Appendix AU-1: Requirements for Regulated Investment Services Involving Crypto Assets
Introducing/Offering Crypto-assets to Clients
1.Licensees must establish a policy which lays down the internal procedure and risk assessment that alicensee must undertake prior to introducing acrypto-asset for trading by its clients. The policy must be approved by the board and reviewed periodically.2. Prior to introducing acrypto-asset , alicensee must notify the CBB of its intent to introduce thecrypto-asset , provide the findings of the risk assessment undertaken in accordance with Point 8 below along with the board resolution approving thecrypto-asset .3.Licensees must provide a list of all thecrypto-assets listed on its platform no later than 10 days from the end of each quarter to the CBB.4.Licensees must have necessary blockchain monitoring capability (e.g. via monitoring systems, internal monitoring control etc.) in place before introducing thecrypto-asset on its platform.5.Licensees must not introducecrypto-assets that facilitates or may facilitate the obfuscation or concealment of the identity of a customer or counterparty orcrypto-assets that are designed to or substantially used to circumvent laws and regulations.Licensees must ensure that they only introducecrypto-assets to which they have in place the necessary AML monitoring capabilities.6.
Licensees must ensure that:(a) any actual or potential conflicts of interest in connection with the review and decision-making process have been assessed and effectively addressed, whether such actual or potential conflicts of interest are related to thelicensee’s board members, shareholders employees, their families, or any other party; and(b) records are maintained of thelicensee’s due diligence of eachcrypto-asset . This includes the final approval for introducing acrypto-asset , the documents the board of directors reviewed including an assessment of all associated material risks in connection with eachcrypto-asset approval or disapproval, such as reviews and sign-offs by various departments of thelicensee , such as the legal, compliance, cybersecurity, and operations department etc.7. Where the CBB determines that undertaking regulated services in acrypto-asset may be detrimental to the financial sector of the Kingdom of Bahrain and/or it may affect the legitimate interest of clients Thelicensees , based on the instruction of the CBB, must remove thecrypto-asset from its platform. In such scenarios, thelicensee shall remain responsible for orderly settlement of trade and any liability arising due to removing thecrypto-asset .Added: January 2024Risk Assessment
8.
Licensees must establish criteria and undertake a comprehensive risk assessment of thecrypto-assets that it intends to offer on its platform. The risks to be assessed must include, but are not limited to, the following:(a)
Licensees must conduct a thorough due diligence process to ensure that thecrypto-asset is created or issued for lawful and legitimate purposes, and not for evading compliance with applicable laws and regulations (e.g., by facilitating money laundering or other illegal activities) and that the process is subject to a strong governance and control framework.Licensees must consider the following factors while undertaking the due diligence:(i) The technological experience, track record and reputation of the issuer and its development team;(ii) The availability of a reliable multi-signature hardware wallet solution;(iii) The protocol and the underlying infrastructure, including whether it is: (1) a separate blockchain with a new architecture system and network or it leverages an existing blockchain for synergies and network effects, (2) scalable, (3) new and/or innovative or (4) thecrypto-asset has an innovative use or application;(iv) The relevant consensus protocol;(v) Developments in markets in which the issuer operates;(vi) The geographic distribution of thecrypto-asset and the relevant trading pairs, if any;(vii) Whether thecrypto-asset has any in-built anonymization functions;(viii)crypto-asset exchanges on which thecrypto-asset is traded.(b) Operational risks associated with acrypto-asset . This includes the resulting demands on thelicensee’s resources, infrastructure, and personnel, as well as its operational capacity for continued client on-boarding and client support based on reasonable forecasts considering the overall operations of thelicensee ;(c) Risks associated with any technology or systems enhancements or modification requirements necessary to ensure timely adoption or offering of any newcrypto-asset ;(d) Risks related to cybersecurity: Whether thecrypto-asset is and will be able to withstand, adapt and respond to, cyber security vulnerabilities, including size, testing, maturity, and ability to allow the appropriate safeguarding of secure private keys;(e) Traceability/Monitoring of thecrypto-asset : Whetherlicensees are able to demonstrate the origin and destination of the specificcrypto-asset , whether thecrypto-asset enables the identification of counterparties to each trade, and whether transactions in thecrypto-asset can be adequately monitored.(f) Market risks, including minimum market capitalisation, price volatility, concentration ofcrypto-asset holdings or control by a small number of individuals or entities, price manipulation, and fraud;(g) Risks relating to code defects and breaches and other threats concerning acrypto-asset and its supporting blockchain, or the practices and protocols that apply to them;(h) Risks relating to potential non-compliance with the requirements of the licensee’s condition and regulatory obligations as a result of the offering of newcrypto-asset ;(i) Legal risks associated with the newcrypto-asset , including any pending or potential civil, regulatory, criminal, or enforcement action relating to the issuance, distribution, or use of the newcrypto-asset ; and(j) Type of distributed ledger: whether there are issues relating to the security and/or usability of a distributed ledger technology used for the purposes of the crypto-asset; whether thecrypto-asset leverages an existing distributed ledger for network and other synergies; whether this is a new distributed ledger that has been demonstrably stress tested.Added: January 2024Periodic Monitoring
9.
Licensees must have policies and procedures in place to monitor thecrypto-assets to ensure that continued use of thecrypto-asset remains prudent. This includes:(a) Periodic re-evaluation ofcrypto-assets , including whether material changes have occurred, with a frequency and level of scrutiny tailored to the risk level of individualcrypto-assets , provided that the frequency of re-evaluation must at a minimum be annual;(b) Implementation of control measures to manage risks associated with individualcrypto-assets ; and(c) The existence of a process for removing ofcrypto-assets on its platform, including notice to affected customers and counterparties.Added: January 2024Disclosure
10.
Licensees must make adequate disclosures, which are easily accessible and prominently visible to clients, for each crypto-asset, containing at a minimum, the following information:(a) Details about the crypto-asset: the type of crypto-asset (payment token, asset token, utility token, stablecoin etc.), its function and details about the asset(s) where acrypto-asset is backed by asset(s);(b) The risks related to the specific crypto-asset such as, but not limited to, price volatility and cyber-security; and(c) Any other information that would assist clients to make an informed investment decision.11. Licensees must prominently display on their platform the following statement, “THE CENTRAL BANK OF BAHRAIN HAS NEITHER REVIEWED NOR APPROVED THE CRYPTO-ASSETS.”Added: January 2024Crypto-asset Custody
12. Alicensee intending to offercrypto-asset custody service must provide to the CBB, for prior written approval, details of custodial arrangement put in place to safeguard, store, hold or maintain custody ofcrypto-assets .13. To the extent alicensee stores, holds, or maintains custody or control ofcrypto-assets on behalf of a client, suchlicensee must holdcrypto-assets of the same type and amount as that which is owed or obligated to such other client.14. Alicensee is prohibited from selling, transferring, assigning, lending, hypothecating, pledging, or otherwise using or encumberingcrypto-assets stored, held, or maintained by, or under the custody or control of, suchlicensee on behalf of a client except for the sale, transfer, or assignment of suchcrypto-asset at the direction of the client.15. Alicensee that undertakescrypto-asset custody service through a third partycrypto-asset custodian , must establish and maintain a system for assessing the appropriateness of its selection of thecrypto-asset custodian and assess the continued appointment of thatcrypto-asset custodian periodically as often as is reasonable. Thelicensee must make and retain a record of the grounds on which it satisfies itself as to the appropriateness of its selection or, following a periodic assessment, continued appropriateness of thecrypto-asset custodian .16. Alicensee that maintains custody or control ofcrypto-assets on behalf of a client must store, at a minimum, 90% of client’scrypto-assets in cold wallets to minimise exposure to losses arising from a compromise or hacking. The requirement to hold 90% of client’scrypto-assets in cold wallet is to be calculated separately for eachcrypto-asset that is offered on thelicensee’s platform and not at aggregate level.17. Alicensee must have a documented policy detailing the mechanism for the transfer ofcrypto-assets between hot, cold and other storage. The scope of authority of each function designated to perform any non-automated processes in such transfers must be clearly specified in the policy document.18. Alicensee that maintains custody or control ofcrypto-assets must not, at any time, permit arrangements whereby just a party or signatory is able to completely authorise the movement, transfer or withdrawal ofcrypto-assets held under custody on behalf of clients. In particular,licensees must not have custody arrangements whereby only a sole person can fully access the private key or keys for the crypto assets held under custody by thelicensee .19.licensees that maintain custody or control ofcrypto-assets are required to have policies and procedures in place that clearly describe the process that will be adopted in the event that the licensee comes to know or suspects that thecrypto-assets it is holding under custody on behalf for clients have been compromised, such as in the event of a hacking attack, theft or fraud. Such policies and procedures must detail the specific steps thelicensee will take to protect client’scrypto-assets in the event of such incidents.Licensees must also have the ability to immediately halt all further transactions with regard to thecrypto-assets .20.licensees must have written procedures for dealing with events such as forks (hard, soft or temporary forks) or air drops from an operational and technical point of view.21. Where a licensee supports a new protocol, it must ensure that changes in the underlying protocol of acrypto-asset that result in a fork are managed and tested proactively. This includes temporary forks which should be managed for reverse compatibility for as long as required. Where alicensee supports a new protocol, alicensee must ensure that their clients are able to deposit and withdrawcrypto-assets in and out of the wallet as and when requested before and after a fork (except during go-live). Clients must be notified well in advance of any periods of time when deposits and withdrawals are not feasible.22. Where the underlying protocol of acrypto-asset is changed, and the older version of thecrypto-asset is no longer compatible with the new version and/or there is an entirely new and separate version of the crypto asset (hard fork),licensees must ensure that client balances on the old version are reconciled with the new version of thecrypto-asset . This includes availability of reverse compatibility for as long as required.Licensees maintain transparent lines of communication with their clients on how they are managing clientscrypto-asset holdings in such a scenario.23. In the case of a hard fork, alicensee , where it supports a new protocol, must proactively manage any discrepancy between the balances recorded on the previous version versus the new version by engaging with the entity which is responsible for updating and supporting the underlying protocol of the relevantcrypto-asset . Additionally,licensees must ensure that, where they seek to offer services in relation to thecrypto-asset associated with the new version of the underlying protocol, this new crypto-asset meets the requirements for acrypto-asset and that they notify the CBB well in advance of offering the new crypto-asset as part of its activities.24. In compliance with Paragraph AU-1.1.22H, when undertaking an appropriate risk assessment of the third party
crypto-asset custodian,licensees should take into account the following:(a) The expertise and market reputation of the third partycrypto-asset custodian, and once acrypto-asset has been lodged by thelicensee with the third partycrypto-asset custodian, thecrypto-asset custodian’s performance of its services to thelicensee ;(b) The arrangements, including cyber security measures, for holding and safeguardingcrypto -assets;(c) An appropriate legal opinion as to the protection ofcrypto-assets in the event of insolvency of the custodian;(d) Whether the third partycrypto-asset custodian is regulated and by whom;(e) The capital or financial resources of the third partycrypto-asset custodian ;(f) The credit rating of the third partycrypto-asset custodian ; and(g) Any other activities undertaken by the third partycrypto-asset custodian and, if relevant, any affiliated company.25.
Licensees should consider, at the minimum, the following two types ofcrypto-asset wallets:(a) Custodial Wallet: the custodial wallet provider holdscrypto-assets (e.g., the private keys) as an agent on behalf of clients and has at least some control over these crypto-assets.Licensees that holdcrypto-assets on behalf of their clients should generally offer custodial wallets and may even offer multi-signature wallets. Clients using custodial wallets do not necessarily have full and sole control over their crypto-assets. In addition, there is a risk that should the custodial wallet provider cease operations or get hacked, clients may lose their crypto-assets; and(b) Non-Custodial (Self-Custody) Wallets: the non-custodial wallet provider, typically a third-party hardware add/or software company, offers the means for each client to hold theircrypto-assets (and fully control private keys) themselves. The non-custodial wallet provider does not control client’scrypto-assets – it is the client that has sole and full control over theircrypto-assets . Hardware wallets, mobile wallets, desktop wallets and paper wallets are generally examples of non-custodial wallets. Clients using non-custodial wallets have full control of and sole responsibility for theircrypto-assets , and the non-custodial wallet provider does not have the ability to effect unilateral transfers of clients’crypto-assets without clients’ authorisation.In addition to the two main crypto-asset wallet types described above, the CBB recognises that there may be alternativecrypto-asset wallet models in existence, or which may emerge in future.Licensees seeking to provide such alternative types ofcrypto-asset wallets and who are unsure of the regulatory obligations they may attract, are encouraged to contact the CBB.Only entities providing the custodial wallets as described in above are considered to be carrying out the regulated activity of safeguarding, storing, holding, maintaining custody of or arranging custody on behalf of clients forcrypto-assets . With respect to the non-custodial wallets as described above, the wallet provider is merely providing the technology; it is the wallet user himself who has full control of and responsibility for hiscrypto-assets .26.Licensees must assess the risks posed to each storage method in view of the new developments in security threats, technology and market conditions and must implement appropriate storage solutions to ensure the secure storage ofcrypto-assets held on behalf of clients. Wallet storage technology and any upgrades should be tested comprehensively before deployment to ensure reliability. Alicensee must implement and must ensure that its third-partycrypto-asset custodian implements, measures to deal with any compromise or suspected compromise of all or part of any seed or private key without undue delay, including the transfer of all clientcrypto-assets to a new storage location as appropriate.27.
Licensees must have, or where thelicensee uses the service of a third partycrypto-asset custodian must ensure that the third party crypto-asset custodian has, adequate processes in place for handling deposit and withdrawal requests forcrypto-asset to guard against loss arising from theft, fraud and other dishonest acts, professional misconduct or omissions. In this regard, alicensee must:(a) continuously monitor major developments (such as technological changes or the evolution of security threats) relevant to allcrypto-assets included for trading. There must be clear processes in place to evaluate the potential impact and risks of these developments, as well as for handling fraud attempts specific to distributed ledger technology (such as 51% attacks), and these processes should be proactively executed;(b) ensure that client IP addresses as well as wallet addresses used for deposit and withdrawal are whitelisted, using appropriate confirmation methods;(c) have clear processes in place to minimise the risks involved with handling deposits and withdrawals, including whether deposits and withdrawals are performed using hot or cold storage, whether withdrawals are processed on a real-time basis or only at certain cut-off times, and whether the withdrawal process is automatic or involves manual authorisation;(d) ensure that any decision to suspend the withdrawal ofcrypto-assets is made on a transparent and fair basis, and is communicated without delay to all its clients; and(e) ensure that the above processes include safeguards against fraudulent requests or requests made under duress as well as controls to prevent one or more officers or employees from transferring assets to wallet addresses other than the client’s designated wallet address.28. A
licensee must at least every calendar month:(a) reconcile allcrypto-assets held by thelicensee , or its third-partycustodian , and reconcile the result to the records of thelicensee ; and(b) reconcile individual client balances with thelicensee’s records ofcrypto-assets balances held in client accounts; and(c) where thelicensee discovers discrepancies after carrying out the above reconciliations, it must maintain a record of such discrepancies and the measures taken to remedy such discrepancies.Added: January 2024Key Management and Wallet Storage
29. Alicensee must establish and document keyman risk management measures that include arrangements in place should individuals holding encryption keys or passcodes to stored assets, including wallets, or information be unavailable unexpectedly due to death, disability or other unforeseen circumstances.30. Alicensee must ensure that it maintains no encrypted accounts that cannot be retrieved in the future for any reason. It must also advise its clients who maintain wallets with firms outside Bahrain (i.e. not CBB licensees) and not licensed by the CBB about any associated risks.31.Licensees must implement robust procedures and protective measures to ensure the secure generation, storage, backup and destruction of both public and private keys.32. In order to access crypto assets, the device on which the private key is held needs access to a network (which, in most cases is through the internet). A wallet where the private key is held on a network attached device is called a hot wallet. Hot wallets are vulnerable to hacking attempts and can be more easily compromised by viruses andmalware .33.Crypto assets that do not need to be immediately available must be held offline, in a ‘cold wallet’.34. Both hot and cold wallets must be password protected and encrypted. The key storage file that is held on the online or offline device must be encrypted. The user is therefore protected against theft of the file (to the degree the password cannot be cracked). However,malware on the machine may still be able to gain access (e.g., a keystroke logger to capture the password).35.Licensees must use multi-signature wallets (e.g., where multiple private keys are associated with a given public key and a subset of these private keys, held by different parties, are required to authorise transactions). Noting that there is no way to recover stolen or lost private keys unless a copy of that key has been made, multi-signature walletsmayoffer more security because a user can still gain access to itscrypto-assets when two or more Private Keys remain available.36. To mitigate the risks associated with hot wallets, private keys can be stored in a cold wallet, which is not attached to a network.
Licensees should implement cold wallet key storage where possible if they are offering wallet services to their Clients.Wallets may also be stored on a secondary device that is never connected to a network. This device, referred to as an air-gapped device, is used to generate, sign, and export transactions. Care should be taken not to infect the air-gapped device withmalware when, for example, inserting portable media to export the signed transactions. Hardware security modules emulate the properties of an air gap. A proper policy must be created to describe the responsibilities, methods, circumstances and time periods within which transactions can be initiated. Access and control of single private keys should be shared by multiple users to avoid transactions by a single user.Some wallet solutions enable cryptographic keys to be derived from a user-chosen password (the “seed”) in a “deterministic” wallet. The most basic version requires one password per key pair. A Hierarchical Deterministic wallet derives a set of keys from a given seed. The seed allows a user to restore a wallet without other inputs.37.Licensees offering deterministic wallet solutions must ensure that users are provided with clear instructions for situations where keys, seeds or hardware supporting such wallet solutions are lost.38. A
licensee must establish and implement strong internal controls and governance procedures for private key management to ensure all cryptographic seeds and private keys are securely generated, stored and backed up. Alicensee using a third party crypto-asset custodian must ensure that the third-party custodian establishes and implements such controls and procedures. These include the following:(a) The generated seed and private key must be sufficiently resistant to speculation or collusion. The seed and private key must be generated in accordance with applicable international security standards and industry best practices, so as to ensure that the seeds (where Hierarchical Deterministic Wallets, or similar processes, are used) or private keys (if seed are not used) are generated in a non-deterministic manner which ensures randomness and thus are not reproducible. Where practicable, seed and private key must be generated offline and kept in a secure environment, such as a Hardware Security Module (HSM), with appropriate certification for the lifetime of the seeds or private keys;(b) Detailed specifications for how access to cryptographic devices or applications is to be authorised, covering key generation, distribution, use and storage, as well as the immediate revocation of a signatory’s access as required;(c) Access to seed and private key relating tocrypto-assets is tightly restricted amongapproved persons , no singleapproved person has possession of information on the entirety of the seed, private key or backup passphrases, and controls are implemented to mitigate the risk of collusion among authorised personnel; and(d) Distributed backups of seed or private key is kept so as to mitigate any single point of failure. The backups need to be distributed in a manner such that an event affecting the primary location of the seed or private key does not affect the backups. The backups should be stored in a protected form on external media (preferably HSM with appropriate certification). Distributed backups should be stored in a manner that ensures seed and private key cannot be regenerated based solely on the backups stored in the same physical location. Access control to the backups needs to be as stringent as access control to the original seed and private key.39.
Licensees must establish, maintain and implement a private key storage policy to ensure effective and prudent safekeeping of the seed and private key at all times. In particular, such policy must address:(a) the keyman risk associated with the storage of seed and private key is appropriately addressed;(b) the seed and private key can be retrieved at a short notice without excessive reliance on one or more individuals who may be unavailable due to death, disability or other unforeseen circumstances; and(c) where alicensee maintains a physical copy of the seed and private key, the physical copies of seed and private key must be maintained in Bahrain in a secure and indestructible manner and the same can be used to access the wallets if need arises.The private key storage policy along with other documents and evidences confirming that the seed and private key are held securely must be made available to the CBB upon request.Added: January 2024Transaction with Counterparties
40.
Licensees must use appropriate technology and wherever appropriate third-party services to identify the situations referred to below, and other additional mitigating or preventive actions as necessary to mitigate the money laundering and terror financing risks involved:(a) the use of proxies, any unverifiable or high-risk IP geographical locations, disposable email addresses or mobile numbers, or frequently changing the devices used to conduct transactions; and(b) transactions involving tainted wallet addresses such as “darknet” marketplace transactions and those involving tumblers.(c) where an applicant’s IP address is masked alicensee must take reasonable steps to unmask the IP address or decline to provide services to that applicant.41.
Licensees must establish and maintain adequate and effective systems and processes, including suspicious transaction indicators to monitor transactions with a client or counterparty involvingcrypto- assets and conduct appropriate enquiry and evaluation of potentially suspicious transactions identified. In particular:(a) identify and prohibit transactions with wallet addresses or their equivalent which are compromised or tainted; and(b) employ technology solutions which enable the tracking ofcrypto-assets through multiple transactions to more accurately identify the source and destination of thesecrypto-assets .For the purposes of (b), a wallet address is compromised or tainted where there is reasonable suspicion that it is used for the purpose of conducting fraud, identity theft, extorting ransom or any other criminal activity.Alicensee should take reasonable measures to avoid transactions with anothercrypto-asset entity, infrastructure or service provider where the counterparty is unknown or anonymous (e.g., via certain peer to peer or decentralised exchanges) at any stage of its business process.Added: January 2024Disclosure to Clients
42. As part of establishing a relationship with a
client , and prior to entering into an initial transaction with such client,licensee must disclose in clear, conspicuous, and legible writing in both Arabic and English languages, all material risks associated withcrypto-asset products and services including at a minimum, the following:(a) acrypto-asset is not a legal tender and is not backed by the government;(b) legislative and regulatory changes or actions at national level or international level may adversely affect the use, transfer, exchange, and value ofcrypto-assets ;(c) transactions incrypto-assets may be irreversible, and, accordingly, losses due to fraudulent or accidental transactions may not be recoverable;(d) somecrypto-asset transactions may be deemed to be made when recorded on a public ledger, which is not necessarily the date or time that theclient initiates the transaction;(e) the value ofcrypto-assets may be derived from the continued willingness of market participants to exchangefiat currency forcrypto-asset , which may result in the potential for permanent and total loss of value of a particularcrypto-asset should the market for thatcrypto-asset disappear;(f) the volatility and unpredictability of the price ofcrypto-assets relative tofiat currency may result in significant loss over a short period of time;(g) cybersecurity risks associated withcrypto-assets including the risk of partial or full loss of crypto-assets in the event of a cyber-attack, and measures that have been put in place to mitigate the cyber security risks;(h) the nature ofcrypto-assets means that any technological difficulties experienced by thelicensee may prevent the access or use of a client’scrypto-assets ;(i) any investor protection mechanism;(j) the rights and entitlements of aclient when events such as, but not limited to, forks and airdrops occur;(k) how they execute and routeclient’s order and source liquidity (e.g. whether they pass or route orders to an exchange to execute). Where thelicensee routesclient orders to one or more crypto-asset exchanges for execution, it must disclose details of all the crypto-asset exchanges; and(l) how it determines the prices of thecrypto-assets it quotes to clients.Added: January 2024Prevention of Fraud
43.
Licensees must take reasonable steps to detect and prevent fraud, including by establishing and maintaining a written anti-fraud policy. The anti-fraud policy must, at a minimum, include:(a) the identification and assessment of fraud-related risk areas;(b) procedures and controls to protect against identified risks;(c) allocation of responsibility for monitoring risks and establish real-time/near real-time fraud risk monitoring and surveillance system; and(d) procedures for the periodic evaluation and revision of the anti-fraud procedures, controls, and monitoring mechanisms.44. Licensees must, as a minimum, have in place systems and controls with respect to the following:
(a) Crypto-asset Wallets: Procedures describing the creation, management and controls of crypto-asset wallets, including:
(i) wallet setup/configuration/deployment/deletion/backup and recovery;(ii) wallet access privilege management;(iii) wallet user management;(iv) wallet Rules and limit determination, review and update; and(v) wallet audit and oversight.(b) Private keys: Procedures describing the creation, management and controls of private keys, including:
(i) private key generation;(ii) private key exchange;(iii) private key storage;(iv) private key backup;(v) private key destruction; and(vi) private key access management.(c) Origin and destination of
crypto-assets : Systems and controls to mitigate the risk of misuse ofcrypto-assets , setting out how:(i) the origin ofcrypto-asset is determined, in case of an incoming transaction; and(ii) the destination ofcrypto-asset is determined, in case of an outgoing transaction.Added: January 2024Professional Indemnity Insurance
45.
Licensees must ensure that professional indemnity insurance, inter alia:(a) Covers any legal liability in consequence of any negligent act, error or omission in the conduct of thelicensee’s business by thelicensee or any person employed by it or otherwise acting for it, including consultants under a contract for service with thelicensee ;(b) Covers legal defence costs which may arise in consequence of any negligent act, error or omission in the conduct of thelicensee’s business by thelicensee or any person employed by it or otherwise acting for it, including consultants under a contract for service with thelicensee ;(c) Covers any legal liability in consequence of any dishonest, fraudulent, criminal or malicious act, error or omission of any person at any time employed by thelicensee , or otherwise acting for it, including consultants under a contract for service with thelicensee ; and(d) Covers loss of and damage to documents and records belonging to the licensee or which are in the care, custody or control of thelicensee or for which thelicensee is responsible; including also liability and costs and expenses incurred in replacing, restoring or reconstructing the documents or records; including also consequential loss resulting from the loss or damage to the documents or records.Added: January 2024