIT network and all unnecessary services and user/system accounts have to be disabled
  • All unnecessary default accounts must be removed or disabled before installing a system on the network
  • Security parameter settings must be set appropriately on all system components
  • All unnecessary functionality (scripts, drivers, features, subsystems, file systems, web servers etc.) must be removed
  • All unnecessary services, protocols, daemons etc., should be disabled if not in use by the system
  • Any insecure protocols, daemons, services in use must be documented and justified
  • All users with access to data must have a unique ID (User Id)
  • All users must use a password to access RhoKIT network or any other electronic resources
  • All User ID’s for terminated users must be deactivated or removed immediately
  • Any User ID will be locked out if there are more than 3 unsuccessful attempts. A locked out account can only be enabled by the system administrator. Locked out user accounts will be disabled for a minimum period of 30 minutes or until the administrator enables the account
  • All system and user level passwords must be changed on at least a quarterly basis
  • A minimum password history of four must be implemented
  • A unique password must be set-up for new users and the users prompted to change the password on first login
  • Group, shared or generic user account or password or other authentication methods must not be used to administer any system components
  • Where SNMP is used, the community strings must be defined as something other than the Standard defaults of “public,” “private” and “system” and must be different from the passwords used to log in interactively
  • All non-console administrative access will use appropriate technologies like SSH, VPN, SSL etc. or strong encryption is invoked before the administrator password is requested
  • System services and parameters will be configured to prevent the use of insecure technologies like Telnet and other insecure remote login commands
  • Administrator access to web based management interfaces is encrypted using strong cryptography
  • The responsibility of selecting a password that is hard to guess generally falls to users. A strong password must:

o   Be as long as possible (never shorter than 6 characters)

o   Include mixed-case letters, if possible

o   Include digits, syntax and punctuation marks, if possible

o   Not be based on any personal information

o   Not be based on any dictionary word, in any language

  • If an operating system other than Linux and FreeBSD without embedded security features is used (such as DOS, Windows or MacOS), then an intruder only needs temporary physical access to the console to insert a keyboard monitor program. If the workstation is not physically secured, then an intruder can reboot even a secure operating system, restart the workstation from his own media, and insert the offending program
  • To protect against network analysis attacks, both the workstation and server should be cryptographically secured. Examples of strong protocols are the encrypted Netware login and Kerberos
  1. Anti-Virus Policy
  • All machines must be configured to run the latest anti-virus software as approved by RhoKIT. The preferred applications to use include CLAMAV, SOPHOS & COMODO Anti-Virus software, which must be configured to retrieve the latest updates to the antiviral program automatically on a daily basis. The Anti-Virus should have periodic scanning enabled for all the systems
  • The Anti-Virus software in use should be capable of detecting all known types of malicious software (Viruses, Trojans, adware, spyware, worms and rootkits)
  • All removable media (for example USB thumb drives and others) should be scanned for viruses before being used
  • All the logs generated from the Anti-Virus solutions have to be retained as per legal, regulatory, and contractual requirements or at a minimum of PCI DSS requirement 10.7 of 3 months online and 1 year offline
  • Master installations of the Anti-Virus software should be set-up for automatic updates and periodic scans
  • End users must not be able to modify any settings or alter the Anti-Virus software
  • Email with attachments coming from suspicious or unknown sources should not be opened. All such emails and their attachments should be deleted from the mail system as well as from the trash bin. No one should forward any email, which they suspect may contain a virus or other malicious software.
  1. Patch Management Policy
  • All workstations, servers, software, system components etc. owned by RhoKIT must have up-to-date system security patches installed to protect the asset from known vulnerabilities
  • Wherever possible all systems, software must have automatic updates enabled for system patches released from their respective vendors
  • Security patches have to be installed within one month of release from the respective vendor and have to follow the process in accordance with the change control process
  • Any exceptions to this process have to be documented.
  1. Remote Access Policy
  • It is the responsibility of RhoKIT employees, contractors, vendors and agents with remote access privileges to RhoKIT corporate network to ensure that their remote access connection is given the same consideration as the user’s on-site connection to RhoKIT
  • Secure remote access must be strictly controlled. Control will be enforced by two factor authentication via one-time password authentication or public/private keys with strong pass-phrases
  • Vendor accounts with access to RhoKIT network will only be enabled during the time period the access is required and will be disabled or removed once access is no longer required
  • Remote access connection will be set-up to be disconnected automatically after 30 minutes or less of inactivity
  • All hosts that are connected to RhoKIT internal networks via remote access technologies will be monitored on a regular basis
  • All remote access accounts used by vendors or third parties will be reconciled at regular interviews and the accounts will be revoked if there is no further business justification
  • Vendor accounts with access to RhoKIT network will only be enabled during the time period the access is required and will be disabled or removed once access is no longer required
  1. Vulnerability Management Policy
  • All the vulnerabilities would be assigned a risk ranking such as High, Medium and Low based on industry best practices such as CVSS base score
  • As part of the PCI-DSS Compliance requirements, RhoKIT will run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades)
  • Quarterly internal vulnerability scans must be performed by RhoKIT by internal staff or a third party vendor and the scan process has to include that rescans will be done until passing results are obtained, or all High vulnerabilities as defined in PCI-DSS Requirement 6.2 are resolved
  • Quarterly external vulnerability scans must be performed by an Approved Scanning Vendor (ASV) qualified by the PCI Security Standards Council, PCI-SSC. Scans conducted after network changes may be performed by RhoKIT internal staff. The scan process should include re-scans until passing results are obtained
  1. Configuration Standards
  • Information systems that process, transmit or store data must be configured in accordance with the applicable standard for that class of device or system. Standards must be written and maintained by the team responsible for the management of the system in conjunction with the Information Security Office
  • All network device configurations must adhere to RhoKIT required standards before being placed on the network as specified in RhoKIT configuration guide. Using this guide, a boilerplate configuration has been created that will be applied to all network devices before being placed on the network.
  • Before being deployed into production, a system must be certified to meet the applicable configuration standard
  • Updates to network device operating system and/or configuration settings that fall under RhoKIT standards are announced by the Information Security Office. Updates must be applied within the time frame identified by the Information Security Office
  • Administrators of network devices that do not adhere to RhoKIT standards (as identified via a previous exception) must document and follow a review process of announced vendor updates to operating system and/or configuration settings. This process must include a review schedule, risk analysis method and update method
  • All network device configurations must be checked annually against the configuration boilerplate to ensure the configuration continues to meet required standards
  • Where possible, network configuration management software will be used to automate the process of confirming adherence to the boilerplate configuration
  • For other devices an audit will be performed quarterly to compare the boilerplate configuration to the configuration currently in place
  • All discrepancies will be evaluated and remediated by Network Administration
  1. Change Control Process
  • Changes to information resources shall be managed and executed according to a formal change control process. The control process will ensure that changes proposed are reviewed, authorised, tested, implemented, and released in a controlled manner; and that the status of each proposed change is monitored
  • The change control process shall be formally defined and documented. A change control process shall be in place to control changes to all critical RhoKIT information resources (such as hardware, software, system documentation and operating procedures). This documented process shall include management responsibilities and procedures. Wherever practicable, operational and application change control procedures should be integrated
  • All change requests shall be logged whether approved or rejected on a standardised and central system. The approval of all change requests and the results thereof shall be documented
  • A documented audit trail, maintained at a Business Unit Level, containing relevant information shall be maintained at all times. This should include change request documentation, change authorisation and the outcome of the change. No single person should be able to effect changes to production information systems without the approval of other authorised personnel
  • A risk assessment shall be performed for all changes and depending on the outcome, an impact assessment should be performed
  • The impact assessment shall include the potential effect on other information resources and potential cost implications. The impact assessment should, where applicable, consider compliance with legislative requirements and standards
  • All change requests shall be prioritised in terms of benefits, urgency, effort required and potential impact on operations
  • Changes shall be tested in an isolated, controlled, and representative environment (where such an environment is feasible) prior to implementation to minimise the effect on the relevant business process, to assess its impact on operations and security and to verify that only intended and approved changes were made
  • Any software change and/or update shall be controlled with version control. Older versions shall be retained in accordance with corporate retention and storage management policies
  • All changes shall be approved prior to implementation. Approval of changes shall be based on formal acceptance criteria (e.g. the change request was done by an authorised user, the impact assessment was performed and proposed changes were tested)
  • All users, significantly affected by a change, shall be notified of the change. The user representative shall sign-off on the change. Users shall be required to make submissions and comment prior to the acceptance of the change
  • Implementation will only be undertaken after appropriate testing and approval by stakeholders. All major changes shall be treated as new system implementation and shall be established as a project. Major changes will be classified according to effort required to develop and implement said changes
  • Procedures for aborting and recovering from unsuccessful changes shall be documented. Should the outcome of a change be different to the expected result (as identified in the testing of the change), procedures and responsibilities shall be noted for the recovery and continuity of the affected areas
  • Fall back procedures will be in place to ensure systems can revert back to what they were prior to implementation of changes
  • Information resources documentation shall be updated on the completion of each change and old documentation shall be archived or disposed of as per the documentation and data retention policies
  • Specific procedures to ensure the proper control, authorisation, and documentation of emergency changes shall be in place. Specific parameters will be defined as a standard for classifying changes as Emergency changes
  • All changes will be monitored once they have been rolled-out to the production environment. Deviations from design specifications and test results will be documented and escalated to the solution owner for ratification
  1. Audit And Log Review

This procedure covers all logs generated for systems within the data environment, based on the flow of data over the RhoKIT network, including the following components:

  • Operating System Logs (Event Logs and other logs)
  • Database Audit Logs
  • Firewalls & Network Switch Logs
  • IDS Logs
  • Anti-Virus Logs
  • CCTV Video recordings
  • File integrity monitoring system logs
  • Audit Logs must be maintained for a minimum of 3 months online (available for immediate analysis) and 12 months offline
  • Review of logs is to be carried out by means of the RhoKIT network monitoring system (RhoKIT to define hostname), which is controlled from the RhoKIT console. (The console is installed on the server located within the RhoKIT data centre environment.)
  • The following personnel are the only people permitted to access log files (RhoKIT to define which individuals have a job-related need to view audit trails and access log files)
  • The network monitoring system software configured to alert the RhoKIT Chief Information Security Officer (CISO) to any conditions deemed to be potentially suspicious, for further investigation

Alerts are configured to:

  • A dashboard browser-based interface, monitored by the RhoKIT CISO
  • Email / SMS alerts to RhoKIT tech mailbox with a summary of the incident. The RhoKIT CISO also receives details of email alerts for informational purposes
  • The following Operating System Events are configured for logging, and are monitored by the console:

o   Any additions, modifications or deletions of user accounts

o   Any failed or unauthorised attempt at user logon

o   Any modification to system files

o   Any access to the server, or application running on the server, including files that hold data.

o   Actions taken by any individual with root or administrative privileges

o   Any user access to audit trails

o   Any creation / deletion of system-level objects installed by Linux. (No system-level objects run with administrator privileges, none can be abused to gain administrator access to a system

The following Database System Events are configured for logging, and are monitored by the network monitoring system :

  • Any failed user access attempts to log in to the database
  • Any login that has been added or removed as a database user to a database
  • Any login that has been added or removed from a role
  • Any database role that has been added or removed from a database
  • Any password that has been changed for an application role
  • Any database that has been created, altered, or dropped
  • Any database object, such as a schema, to which the system has been connected
  • Actions taken by any individual with Database Administrator (DBA) privileges.

The following Firewall Events are configured for logging, and are monitored by the network monitoring system :

  • ACL violations
  • Invalid user authentication attempts
  • Logon and actions taken by any individual using privileged accounts
  • Configuration changes made to the firewall (e.g. policies disabled, added, deleted, or modified)
  • The following Switch Events are to be configured for logging and monitored by the network monitoring system:

o   Invalid user authentication attempts

o   Logon and actions taken by any individual using privileged accounts

o   Configuration changes made to the switch (e.g. configuration disabled, added, deleted, or modified)

The following Intrusion Detection Events are to be configured for logging, and are monitored by the network monitoring system:

  • Any vulnerability listed in the Common Vulnerability Entry (CVE) database
  • Any generic attack(s) not listed in CVE
  • Any known denial of service attack(s)
  • Any traffic patterns that indicated pre-attack reconnaissance occurred
  • Any attempts to exploit security-related configuration errors
  • Any authentication failure(s) that might indicate an attack
  • Any traffic to or from a back-door program
  • Any traffic typical of known stealth attacks

The following File Integrity Events are to be configured for logging and monitored by (RhoKIT to define software and hostname):

  • Any modification to system files
  • Actions taken by any individual with Administrative privileges
  • Any user access to audit trails
  • Any creation or deletion of system-level objects installed by DOS, Windows and MacOS. (Almost all system-level objects run with administrator privileges, and some can be abused to gain administrator access to a system.)

For any suspicious event confirmed, the following must be recorded on the Log Review Form, and RhoKIT CISO informed:

  • User Identification
  • Event Type
  • Date and Time
  • Success or Failure indication
  • Event Origination (e.g. IP address and/or User ID)
  • Reference to the data, system component or resource affected
  1. Secure Application Development
  • The Secure Application development policy is a plan of action to guide developers decisions and actions during the software development lifecycle (SDLC) to ensure software security
  • This policy aims to be language and platform independent so that it is applicable across all software development projects
  • The adherence to and use of Secure Application Development Coding Policy is a requirement for all software development on RhoKIT information technology systems and trusted contractor sites processing RhoKIT data.

Each phase of the SDLC is mapped with security activities, as explained below:

  • Design Phase
  • Identify Design Requirements from a Security Perspective
  • Architecture and Design Reviews
  • Threat Modelling
  • Coding Phase
  • Coding Best Practices
  • Perform Static Analysis
  • Testing Phase including User Acceptance Testing
  • Vulnerability Assessment
  • Fuzzing
  • Deployment Phase
  • Server Configuration Review
  • Network Configuration Review

Development of code shall be checked and validated with the most current versions of RhoKIT Coding Standards for Secure Application Development. All code developers shall verify that their code is in compliance with the most recent and approved coding standards and guidelines.

 Only validated code shall be implemented into the RhoKIT production environment.

A review and validation ensures that code exhibits fundamental security properties to include correctness, predictability, and attack tolerance

Application Code Developers shall:

  • Ensure code meets the level of confidence that software is free from exploitable code vulnerabilities, regardless of whether they are already designed into the software or inserted later in its life cycle
  • Ensure code provides predictable execution or justifiable confidence and that the software, when executed, will provide security functionality as intended
  • Coding techniques must address injection flaws particularly SQL injection, buffer overflow vulnerabilities, cross site scripting vulnerabilities, improper access control (insecure direct object reference, failure to restrict URL access, directory traversal etc.), cross site request forgery (CSRF), broken authentication and session management

In practice Code Developers will:

  • Never trust incoming data to the system, apply checks to this data
  • Never rely on the client to store sensitive data no matter how trivial
  • Disable error messages that return any information to the user
  • Use object inheritance, encapsulation, and polymorphism wherever possible
  • Use environment variables prudently and always check boundaries and buffers
  • Applications must validate input to ensure it is well-formed and meaningful
  1. Penetration Testing Methodology

In this section should be listed the risks inherent in conducting penetration testing over the information systems used by RhoKIT. Additionally, it should be noted for each mitigation what measures will be taken.

Examples below should help frame future testing:

Example 1#

Risk: Denial of Service in systems or network devices because of the network scans.

  • Mitigation Measure 1: Network scans must be performed in a controlled manner. The start and end of the scan must be notified to responsible personnel to allow monitoring during testing. If any sign of trouble is detected,  abort the scan in progress
  • Mitigation Measure 2: Scanning tools must be configured to guarantee that the volume of sent packets or sessions established per minute does not cause a problem for network elements. In this sense, we must perform the first scans in a very controlled way and a use minimum configuration that may be expanded when is evident that the configuration is not dangerous for network devices or servers in the organisations ecosystem

Key staff involved in the project by the organisation will be listed:

  • Technical Project Manager
  • Chief Information Security Officer (CISO)
  • Chief Information Officer or Chief Financial Officer as alternative
  • Head of Communications responsible for web sites rhokit.com and legacy sites such as www.rokit-it.com
  • External intrusion tests will be performed remotely from the vendor’s premises
  • Internal intrusion tests will be conducted in the RhoKIT offices and other affiliate organisations

Audite Team particulars:

  • The Audit team must have access to the Organisation’s network. It must manage access permissions to the building early enough to ensure that the audit team can access it without problems during the planning period.
  • All the tests will be conducted from the equipment owned by the audit team so no equipment for the execution of the tests is required. The only requirement in this regard will be to have an active network connection for each member of the audit team. Those connections must provide access to the target network segment in every case.
  • If an incident occurs during the execution of the tests that have an impact on the systems or services of the organisation, the incident should be brought immediately to the attention of those responsible for incident management in the project.

It should be noted that in order to comply with PCI-DSS the scope of the tests should include at minimum, but not limited to the following:

  • All systems and applications that are part of the perimeter of the data environment card (CDE)

Example #2:

  • Systems included in the scope:

o   System 1: IP: System: System Description RhoKIT Internal

o   System 2: IP: System: System Description WiFi network and access to RhoKIT internal.

  • Applications included in the scope:

o   Application 1: URL: Description of the application.

  • Systems excluded from the scope:

o   System 5: IP: System: System Description

o   System 6: IP: System: System Description

  • Applications excluded from the scope:

o   Application 3: URL: Description of the application.

  • Technical tests must follow the Open Source Security Testing Methodology Manual (OSSTMM).

All tests must be conducted at network, system and application level and must ensure that at least identifies any vulnerabilities documented by OWASP and SANS, as well as those identified in the PCI-DSS standard v3:

  • Injections: Code, SQL, OS commands, LDAP , XPath , etc.
  • Buffer overflows
  • Insecure storage of cryptographic keys
  • Insecure Communications
  • Improper error handling
  • Cross-site scripting (XSS)
  • Control of inappropriate access
  • Cross-site request forgery (CSRF)
  • Broken authentication and incorrectly session management
  • Any other vulnerability considered High Risk by the organisation

For all findings or vulnerabilities identified during the tests carried out sufficient evidence to prove the existence of the same will be generated and documented.  The format of the evidence can be variable in each case, screen capture, raw output of security tools, photographs, paper documents, etc.

As a result of tests performed should generate a document containing at least the following sections:

  • Introduction.
  • Executive Summary
  • Methodology
  • Identified vulnerabilities
  • Recommendations for correcting vulnerabilities
  • Conclusions
  • Evidence
  1. Incident Response Plan

A Security Incident means any incident (accidental, intentional or deliberate) relating to our communications or information processing systems. The attacker could be a malicious stranger, a competitor, or a disgruntled employee, and their intention might be to steal information or money, or just to damage RhoKIT’s reputation with a customer.

The Incident response plan has to be tested once annually. Copies of this incident response plan are to be made available to all relevant staff members. RhoKIT’s management is to take steps to ensure that staff understand it and what is expected of them.

Staff and employees of RhoKIT will be expected to report to the security officer for any security related issues

RhoKIT PCI security incident response plan is as follows:

  • Each department must report an incident to the Chief Information Security Officer (CISO) or to another member of the PCI Response Team
  • That member of the team receiving the report will advise the PCI Response Team of the incident
  • The PCI Response Team will investigate the incident and assist the potentially compromised department in limiting the exposure of data and in mitigating the risks associated with the incident
  • The PCI Response Team will resolve the problem to the satisfaction of all parties involved, including reporting the incident and findings to the appropriate parties (credit card associations, credit card processors, etc.) as necessary
  • The PCI Response Team will determine if policies and processes need to be updated to avoid or mitigate impacts of a similar incident in the future, and whether additional safeguards are required in the environment where the incident occurred, or for the institution
  • If an unauthorised wireless access point or other device is identified or detected as part of the quarterly test, such an incident in each instance must be immediately escalated to the Security officer or someone with similar privileges who has the authority to stop, cease, shut down, and remove the offending device immediately
  • A department that reasonably believes it may have an account breach, or a breach of data or of systems related to the PCI environment in general, must inform RhoKIT PCI Incident Response Team
  • After being notified of a compromise, the PCI Response Team, along with other designated staff, will implement the PCI Incident Response Plan to assist and augment departments response plans

RhoKIT PCI Security Incident Response Team:

  • Chief Information Officer (CIO) or alternative Chief Finance Office (CFO)
  • Communications Director
  • Chief Information Security Officer (CISO) or CFO
  • Counsel
  • Information Security Officer
  • Collections and Merchant Services
  • Risk Manager
  • Incident Response Notification
  • Escalation Members
  • Escalation First Level
  • Controller
  • Executive Project Director for Credit Collections
  • Merchant Services Legal Counsel
  • Risk Manager
  • Open Source Security Testing Methodology Manual
  • RhoKIT Managing Director or Chief Excecutive
  • Executive Cabinet or ‘C suite’
  • Internal Audit
  • Auxiliary members as needed
  • External Contacts (as needed)
  • Merchant Provider
  • Card Brands (if applicable)
  • Internet Service Provider (if applicable)
  • Internet Service Provider of Intruder (if applicable)
  • Communication Carriers (local and long distance)
  • Business Partners
  • Insurance Carrier
  • External Response Team as applicable (CERT Coordination Centre 1, etc.)
  • Law Enforcement Agencies as applicable in local jurisdiction

In response to a systems compromise, the PCI Response Team and designees will perform the following:

  • Ensure compromised system(s) is isolated from the network
  • Gather, review and analyse the logs and related information from various central and local safeguards and security controls
  • Conduct appropriate forensic analysis of compromised system(s)
  • Contact internal and external departments and entities as appropriate
  • Make forensic and log analysis available to appropriate law enforcement or card industry security personnel, as required
  • Assist law enforcement and card industry security personnel in investigative processes, including in prosecutions

In response to a systems compromise, the PCI Response Team and designees will apply the following:

  • RhoKIT require no and has no access to cardholder data.
  • If RhoKIT were in future duly authorised and fully PCI-DSS compliant, then the following would apply.

o   The card companies have individually specific requirements that the Response Team must address in reporting suspected or confirmed breaches of cardholder data

o   Incident Response notifications to various card schemes

o   In the event of a suspected security breach, alert the information security officer or line manager immediately

o   The security officer will carry out an initial investigation of the suspected security breach

o   Upon confirmation that a security breach has occurred, the security officer will alert management and begin informing all relevant parties that may be affected by the compromise

VISA Steps

If the data security compromise involves credit card account numbers, implement the following procedure:

  • Shut down any systems or processes involved in the breach to limit the extent, and prevent further exposure
  • Alert all affected parties and authorities such as the Merchant Bank (your Bank), Visa Fraud Control, and the law enforcement
  • Provide details of all compromised or potentially compromised card numbers to Visa Fraud Control within 24 hours

 For more Information visit:

 http://USA.visa.com/business/accepting_visa/ops_risk_management/cisp_if_ compromised.html

Visa Incident Report Template

This report must be provided to VISA within 14 days after the initial report of an incident to VISA. The following report content and standards must be followed when completing the incident report. Incident reports must be securely distributed to VISA and Merchant Bank. Visa will classify the report as VISA Secret*:

  • Executive Summary
  • Overview of the incident
  • Include RISK Level(High, Medium, Low)
  • Determine if compromise has been contained
  • Background
  • Include forensic tools used during investigation
  • Findings
  • Number of accounts at risk, identify those stores compromised both retail and physical
  • Type of account information at risk

  Identify ALL systems analysed. Include the following:

  • Domain Name System (DNS) names
  • Internet Protocol (IP) addresses
  • Operating System (OS) version
  • Function of system(s)

  Identify ALL compromised systems. Include the following:

  • DNS names
  • IP addresses
  • OS version
  • Function of system(s)
  • Time frame of compromise
  • Any data exported by intruder
  • Establish how and source of compromise
  • Check all potential database locations to ensure that no CVV2, Track 1 or Track 2 data is stored anywhere, whether encrypted or unencrypted (e.g. duplicate or backup tables or databases, databases used in development, stage or testing environments, data on software engineers machines, etc).
  • If applicable, review VisaNet endpoint security and determine risk
  • Compromised Entity Action
  • Recommendations
  • Contact(s) at entity and security assessor performing investigation

*This classification applies to the most sensitive business information, which is intended for use within VISA. Its unauthorised disclosure could seriously and adversely impact VISA, its employees, member banks, business partners, and/or the Brand

MasterCard Steps

 

  • Within 24 hours of an account compromise event, notify the MasterCard Compromised Account Team via phone at 1-636-722-4100
  • Provide a detailed written statement of fact about the account compromise (including the contributing circumstances) via secure email to:[email protected]
  • Provide the MasterCard Merchant Fraud Control Department with a complete list of all known compromised account numbers.
  • Within 72 hours of knowledge of a suspected account compromise, engage the services of a data security firm acceptable to MasterCard to assess the vulnerability of the compromised data and related systems (such as a detailed forensics evaluation)
  • Provide weekly written status reports to MasterCard, addressing open questions and issues until the audit is complete to the satisfaction of MasterCard
  • Promptly furnish updated lists of potential or known compromised account numbers, additional documentation, and other information that MasterCard may request
  • Provide finding of all audits and investigations to the MasterCard Merchant Fraud Control department within the required time frame and continue to address any outstanding exposure or recommendation until resolved to the satisfaction of MasterCard
  • Once MasterCard obtains the details of the account data compromise and the list of compromised account numbers, MasterCard will:

o   Identify the issuers of the accounts that were suspected to have been compromised and group all known accounts under the respective parent member IDs.

o   Distribute the account number data to its respective issuers

o   Employees of RhoKIT will be expected to report to the security officer for any security related issues

o   The role of the security officer is to:

▪       Effectively communicate all security policies and procedures to employees within RhoKIT, vendors and contractors

▪       In addition to this, the security officer will oversee the scheduling of security training sessions, monitor and enforce the security policies outlined in both this document and at the training sessions and finally,

▪       Oversee the implantation of the incident response plan in the event of a sensitive data compromise

Discover Card Steps

 

  • Within 24 hours of an account compromise event, notify Discover Fraud Prevention
  • Prepare a detailed written statement of fact about the account compromise including the contributing circumstances
  • Prepare a list of all known compromised account numbers
  • Obtain additional specific requirements from Discover Card

American Express Steps

  • Within 24 hours of an account compromise event, notify American Express Merchant Services
  • Prepare a detailed written statement of fact about the account compromise including the contributing circumstances
  • Prepare a list of all known compromised account numbers Obtain additional specific requirements from American Express

RhoKIT require no and has no access to cardholder data.

If RhoKIT were in future duly authorised and fully PCI-DSS compliant, then the above card association rules would fully apply.

  1. Roles And Responsibilities:

Chief Security Officer (or equivalent) is responsible for overseeing all aspects of information security, including but not limited to:

  • Creating and distributing security policies and procedures
  • Monitoring and analysing security alerts and distributing information to appropriate information security and business unit management personnel
  •  Creating and distributing security incident response and escalation procedures that include:

o   Maintaining a formal security awareness program for all employees that provide multiple methods of communicating awareness and

o   Educating employees (for example, posters, letters, meetings)

The Information Technology Officer (or equivalent) shall:

  • maintain daily administrative and technical operational security procedures that are consistent with the PCI-DSS (for example, user account maintenance procedures, and log review procedures).

System and Application Administrators shall:

  • Monitor and analyse security alerts and information and distribute to appropriate personnel
  • Administer user accounts and manage authentication
  • Monitor and control all access to data
  • Maintain a list of service providers
  • Ensure there is a process for engaging service providers including proper due diligence prior to engagement.
  • Maintain a program to verify service providers PCI-DSS compliant status, with supporting documentation

The Human Resources Office (or equivalent) is responsible for tracking employee participation in the security awareness program, including:

  • Facilitating participation upon hire and at least annually
  • Ensuring that employees acknowledge in writing at least annually that they have read and understand RhoKITs Information Security Policy

General Counsel (or equivalent) will ensure that for service providers with whom information is shared:

  • Written contracts require adherence to PCI-DSS by the service provider
  • Written contracts include acknowledgement or responsibility for the security of data by the service provider
  1. Third Party Access To Cardholder Data
  • RhoKIT requires no and has no access to cardholder data
  • RhoKIT are unable to provide any third party with access to any cardholder data
  • All third-party companies providing critical services to RhoKIT must provide an agreed Service Level Agreement
  • All third-party companies providing hosting facilities must comply with RhoKIT’s Physical Security and Access Control Policy

All third-party companies, including processing banks and payment gateway technology providers, which exclusively have access to cardholder information must:

  • Adhere to the PCI-DSS security requirements
  • Acknowledge their responsibility for securing the cardholder data
  • Acknowledge that the cardholder data must only be used for assisting the completion of a transaction, supporting a loyalty program, providing a fraud control service or for uses specifically required by law
  • Have appropriate provisions for business continuity in the event of a major disruption, disaster or failure
  • Provide full cooperation and access to conduct a thorough security review after a security intrusion to a Payment Card industry representative, or a Payment Card industry approved third party
  • RhoKIT require no and has no access to cardholder data
  • RhoKIT are unable to provide any third party with access to any cardholder data
  1. User Access Management
  • Access to RhoKIT is controlled through a formal user registration process beginning with a formal notification from HR or from a line manager
  • Each user is identified by a unique user ID so that users can be linked to and made responsible for their actions
  • The use of group IDs is only permitted where they are suitable for the work carried out
  • There is a standard level of access (or delegated authorities); other services can be accessed when specifically authorised by HR or line management
  • The job function of the user decides the level of access the employee has to data
  • A request for service must be made in writing (email or hard copy) by the newcomer’s line manager or by HR

The request is free format, but must state:

  • Name of person making request
  • Job title of the newcomers and work group
  • Start date
  • Services required (default services are: Mail, Office, Browser and other internet access)
  • Each user will be given a copy of their new user form to provide a written statement of their access rights, signed by an information technology representative after their induction procedure
  • The user signs the form indicating that they understand the conditions of access
  • Access to all RhoKIT systems is provided by designated information technology personnel and can only be started after proper procedures are completed
  • As soon as an individual leaves RhoKIT employment, all his/her system logons must be immediately revoked
  • As part of the employee termination process HR (or line managers in the case of contractors) will inform information technology, accounting and operations of all leavers and their date of leaving.
  1. Access Control Policy
  • Access Control systems are in place to protect the interests of all users of RhoKIT computer systems by providing a safe, secure and readily accessible environment in which to work
  • RhoKIT will provide all employees and other users with the information they need to carry out their responsibilities in as effective and efficient manner as possible
  • Generic or group IDs shall not normally be permitted, but may be granted under exceptional circumstances if sufficient other controls on access are in place and where explicitly prescribed by management
  • The allocation of privilege rights (e.g. local administrator, domain administrator, super-user, root access) shall be restricted and controlled, and authorization provided jointly by the system owner and information technology services
  • Technical teams shall guard against issuing privilege rights to entire teams to prevent loss of confidentiality
  • Access rights will be accorded following the principles of least privilege and need to know
  • Every user should attempt to maintain the security of data at its classified level even if technical security mechanisms fail or are absent
  • Users electing to place information on digital media or storage devices or maintaining a separate database must only do so where such an action is in accord with the data classification
  • Users are obligated to report instances of non-compliance to the RhoKIT CISO
  • Access to RhoKIT information technology resources and services will be given through the provision of a unique Active Directory account and complex password
  • No access to any RhoKIT information technology resources and services will be provided without prior authentication and authorization of a user’s RhoKIT Active Directory account.
  • Password issuing, strength requirements, changing and control will be managed through formal processes. Password length, complexity and expiration times will be controlled through Active Directory Group Policy Objects
  • Access to Confidential, Restricted Secret and otherwise Protected information will be limited to authorised persons whose job responsibilities require it, and as determined by the data owner or their designated representative. Requests for access permission to be granted, changed or revoked must be made in writing
  • Users are expected to become familiar with and abide by RhoKIT policies, standards and guidelines for appropriate and acceptable usage of the networks and systems
  • Access for remote users shall be subject to authorization by IT Services and be provided in accordance with the Remote Access Policy and the Information Security Policy. No uncontrolled external access shall be permitted to any network device or networked system
  • Access to data is variously and appropriately controlled according to the data classification levels described in the Information Security Management Policy
  • Access control methods include logon access rights, file share and disk permissions, user account privileges, server and workstation access rights, firewall permissions, IIS Intranet/Extranet authentication rights, SQL database rights, isolated networks and other methods as necessary
  • A formal process shall be conducted at regular intervals by system owners and data owners in conjunction with IT Services to review users’ access rights. The review shall be logged and information technology services shall sign off the review to give authority for users continued access rights
  1. Wireless Policy
  • Installation or use of any wireless device or wireless network intended to be used to connect to any of the RhoKIT networks or environments is prohibited
  • A quarterly test should be run to discover any wireless access points connected to RhoKIT network.

Usage of appropriate testing using tools like NET STUMBLER, KISMET etc. must be performed on a quarterly basis to ensure that:

  • Any devices which support wireless communication remain disabled or decommissioned
  • If any violation of the Wireless Policy is discovered as a result of the normal audit processes, the security officer or any one with similar job description has the authorisation to stop, cease, shut down, and remove the offending device immediately

If the need arises to use wireless technology it should be approved by RhoKIT and the following wireless standards have to be adhered to:

  • Default SNMP community strings and passwords, passphrases, encryption keys/security related vendor defaults (if applicable) should be changed immediately after the installation of the device and if anyone with knowledge of these leaves the RhoKIT.
  • The firmware on the wireless devices has to be updated accordingly as per vendors release schedule.
  • The firmware on the wireless devices must support strong encryption for authentication and transmission over wireless networks.
  • Any other security related wireless vendor defaults should be changed if applicable.
  • Wireless networks must implement industry best practices (IEEE 802.11i) and strong encryption for authentication and transmission of data.
  • An Inventory of authorised access points along with a business justification must be maintained.

More Information

Please feel free to contact us if you require any further information using the following contact details:

[email protected]

[email protected]

This website is a RhoKIT imprint

Kenya limited company registration number: PVT-EYUBL3RP;

RhoKIT is the Merchant of Reference and the sole owner and operator of this website and brand imprint.

We are passionate about culture and communities, we seek to offer great value to both the consumer and the creators of content.

RhoKIT is headquartered in Nairobi, Kenya:

Suite 404, Jubilee Exchange House, Mama Ngina Street

Phone: +254 759 355 616
www.rhokit.com

RhoKIT is in the process of registering a company in The Republic of Nigeria.

Statement of Compliance

The Office of Foreign Assets Control (OFAC) of the U.S. Department of Treasury administers and oversees a series of laws that impose economic sanctions against hostile entities to further U.S. foreign policy and national security objectives. OFAC is responsible for promulgating, developing and administering the sanctions for the Treasury under all federal statutes.

The OFAC laws and regulations promote national and international security by requiring asset freezing of: oppressive governments, international terrorists, narcotics traffickers or other Specially Designated Nationals (SDNs) and blocked persons.

RhoKIT adheres to the OFAC Regulations.

Banks and Payment providers

RhoKIT uses several payment providers for the collection of payments and outpayments to and from our customers.

These payment sources may levy additional charges for sending and receiving funds which are outside of our control.

We urge our clients to make sure they understand the fees and charges that may be levied to them by their own bank or the mobile payment service provider.

For more information, here are the websites of the mobile payment sources that we use:

    • Safaricom M-PESA- www.safaricom.co.ke/personal/m-pesa
    • Airtel Money – www.airtelkenya.com/about_money

As a responsible operator, RhoKIT endeavours to ensure that should it ever be required to seize operations in a jurisdiction or close its business, all customers’ funds will be returned to them. We hold customer funds separate from company funds in dedicated bank accounts with our banking and payment processors.

Where applicable and relevant, RhoKIT only sells, uses and distributes legal content. We do not own any rights to any content, we license content from parties represented as the Authorised Distributors of the content in question.

If you believe your copyright-protected work is offered or used in a RhoKIT product or service without authorisation, you may submit a copyright infringement notification. These requests should only be submitted by the copyright owner or an agent authorized to act on the owner’s behalf.

If you choose to request removal of content by submitting an infringement notification, please remember that you are initiating a legal process. Do not make false claims.

We accept copyright infringement notifications submitted by email. They are forwarded to the relevant Authorised Distributor who licensed the sale of the goods through RhoKIT for resolution directly with the claimant of the infringement. We honour all court instructed take down notices, warrants and requests for information.

Upon receipt of an infringement notice we may take certain actions, including removing information or an item, all of which are taken without any admission as to liability and without prejudice to any rights, remedies or defences, all of which are expressly reserved. Furthermore, in submitting an infringement notice, you grant to RhoKIT the right to use, reproduce, modify, adapt, publish, translate, create derivative works from, and display its content throughout the world in any media. This includes forwarding the infringement notice to the parties involved in the provision of the allegedly infringing content. You agree to indemnify RhoKIT for all claims brought by a third party against RhoKIT arising out of or in connection with the submission of an infringement notice.

RhoKIT does not mediate between claimants nor do we arbitrate on behalf of any party, we do however cooperate with legal enquiries including the submission of revenue statements, audit trails of sales and the like. RhoKIT does not offer legal or tax advice.

After submitting a copyright infringement notification, a copyright owner may realize that they have misidentified content or may change their mind about their complaint. When this happens, RhoKIT is glad to honour retractions of copyright claims from the party that originally submitted them.

User Communications 

Some RhoKIT products and services may allow users to interact with each other, post comments both privately and publicly.

We encourage freedom of expression and robust discussion and play, but in none of our products and services do we at any time condone the following:

  • Racism (including offensive comments based on ethnicity and nationality)
  • Sexism
  • Homophobia
  • Religious intolerance
  • Cyber bullying
  • Hate speech
  • Derogatory language
  • Comments inciting violence

To this end, the following restrictions apply to all users of all of our products and services.

 Users will not post, transmit, communicate or otherwise make available information or content that:

  1. is intended to or tends to harass, annoy, threaten or intimidate any other user. Users must immediately cease contacting any other user of any of our products or services who asks you to stop contacting them
  2. is defamatory, inaccurate, abusive, obscene, profane, offensive or sexually explicit
  3. promotes racism, bigotry, hatred or physical harm of any kind against any group or individual
  4. promotes or encourages illegal or unlawful activity or behaviour
  5. contains any material which infringes a third party’s intellectual property rights unless you first obtain their permission to use it, including a third party’s music, video or photograph. If you reasonably believe that material belonging to a third party has been posted on any of our products or services without permission you are requested to contact us with full details of the alleged infringement
  6. contains an image of another person and you do not have prior permission to use such image
  7. contains an image of a person under 18 years of age
  8. contains advertising, promotional or commercial messages. You must not contact other members or subscribers for research purposes. You must not transmit any chain letters, junk or spam email
  9. is misleading, inaccurate, false or impersonates any other person or entity. If information provided to us subsequently becomes misleading, inaccurate or false, you will promptly notify us of such change
  10. is intended to solicit another member’s personal contact details or solicit communication with or on behalf of a person under 18 years old

 

Further, you will not post, copy, modify or disclose or distribute:

  1. any confidential, secret or otherwise protected information 
  2. any other material which is subject to our or a third party’s intellectual property rights, and which is accessible via our products and services without first obtaining our or the relevant third party’s prior written consent.

The user agrees to compensate us for any claim or damages (including any legal fees in relation to such claim or damages) made by a third party in respect of any matter in relation to or arising from any breach or suspected breach by the user of these terms or the rights of a third party.

RhoKIT reserves the right to issue warnings, suspend access to user’s accounts or terminate user’s accounts if we reasonably consider that the user is in breach of these terms.

Users acknowledge that other members may report content or behaviour that contravenes these Terms and Conditions.

Risks and Precautions

RhoKIT does not conduct criminal background checks on members of our products and services. 

Users are solely responsible for taking all appropriate safety precautions in connection with their use of the products and services. 

User Conduct, Disputes and Other

You should promptly report to us any behaviour you encounter which is in breach of these terms, including any behaviour which may be harmful, threatening, harassing or unlawful. If deemed appropriate, RhoKIT may suspend or delete a user’s profile.

RhoKIT has the right to warn other members and contact the relevant law enforcement.

RhoKIT is not obliged to become involved in any domestic or private disputes between members and does not provide any arbitration or settlement service should a dispute arise between members.

This policy describes the way in which we deal with the information you provide to us to enable us to manage your relationship with RhoKIT.

We will process any personal information provided to us (whether via this website, the customer application form or any other means) or otherwise held by us relating to you in the manner set out in this statement.

By submitting your information to us and using a RhoKIT website, USSD connection or via the Telegram messaging service you confirm your consent to the use of your personal information as set out in this Privacy Policy.

Information Collected and How it is Used

We may use your personal information together with other information for the purposes of:

  • Processing your payments

  • Setting up and managing your account

  • Complying with our regulatory duties

  • Building up personal profiles

  • Providing you with information about promotional offers

    Information Storage

    We will take all reasonable steps to ensure that your information is kept secure and protected. We will only disclose personal information to other companies within associated or subsidiary companies and to business partners, successors in title to our business and suppliers that are engaged to process such information on our behalf. If you apply for an account with us then to help us make credit decisions about you, to prevent fraud, to check your age and identity and to prevent money laundering, we may use third parties including credit reference agencies who will record any searches on your file. We may also make enquiries of, and disclose details of how you conduct your account to, such agencies, security organisations and any other relevant third parties for fraud and money laundering prevention.

    Telephone Calls

    Telephone calls to and from our Customer Support Centre are recorded for training and security purposes along with the resolution of any queries arising from the service you receive.

    Internet-Based Transfers

    Given that the internet is a global environment, using the internet to collect and process personal data necessarily involves the transmission of data on an international basis. Some of the data processors engaged to process personal data may be based outside of our customer’s domicile. Therefore, by browsing our website and communicating electronically with us, you acknowledge and agree to our processing of your personal data in this way.

    Disclosure of Information

    We are entitled to share the information we hold on you which includes personal data and betting history with the regulators and other legal authorities, in order to investigate fraud, money laundering or integrity issues and to comply with our regulatory duties under the laws of the countries in which we operate.

    Restrictions

    We do not sell, lease or resell our customer data to 3rd parties. Under any circumstances.

Additional Privacy Policy For Using our Website and Services

RhoKIT is firmly committed to privacy. The following discloses our information gathering and dissemination practices for this website (the “Website”) and use of our services (“Service”).

By accepting the terms and conditions you consent to this Privacy Policy and agree to the terms, conditions and notices contained or referenced herein. We reserve the right to make changes to this Privacy Policy at any time and such changes will be posted to our website and become effective without prior notice. Your continued use of our Website constitutes your acceptance of such changes.

You should review this Privacy Policy from time to time for changes. However, if the changes are material and if required by applicable local law, we will obtain your consent. Unless we have obtained your consent to the updated policy, your personal data will be processed in accordance with the privacy policy in effect at the time of your acceptance of this policy. This Privacy Policy was last updated on 1 September 2023.

Unless prohibited by applicable law, the English text of the Privacy Policy shall be the official version and if for any reason the translated text is incorrect, or misleading, the English text shall prevail.

Information Collection

We collect personal data from you in a variety of ways including when you register with us on the website. We categorize the personal data in two types of information: personally identifiable information and non- personally identifiable information, which is also referred to as aggregate and anonymous data. Some of the collected data may be considered as sensitive.

When you order credits we and/or our third party affiliates and payment processors, process financial information required for the payment transaction, such as name, address and your credit card data (such as number, issuing institution and expiry date) or account details (account holder, account number, sort code, institution). We do not record any of this information under any circumstances.

Cookies and IP Addresses

We may use your IP address to help us maintain our site, identify problems with our server and to provide you with an enhanced customer experience.

We may use cookies to facilitate a more user-friendly experience. Cookies help us create a personalized experience for you when you visit our site. The use of cookies is a very common practice on the internet and provides for a more customized user experience of the Website. If you are uncomfortable with this, you can disable all cookies through your browser settings.

Should you choose to disable all cookies this will impact and/or prevent your ability to access and use some or all of the Service.

Information Use

Your non-personally identifiable information is used to personalize your experience, allow other members to find you through a search, to compose your personal profile–which may be associated with a pseudonymous identities or avatars you have created–and to deliver targeted advertising and promotional offers to you from external companies that are of the highest relevance to your demographic profile. We may share some of this information for our own analysis and research purposes with our professional advisors or consultants and third party partners.

The personally identifiable information we collect from you is used in the course of providing our service to you and to improve the content and functionality of our Website or customize the layout of our pages for each individual member. We may use your contact information to send you valuable updates and timely notices of promotions and mailbox status reports. We may also use your personally identifiable information to send electronic mail to you for the purpose of informing you of changes or additions to the Service or of any products and services.

Law Enforcement

We may disclose your personally identifiable information to respond to law enforcement requests or where required by applicable laws, court orders, or government regulations; or to protect against misuse or unauthorized use of our site; or to protect the personal safety or property of our users or the public (among other things, this means that if you provide false information or attempt to pose as someone else, information about you may be disclosed as part of any investigation into your actions).

Record Keeping

We keep the information you have given us for as long as your account stays active or hidden or is allowed by applicable local law. Accessing and updating your email notification preferences, personal information and public information you have the opportunity to opt-out of certain communications and modify personal information or demographic information you have provided to us, and to hide information visible to the public users of the Website at any time.

Please be aware that it may take several hours for any custom changes you make to take effect on the public areas of the system. Please also note that changing or deleting your information or opting-out of email notifications from us, will only change or delete the data in our database for the purpose of future activities and communications. These changes and deletions will not change or delete information or emails that are queued to be sent or have already been sent.

Spam

We do not send unsolicited email at any time. However you hereby consent to receive email messages to the email address you register on your account for marketing purposes and from members. You may opt- out of receiving email messages at any time by sending a request to us.

Monitor

Our users may communicate with each other through on-site Mail Messaging and Instant Messaging. While we do not, as a rule, moderate or monitor members’ private exchanges, we reserve the right to do so if we suspect users of being under the age of 18 or of using our service for the purpose of solicitation or any other violation of our Terms and Conditions of Use or Privacy Policy. Submissions that appear on the public area of the site are moderated and we reserve the right to edit, delete, remove or not use any communication on a public area of the site.

Other Information Collectors

Except as otherwise expressly described in this Privacy Policy, this document only addresses the use and disclosure of information we collect from you. To the extent that you disclose your information to other parties, whether they are on our Website (including links to third party sites) or on other sites throughout the internet, different rules may apply to their use or disclosure of the information you disclose to them. Since we do not control the privacy policies of any third parties, you should investigate their policies before you disclose your personal information to them.

Security

We treat data as an asset that must be protected against loss and unauthorized access. To safeguard the confidentiality and security of your information we use industry standard practices and technologies including but not limited to firewalls, browser session encryption and strong data encryption of information when it is stored to disk.

Right To Access Information

You are entitled, upon request and without cost, to receive information with regards to whether and in what way personal information or other transactional information regarding you is processed. If you wish to receive such information, please contact us at our contact details [email protected]. We may require you to provide verification of your identity to provide a copy of the information we hold. Please note that in certain circumstances we may withhold access to your information where we have the right to do so under applicable data protection legislation.

Advertising

Please note that by accepting this Privacy Policy you consent to receiving targeted advertisement by electronic means from RhoKIT, its affiliates and the trusted 3rd-parties.

Your data will be kept in a data file controlled by us. You are also entitled to access, rectify your personal information, object or cancel the processing operations by contacting us by adjusting your settings directly on our Website or writing to us at [email protected]

In each of our operating markets, our head office and our subsidiaries comply 100% to the local requirements on taxes, whatever form they have been legislated in.

We collect and pay all relevant taxes for all applicable transactions.

RhoKIT is in good standing with the tax authorities, making our day to day operations simpler, sustainable and more reliable for our clients all over the world.

Overview

Please read these conditions carefully before using RhoKIT products and services. By using our services, you signify your agreement to be bound by these conditions. We offer a wide range of services and sometimes additional terms may apply.

Privacy

Please review our Privacy Policy to understand our relevant practices.

Electronic Communications

When you use any RhoKIT products and service or send emails to us, you are communicating with us electronically. We will communicate with you by email or by posting notices on the website or through the other RhoKIT products and services. For contractual purposes, you consent to receive communications from us electronically and you agree that all agreements, notices, disclosures and other communications that we provide you electronically satisfy any legal requirement that such communications be in writing, unless mandatory applicable laws specifically require a different form of communication.

Rights

All content included in or made available through any RhoKIT products and service, such as text, graphics, logos, button icons, images, audio clips, digital downloads, and data compilations is the property of RhoKIT or its content suppliers and is protected by Kenya and UK or other international copyright, authors’ rights and database right laws. The compilation of all content included in or made available through any RhoKIT products and services is the exclusive property of RhoKIT and is protected by Kenya, UK, and international copyright and database rights laws.

You may not extract and/or re-utilise parts of the content of any RhoKIT products and services without our express written consent. In particular, you may not utilize any data mining, robots, or similar data gathering and extraction tools to extract (whether once or many times) for re-utilisation of any substantial parts of the content of any RhoKIT products and service, without our express written consent. You may also not create and/or publish your own database that features substantial parts of any RhoKIT products and services (e.g. our prices and product listings) without our express written consent.

License and Access

Subject to your compliance with these Conditions of Use and applicable Service Terms and your payment of any applicable fees, RhoKIT or its content providers grant you a limited, non-exclusive, non-transferable, non-sublicensable license to access and make personal and non-commercial use of the RhoKIT products and services.

This license does not include any resale or commercial use of any RhoKIT products and service or its contents; any collection and use of any product listings, descriptions, or prices; any derivative use of any RhoKIT products and service or its contents; any downloading or copying of account information for the benefit of another merchant; or any use of data mining, robots, or similar data gathering and extraction tools.

All rights not expressly granted to you in these Conditions of Use or any Service Terms are reserved and retained by RhoKIT or its licensors, suppliers, publishers, rights holders, or other content
providers. No RhoKIT products and service, nor any part of any RhoKIT products and service, may be reproduced, duplicated, copied, sold, resold, visited, or otherwise exploited for any commercial purpose without our express written consent.

You may not frame or use framing techniques to enclose any trademark, logo or other proprietary information (including images, text, page layout, or form) of RhoKIT without our express written consent. You may not use any meta tags or any other “hidden text” utilizing RhoKIT names or trademarks without our express written consent.

You may not misuse the RhoKIT products and services. You may use the RhoKIT products and services only as permitted by law. The licenses granted by RhoKIT terminate if you do not comply with these Conditions of Use or any Service Terms.

Reviews and Contents

Visitors may post reviews, comments and other content; send e-cards and other communications; and submit suggestions, ideas, comments, questions or other information, as long as the content is not illegal, obscene, abusive, threatening, defamatory, invasive of privacy, infringing of intellectual property rights, or otherwise injurious to third parties or objectionable and does not consist of or contain software viruses, political campaigning, commercial solicitation, chain letters, mass mailings or any form of “spam”.

You may not use a false e-mail address, impersonate any person or entity, or otherwise mislead as to the origin of a card or other content. We reserve the right to remove or edit such content. If you believe that any content on or advertised for sale on any RhoKIT products and service contains a defamatory statement, or that your intellectual property rights are being infringed by an item or information on any RhoKIT products and service, please notify us by submitting a formal notice to us and we will respond.

If you post content or submit material, and unless we indicate otherwise, you grant: (a) RhoKIT a non- exclusive, royalty-free and fully sublicensable and transferable rights to use, reproduce, modify, adapt, publish, translate, create derivative works from, distribute, and display such content throughout the world in any media; and (b) RhoKIT, its sublicensees and transferees the right to use the name that you submit in connection with such content, if they choose. No moral rights are assigned under this provision.

You agree that the rights you grant above are irrevocable during the entire period of protection of your intellectual property rights associated with such content and material. To the extent permitted by law, you agree to waive your right to be identified as the author of such content and your right to object to derogatory treatment of such content. You agree to perform all further acts necessary to perfect any of the above rights granted by you to RhoKIT including the execution of deeds and documents, at our request.

You represent and warrant that you own or otherwise control all of the rights to the content that you post; that, as at the date that the content or material is posted: (i) the content and material is accurate; and (ii) use of the content and material you supply does not breach any applicable policies or guidelines and will not cause injury to any person or entity (including that the content or material is not defamatory).

You agree to indemnify RhoKIT for all claims brought by a third party against RhoKIT arising out of or in connection with the content and material you supply except to the extent that any liability arises from our failure to properly remove the content when it is notified of the illegal nature of the content arising out of or on the grounds of, or originating from the content that you have communicated to us.

RhoKIT respects the intellectual property of others. Please see our Licensing and Piracy Policy for more information.

Liability

We will do our utmost to ensure that availability of the RhoKIT products and services will be uninterrupted and that transmissions will be error-free. However, due to the nature of the internet, this cannot be guaranteed. Also, your access to RhoKIT products and services may also be occasionally suspended or restricted to allow for repairs, maintenance, or the introduction of new facilities or services. We will attempt to limit the frequency and duration of any such suspension or restriction.

RhoKIT will not be responsible for (i) losses that were not caused by any breach on our part, or (ii) any business loss (including loss of profits, revenue, contracts, anticipated savings, data, goodwill or wasted expenditure), or (iii) any indirect or consequential losses that were not foreseeable to both you and us when you commenced using the RhoKIT products and services.

We will not be held responsible for any delay or failure to comply with our obligations under these conditions if the delay or failure arises from any cause which is beyond our reasonable control. This condition does not affect your legal right to have goods sent or services provided within a reasonable time or to receive a refund if goods or services ordered cannot be supplied within a reasonable time owing to a cause beyond our reasonable control.

The laws of some countries do not allow some or all of the limitations described above. If these laws apply to you, some or all of the above limitations may not apply to you and you might have additional rights.

Nothing in these conditions limits or excludes our responsibility for fraudulent representations made by us or for death or personal injury caused by our negligence or willful misconduct.

Applicable Law

RhoKIT is incorporated in the United Kingdom, Kenya, and Tanzania. RhoKIT is subject to relevant laws, regulations and treaties in the jurisdictions within which it operates.

Alterations

We reserve the right to make changes to any RhoKIT products and services, policies, terms and conditions including these Conditions of Use and Service Terms at any time. You will be subject to the terms and conditions, policies and Conditions of Use in force at the time that you use the RhoKIT products and services. If any of these Conditions of Use is deemed invalid, void, or for any reason unenforceable, that condition will be deemed severable and will not affect the validity and enforceability of any remaining condition.

Waiver

If you breach these Conditions of Use and we take no action, we will still be entitled to use our rights and remedies in any other situation where you breach these Conditions of Use.

Children

We do not sell products for purchase by children. We do not sell children’s products for purchase by adults.

If you are under 18 you may not use the RhoKIT products and services not even with the involvement of a parent or guardian.

Please see our COPPA Compliance documentation for more detail.

Pricing and Availability

All prices are inclusive of legally applicable sales taxes.

We list availability information for products sold by us on the website including on each product information page. Beyond what we say on that page or otherwise on the website, we cannot be more specific about availability. As we process your order, we will inform you by SMS or e-mail as soon as possible if any service you have participated in turns out to be unavailable. You will not be charged for services we are not able to render.

Product Information

Unless expressly indicated otherwise, RhoKIT is the manufacturer and/or provider of the products sold. While we work to ensure that product and service information on our website is correct, actual product and service information might vary and different information might be displayed on our website.

Please carefully read the information provided with the product. Content on this site is not intended to substitute for advice given by a practitioner or professional.

RhoKIT Customer Promise

RhoKIT ensures clients are at the very heart of all that we do. We are fully committed to providing the highest standards of client services, products and advice.

Our customers are our most valuable asset and our aim is to ensure we deliver user-friendly, robust, reliable and cost-effective transactional services. As a part of our overall approach, we are fully committed to treating our clients fairly and as such we endeavour to meet their expectations of high quality services.

Our Treating Customers Fairly (TCF) policy is to ensure we consistently deliver fair outcomes to our clients and take responsibility for the firm and staff (at all levels) providing enhanced service quality to clients, based on a culture of openness and transparency. We take the requirements of this policy, in particular the requirement to treat customers and clients fairly.

Key Outcomes

There are six key outcomes central to this TCF initiative:

  1. Customers are confident that they are dealing with a company where the fair treatment of customers is central to the company culture.
  2. Products and services marketed and sold in the retail market are designed to meet the needs of identified customer groups and are targeted accordingly.
  3. Customers are given clear information and are kept appropriately informed before, during and after the time of contracting.
  4. Where customers receive advice, the advice is suitable and takes account of their circumstances.
  5. Customers are provided with products that perform as we have led them to expect and the associated service is both of an acceptable standard and to what they have been led to expect.
  6. Customers do not face unreasonable post-sale barriers to change product, switch provider, submit a claim or make a complaint.

Key Service Principles

Living our six key customer service principles is how we deliver our customer promise. We ascertain the appropriateness of the requested service for all new clients prior to accepting an instruction, ensuring it is in line with their knowledge and experience as well as our capabilities and relevant laws.

1. We continually aim to understand the needs of our clients.

2. We keep our clients fully informed in a clear and fair manner that is unambiguous and not misleading.

3. We ensure our services are delivered with clarity and transparency and do not contain hidden conditions or rely on complex technical definitions.

4. We make certain our clients understand the risks associated with our services at the outset of an instruction.

5. We work hard to ensure that service and risk information remains clear and prominent always.

6. In the event that there is a conflict of interest, we will inform our clients as soon as possible once we become aware of it.

Our Approach

Our priority is to provide our clients with an excellent service underpinned by quality and choiceWe are committed to ensuring our employees, customers and advisers want to buy our services, stay with us and recommend us to their business partners, suppliers and colleagues.

Our Service

Our service is shaped by listening to our clients’ needs and understanding what is important to them. We take our responsibility for meeting the needs of our clients seriously and always look for ways to improve the quality of our service. We aim to treat our clients fairly and deliver high quality services which meet or exceed their expectations throughout their relationship with us.

Our People

We recognise that our employees are critical to delivering an outstanding client experience and ensuring our customers are treated fairly. Our culture and values encourage and support our employees to deliver this.
All our employees are fully trained in dealing with our clients, and in treating them fairly. We remunerate and incentivise our employees to encourage them to deal with all clients fairly, and to continually find ways to improve.

Complaints

We respond in a timely manner to our customers and prospective customers’ questions and queries by addressing any issues or concerns promptly. All customer complaints are dealt with and escalated as appropriate and as required by us in order to meet our obligations to our clients and our regulators where applicable.

Let's chat
Hi there! 👋🏽
Welcome to Rhokit. How can we assist you today?