/* IMPORT FONTS */
@import url(‘https://fonts.googleapis.com/css2?family=Encode+Sans:wght@400;600;800&family=Roboto:wght@300;400;500&display=swap’);

:root {
–uba-red: #D71920;
–uba-dark: #222222;
–uba-grey: #666666;
}

body {
font-family: ‘Roboto’, sans-serif;
color: var(–uba-dark);
}

.uba-container {
max-width: 1000px;
margin: auto;
line-height: 1.7;
}

/* HEADINGS (Encode Sans) */
h1, h2, h3, h4, h5, h6 {
font-family: ‘Encode Sans’, sans-serif;
margin-bottom: 10px;
}

h1 { font-size: 50px; font-weight: 800; }
h2 { font-size: 42px; font-weight: 600; }
h3 { font-size: 34px; font-weight: 600; }
h4 { font-size: 26px; font-weight: 600; }
h5 { font-size: 21px; font-weight: 600; }
h6 { font-size: 17px; font-weight: 600; }

p {
font-size: 17px;
font-weight: 400;
color: var(–uba-grey);
}

/* SECTION TITLE */
.section-title {
color: var(–uba-red);
border-bottom: 3px solid var(–uba-red);
display: inline-block;
padding-bottom: 5px;
margin-bottom: 20px;
}

/* LISTS */
ul {
padding-left: 20px;
}

li {
margin-bottom: 10px;
}

/* BUTTONS */
.uba-btn {
display: inline-block;
padding: 15px 25px;
font-size: 15px;
border-radius: 5px;
text-transform: uppercase;
text-decoration: none;
transition: all 0.3s ease;
font-family: ‘Encode Sans’, sans-serif;
}

/* PRIMARY BUTTON */
.uba-btn-primary {
background: var(–uba-red);
color: #fff;
border: none;
}

.uba-btn-primary:hover {
background: #b80f16;
}

/* OUTLINE BUTTON */
.uba-btn-outline {
border: 2px solid var(–uba-red);
color: var(–uba-red);
background: transparent;
}

.uba-btn-outline:hover {
background: var(–uba-red);
color: #fff;
}

/* LINK BUTTON */
.uba-link {
color: var(–uba-red);
font-weight: 500;
text-decoration: none;
}

.uba-link:hover {
text-decoration: underline;
}

Information Security Management System (ISMS)

UBA Kenya is committed to ensuring the security of its information and information security assets and has implemented an Information Security Management System (ISMS) in accordance with the ISO 27001:2022 standard. The ISMS helps protect the Bank’s information and information assets.

The Bank’s senior management demonstrates its commitment to information security by establishing objectives and policies and providing the necessary resources to maintain and continuously improve security.

Information Security Policy Statement

  • The Board and management are committed to preserving the confidentiality, integrity, and availability of all information assets to support competitiveness, compliance, and brand reputation.
  • The Bank enforces an Information Security Management Policy that is continuously reviewed and aligned with business objectives.
  • The risk management framework supports identification, assessment, and treatment of information risks.
  • Key controls include:

    • Business continuity and contingency planning
    • Data backup and recovery
    • Malware and intrusion control
    • Access control systems
    • Incident reporting and management
  • The Information Security Department manages risk treatment plans with oversight from governance committees.
  • All employees and third parties must comply and receive appropriate training and awareness.
  • The policy is reviewed annually and aligned with ISO 27001:2022 compliance requirements.
  • The Board owns and approves the policy as a controlled document.

ISMS Objectives

  • Ensure effective governance of information security and data privacy.
  • Assign roles and responsibilities for data protection across the Bank.
  • Engage external experts and authorities for monitoring and incident response.
  • Promote a multidisciplinary approach to information security.
  • Ensure third-party solutions do not compromise data security.
  • Control access to systems and sensitive information.
  • Assess risks in all external business engagements.


Primary Button
Outline Button
Link Button →