Our commitment is enshrined in our express policies on Enterprise Risk Management and Consumer Protection.


Crowdfunding platforms are online platforms that allow individuals or organizations to raise funds for a specific project or cause. As with any online platform, there are several risks involved in operating a crowdfunding platform. Here are some risks and mitigation strategies for Propartners’ crowdfunding platform:





  1. Regulatory compliance: Propartners’ shall have a competent legal and compliance team at every time to ensure that the platform complies with all regulatory requirements prescribed by the Bank of Ghana and the Securities and Exchange Commission.
  2. Fraudulent campaigns: Crowdfunding platforms are vulnerable to fraudulent campaigns where the campaign creator takes the money without delivering the promised product or service. To mitigate this risk, the platform has a robust vetting process for the campaign creators and a system in place to monitor and verify the progress of the campaign.
  3. Payment processing: Payment processing is a critical aspect of crowdfunding platforms. The platform employs only secure payment gateways offered by banks and other service providers duly approved by the Bank of Ghana.
  4. Cybersecurity: Cybersecurity is a significant risk for any online platform. The platform has robust security measures in place, such as encryption, firewalls, and intrusion detection systems, to prevent data breaches and cyber-attacks.
  5. Reputation risk: The reputation of the crowdfunding platform is critical for its success. The platform operates a transparent and fair policy for handling disputes and refunds to maintain the trust of its users.




  1. Key business processes: registration of issuers, assessment of offer documents and proposals, conducting due diligence on issuers, communicating results on assessment to issuers, profiling successful offers or projects, advertising of fundraising campaigns, monitoring collection and payment accounts, disbursement or refund of proceeds.
  1. Potential impact of disruptions: The key business processes are vulnerable to regulatory changes, natural disasters, obsolete technology and cyberattacks. The most costly of these disruptions are natural disasters and cyberattacks which can result in abrupt loss of data and money.
  1. Cost of Disruptions: Regulatory changes may require the engagement of additional team members and procurement of new tools and equipment. Regulatory changes may also reduce the number of business customers eligible to raise funds consequently resulting in reduced revenue. Obsolete technology may not be sudden but most likely because of the fast pace of inventions. An upgrade of existing platform or the deployment of a new one would certainly cost the company significant capital injection. Natural disasters and cyberattacks on the other hand may result in the loss of several millions of cedis depending on the scale of loss of data, money or infrastructure. This loss certainly would include paid or invested funds from campaign sponsors.
  1. Business continuity measures: The possible risks, disruptions and costs above are the pillars that guide our business continuity plan to develop outlines on how Propartners will respond to disruptions and ultimately to keep us in business for many generations ahead.



Our company is committed to providing our customers with high-quality products and services, as well as exceptional customer service. We understand that protecting our customers is an essential part of our business, and we take that responsibility very seriously.

This Consumer Protection Policy, together with our Terms of Use and Privacy Policy which are publicly displayed on our website, outline our commitments to ensuring that our customers are treated fairly, honestly, and with the utmost respect.




We are committed to ensuring that our products and services meet the highest standards of quality. We employ rigorous quality control measures to ensure that our products are safe, reliable and effective. If a customer experiences an issue with the quality of our products or services, we will take immediate steps to address the problem and make things right.



We believe in transparency and honesty when it comes to our pricing and advertising. We will clearly display the prices of our products and services and make sure that any special offers or discounts are clearly communicated. We will not engage in deceptive or misleading advertising practices, and we will always provide accurate and truthful information about our products and services.



We take the privacy and security of our customers’ data very seriously. We will only collect and use personal information for the purposes of providing our products and services, and we will protect that information with appropriate security measures. We will not sell or share our customers’ personal information with third parties unless it is necessary to provide our products and services, or unless we have obtained the customer’s explicit consent.






We believe in providing exceptional customer support to our customers. We will make every effort to respond to customer inquiries and complaints in a timely and efficient manner. We will also provide our customers with clear and accurate information about our products and services, including any potential risks or limitations.



We are committed to complying with all applicable laws and regulations related to customer protection. We will ensure that our products and services meet all applicable safety standards, and we will comply with all relevant advertising and marketing regulations.



Our consumer protection policy is an integral part of our commitment to our customers. We believe in treating our customers with respect and honesty, and we are committed to providing high-quality products and services, transparent pricing, secure data privacy, exceptional customer support, and compliance with all applicable laws and regulations. If you have any questions or concerns about our customer protection policy, please do not hesitate to contact us.



This Policy is inspired by the current Anti Money Laundering and Countering Financing of Terrorism Guideline as well as the Cyber and Information Security Directive issued by the Bank of Ghana.

This policy is designed to prevent money laundering, terrorism financing and cyber-attacks within the business, and to ensure compliance with applicable laws and regulations.



  1. Risk Assessment: A risk assessment of the business will be conducted annually or when there are significant changes in the business environment. This will identify the level of risk posed by money laundering and terrorism financing and the controls required to mitigate such risks.
  2. Customer Due Diligence (CDD): All customers will undergo CDD before any business is conducted with them. This includes verifying the identity of the customer, understanding the nature of the customer’s business and assessing the risk posed by the customer.
  3. Enhanced Due Diligence (EDD): EDD measures will be applied to higher-risk customers. This will involve obtaining additional information on the customer’s source of funds and wealth, and the purpose and nature of the business relationship.
  4. Transaction Monitoring: Transactions will be monitored for suspicious activity. Transactions that are unusual or do not fit the customer’s known business profile will be investigated and reported to the relevant authorities.
  5. Record Keeping: Records of all transactions and customer identification information will be maintained for at least 5 years.
  6. Reporting: Suspected money laundering or terrorism financing activities will be reported to the relevant authorities promptly.
  7. Employee Training: All employees will receive AML/CFT training to ensure that they are aware of the company’s AML/CFT policies and procedures.
  8. Independent Review: The effectiveness of the AML/CFT policy will be reviewed periodically by an independent person or party.


  1. Secure Software Development: The platform’s software has been developed with security in mind from the start, including secure coding practices, regular code reviews, and vulnerability assessments.
  2. Multi-Factor Authentication: Propartner’s platform require multi-factor authentication for all users accessing the platform. This employs a two-step authentication with a password and another form of authentication being a code sent to their email account.
  3. Encryption: All sensitive data are encrypted both in transit and at rest. This includes user data, payment information, and other sensitive data.
  4. Regular Security Assessments: The use of regular security assessments and penetration testing to identify and address any vulnerabilities in the platform.
  5. Monitoring and Logging: Implementation of real-time monitoring and logging of all platform activities. This includes user logins, transactions, and other activities. This will help to detect and respond to any security incidents.
  6. Access Controls: Implementation of access controls that restrict user access to only the data and features that they require to perform their job duties.
  7. Incident Response Plan: Development and implementation of incident response plan that outlines the steps to be taken in the event of a security incident. This plan includes communication protocols, containment measures, and a plan for restoring normal operations.
  8. Regular User Awareness Training: Employment of regular user awareness training to ensure that users are aware of the potential security risks associated with using the platform and how to identify and report suspicious activity.