Connect with us

Feature/OPED

Esan Traditional Marriage and Taboos

Published

on

Esan Traditional Marriage

By Prince Kelly O. Udebhulu

Esan people value their children, male or female, this is why unlike some cultures; the bride price is very low. The payment of bride price is vital to the conclusion of marriage notable under Esan native law, which like any other customary law marriage in Nigeria; it is recognized under the Marriage Act.

The impression being that Esan people do not sell their daughters in marriage, the requested amount for bride price is usually meagre; N24 (representing 24 cowries or British pounds used in the pre-colonial and colonial days).

A huge sum is usually presented these days, from which the prominent members of the bride’s family would remove a small amount and refund the balance to the groom for his wife, their daughter`s up keeping.

A calculated message to the groom that she is still considered a family daughter even though she is married, hence the tradition that at death, the corpse of Esan woman is returned to her family to be buried with her ancestors.

We have two major types of marriage in Esan Land:

-Monogamy- A marriage of one man to one woman,

-and Polygamy- A marriage of one man to two or more wives.

Marriage also known as matrimony is a socially or ritually recognized union or legal marriage contract between two individuals that establish obligations and rights between them and their children and in-laws.

However, the concept of marriage is not a new practice and it has been a part of our society since ancient times. Marriage is a universally accepted social institution, but the types of marriages practiced in the world can be diverse. Different societies and cultures have different religious beliefs and practices for the recognition of a relationship.

In the days of our fore-fathers in Esan tradition and culture, a woman married another woman (Stylish lesbianism) but the only different to the modern day lesbianism is that the wife (woman) had children through a calculated and arranged mechanism and channel whereby an opposite sèx visited nocturnally or vice-versa in a more clandestinely MOU with the husband (woman) and children from the wife answered the husband’s (woman) name as surname. Not adopted children as in the modern days lèsbianism. It mainly happened then under a scenario whereby an acclaimed wealthy woman in the community happened to be a barren woman and she decided to have children of her own so that her lineage continued after her demise.

It worthy of note that all due responsibilities and accountabilities as a wife and husband with the exception of having sèxual intercourse abound in this type of marriage.

Just as it is difficult to ascertain the actual opposite sèx who fertilized the wife of a barren man as often happened under and after a mutual family rite (ritual) that allowed the said wife of a barren man to extend her legs to outsider besides her betrothed husband, so it was under the practice of woman married woman in those days in our history.

Traditional marriage is usually an arrangement between two families as opposed to an arrangement between two individuals.

Accordingly, there is mutual requirement from the bride and bridegroom to make the marriage work as any problem will usually affect both families and strain the otherwise cordial relationship between them.

The man usually pays the bride-price and is thus considered the head of the family. Adultery is acceptable for men, but forbidden for women.

Marriage ceremonies vary among Esan Clans

Prior 1897, girls were generally regarded as ready for marriage between the ages of 15 through 18. Courtship can begin among the individuals during the trip to the river to fetch water or during the moonlight play – EVIONTOI.

Sometimes parents actually go looking for a wife or husband for their children. This led to the BETROTHAL SYSTEM where marriage were conducted with or without the consent of the individuals involved. Sometimes such betrothal, took place when a baby girl was born. Suitors would begin to approach the parents by sending a log of wood or bundle of yam to the parents of the child. You are likely to hear statements such as -” Imu’ Ikerhan gboto”-I have dropped a log of firewood. When a boy decides to get married and the parents have accepted the bride as a prospective daughter-in-law, messages go up and down between the two families. This is called IVBUOMO-SEEKING FOR A BRIDE.

Series of investigations are conducted by both families – about disease, scandals and crimes which may affect the families. The term of the marriage which of course may include the pride-price would be settled in some families. Gifts for mother of the bride and IROGHAE- members of the extended family would be part of the settlement. Then a date would be set for the ceremony which would take place in the home of the woman’s family. This was called IWANIEN OMO in the old days the go-between for the two families must be somebody well known by both families. There would of course be a lot of merriment on the day of marriage when the bride and the bridegroom are presented openly to the two families.

Kola nuts and wine are presented. The OKA EGBE of the woman’s family would normally preside over the ceremony. Prayers are said and kola nuts broken at the family shrine. Rituals vary from family to family. The woman always sits on her father’s lap before she is given away. Amidst prayers, laughter and sometimes tears, the woman would be carefully hoisted on the lap of the OKA EGBE of the bride’s family.

Many years ago, the woman would be sent to the bridegroom house about thirteen days after IWANIEN OMO and gingerly hoisted either on her husband’s lap or the OKAEGBE of his family. They are done immediately nowadays in the home of the bridegroom. The bride, now known as OVBIOHA would be led by her relatives to the husband’s house with all her property meanwhile the family and friends of the bridegroom are feasting, drinking, singing and dancing while waiting for the bride to arrive.

As the family and friends of the bridegroom awaits the OVBIOHA, messages will arrive suggesting that there are UGHUNGHUN-barriers on the road. The bridegroom has to remove the barriers by sending money to the party, bringing the wife to him or else the wife will not arrive. As they approach the house of the bridegroom, you can hear the echo of OVBIOHA GHA MIEN ARO-ARO, meaning “Bride! Be proud/ the Bride is proud.” Arrival at the bridegroom’s house is immediately followed by the ceremony of IKPOBO-OVBIOHA-washing of the bride’s hands. A bowl of water with money in it would be brought out. A woman in the groom’s family, sometimes his senior wife would bring out a new head tie, wash the hand of the Ovbioha in the bowl and dries her hand with the head tie. Both the new head tie and the money in the bowl belong to the bride.

A few days later, the bride would be taken to the family altar and prayers are said for her. She undergoes what is called the IGBIKHIAVBO ceremony-beating of OKRO on the flat mortar. This would be followed by a visit by the bride’s mother-in-law and other female members of the family to the newlywed, if they are not living in the same house. She would demand the bed spread on which they both slept when they had their “first sèxual relationship” after the wedding and if the bed-spread was stained with blood, the bride was regarded as a vìrgin and as such she would be given many presents including money. If it is proven that she was not a vìrgin, then the preparation for the ceremony of IVIHEN-OATH TAKING ceremony would be set in motion.

First, she has to confess to the older women, the “other men” in her life before she got married. The husband would never be told any of her confessions, then, she would be summoned to the family shrine early in the morning, without warning to take an oath of FIDELITY, FAITHFULNESS, TRUSTWORTHINESS, HONESTY ETC, to her husband and family. This ceremony is the equivalent of the oath people take in the church, mosque or marriage registry. Once the oath taking ceremony is over, she would be fully accepted back into the family and immediately becomes married not only to her husband but to the family and sometimes to the community.

Christianity, Islam and Westernization of today have weakened the Edo traditional system of marriage. The traditional ceremony is sometimes done the same day with many of the rituals avoided in the name of Christianity or Islam and many women would rather die than take the oath we described above. It was the oath that kept Edo women out of prostitution for many years; thus making the Edo women in general to be regarded as very faithful, trustworthy, honest with strong fidelity to their husbands making neighbouring tribes want them as wives. It also made divorce on the ground of adultery, less common in those days.

TABOOS WHEN YOU MARRY AN ESAN MAN

There are “don’ts and dos” in Esan marriages but some are enumerated below.

When a woman is married to an Esan man, it is an abomination for another man to touch her wrapper, else it is considered as though she has committed adultery unless the married woman shouts at the man or reports to her husband.

– When a woman commits adultery, she will lose her children and her life as repercussion for the abominable act unless she confesses and as restitution, she is striped completely unclad, her head is shaved, a part of her private part is shaved, one of her armpits is shaved and both of her hands are tied behind her, while a basket full of trash is placed on her head. She is then paraded around the community by other women.

– If this is not done and the woman goes ahead to cook for her children, her children will die one after the other including her. If she also confesses to her husband and out of love or pity her husband conceals the confession, he will die within a week, if he eats a meal cooked by the woman.

– It is a taboo for another man to cross an outstretched legs of a married woman else it is considered as though she already had sèx with the man.

– A married woman cannot steal her husband’s money in Esan land as it is seen as an abomination. She must tell him about it.

– It is considered an abomination for a man to sit on the matrimonial bed of an Esan couple as it is seen as a taboo.

– It is also an abomination for a woman to spit on her husband under any circumstance. If she does, she must sacrifice a fowl to appease him but the man can bathe his wife with his own spit.

– It is seen as an abomination for an Esan man to use the same bathing bucket with his wife but due to widespread Christianity, this taboo has almost gone into extinction.

– The husband of a woman who just gave birth must stay away from her sèxually for three months as she’s considered unclean because of the after delivery blood she discharges.

On list of requirements to marriage, contact your would-be in-laws as it varies from family to family.

Ref: Dr. C. Okojie.

  1. Joy.

Esan historians.

Advertisement
8 Comments

8 Comments

  1. Pingback: Courtship and Marriage Traditions Among Esan, Ibibio, Igbo, Yoruba, and Mumuye Peoples of Nigeria – The Black IVY LIVES

Leave a Reply

Your email address will not be published. Required fields are marked *

Feature/OPED

How Christians Can Stay Connected to Their Faith During This Lenten Period

Published

on

Lenten Period

It’s that time of year again, when Christians come together in fasting and prayer. Whether observing the traditional Lent or entering a focused period of reflection, it’s a chance to connect more deeply with God, and for many, this season even sets the tone for the year ahead.

Of course, staying focused isn’t always easy. Life has a way of throwing distractions your way, a nosy neighbour, a bus driver who refuses to give you your change, or that colleague testing your patience. Keeping your peace takes intention, and turning off the noise and staying on course requires an act of devotion.

Fasting is meant to create a quiet space in your life, but if that space isn’t filled with something meaningful, old habits can creep back in. Sustaining that focus requires reinforcement beyond physical gatherings, and one way to do so is to tune in to faith-based programming to remain spiritually aligned throughout the period and beyond.

On GOtv, Christian channels such as Dove TV channel 113, Faith TV and Trace Gospel provide sermons, worship experiences and teachings that echo what is being practised in churches across the country.

From intentional conversations on Faith TV on GOtv channel 110 to true worship on Trace Gospel on channel 47, these channels provide nurturing content rooted in biblical teaching, worship, and life application. Viewers are met with inspiring sermons, reflections on scripture, and worship sessions that help form a rhythm of devotion. During fasting periods, this kind of consistent spiritual input becomes a source of encouragement, helping believers stay anchored in prayer and mindful of God’s presence throughout their daily routines.

To catch all these channels and more, simply subscribe, upgrade, or reconnect by downloading the MyGOtv App or dialling *288#. You can also stream anytime with the GOtv Stream App.

Plus, with the We Got You offer, available until 28th February 2026, subscribers automatically upgrade to the next package at no extra cost, giving you access to more channels this season.

Continue Reading

Feature/OPED

Turning Stolen Hardware into a Data Dead-End

Published

on

Apu Pavithran Turning Stolen Hardware

By Apu Pavithran

In Johannesburg, the “city of gold,” the most valuable resource being mined isn’t underground; it’s in the pockets of your employees.

With an average of 189 cellphones reported stolen daily in South Africa, Gauteng province has become the hub of a growing enterprise risk landscape.

For IT leaders across the continent, a “lost phone” is rarely a matter of a misplaced device. It is frequently the result of a coordinated “snatch and grab,” where the hardware is incidental, and corporate data is the true objective.

Industry reports show that 68% of company-owned device breaches stem from lost or stolen hardware. In this context, treating mobile security as a “nice-to-have” insurance policy is no longer an option. It must function as an operational control designed for inevitability.

In the City of Gold, Data Is the Real Prize

When a fintech agent’s device vanishes, the $300 handset cost is a rounding error. The real exposure lies in what that device represents: authorised access to enterprise systems, financial tools, customer data, and internal networks.

Attackers typically pursue one of two outcomes: a quick wipe for resale on the secondary market or, far more dangerously, a deep dive into corporate apps to extract liquid assets or sellable data.

Clearly, many organisations operate under the dangerous assumption that default manufacturer security is sufficient. In reality, a PIN or fingerprint is a flimsy barrier if a device is misconfigured or snatched while unlocked. Once an attacker gets in, they aren’t just holding a phone; they are holding the keys to copy data, reset passwords, or even access admin tools.

The risk intensifies when identity-verification systems are tied directly to the compromised device. Multi-Factor Authentication (MFA), widely regarded as a gold standard, can become a vulnerability if the authentication factor and the primary access point reside on the same compromised device. In such cases, the attacker may not just have a phone; they now have a valid digital identity.

The exposure does not end at authentication. It expands with the structure of the modern workforce.

65% of African SMEs and startups now operate distributed teams. The Bring Your Own Device (BYOD) culture has left many IT departments blind to the health of their fleet, as personal devices may be outdated or jailbroken without any easy way to know.

Device theft is not new in Africa. High-profile incidents, including stolen government hardware, reinforce a simple truth: physical loss is inevitable. The real measure of resilience is whether that loss has any residual value. You may not stop the theft. But you can eliminate the reward.

Theft Is Inevitable, Exposure is Not

If theft cannot always be prevented, systems must be designed so that stolen devices yield nothing of consequence. This shift requires structured, automated controls designed to contain risk the moment loss occurs.

Develop an Incident Response Plan (IRP)
The moment a device is reported missing, predefined actions should trigger automatically: access revocation, session termination, credential reset and remote lock or wipe.

However, such technical playbooks are only as fast as the people who trigger them. Employees must be trained as the first line of defence —not just in the use of strong PINs and biometrics, but in the critical culture of immediate reporting. In high-risk environments, containment windows are measured in minutes, not hours.

Audit and Monitor the Fleet Regularly

Control begins with visibility. Without a continuous, comprehensive audit, IT teams are left responding to incidents after damage has occurred.

Opting for tools like Endpoint Detection and Response (EDR) allows IT teams to spot subtle, suspicious activities or unusual access attempts that signal a compromised device.

Review Device Security Policies
Security controls must be enforced at the management layer, not left to user discretion. Encryption, patch updates and screen-lock policies should be mandatory across corporate devices.

In BYOD environments, ownership-aware policies are essential. Corporate data must remain governed by enterprise controls regardless of device ownership.

Decouple Identity from the Device
Legacy SMS-based authentication models introduce avoidable risk when the authentication channel resides on the compromised handset. Stronger identity models, including hardware tokens, reduce this dependency.

At the same time, native anti-theft features introduced by Apple and Google, such as behavioural theft detection and enforced security delays, add valuable defensive layers. These controls should be embedded into enterprise baselines rather than treated as optional enhancements.

When Stolen Hardware Becomes Worthless

With POPIA penalties now reaching up to R10 million or a decade of imprisonment for serious data loss offences, the Information Regulator has made one thing clear: liability is strict, and the financial fallout is absolute. Yet, a PwC survey reveals a staggering gap: only 28% of South African organisations are prioritising proactive security over reactive firefighting.

At the same time, the continent is battling a massive cybersecurity skills shortage. Enterprises simply do not have the boots on the ground to manually patch every vulnerability or chase every “lost” terminal. In this climate, the only viable path is to automate the defence of your data.

Modern mobile device management (MDM) platforms provide this automation layer.

In field operations, “where” is the first indicator of “what.” If a tablet assigned to a Cape Town district suddenly pings on a highway heading out of the city, you don’t need a notification an hour later—you need an immediate response. An effective MDM system offers geofencing capabilities, automatically triggering a remote lock when devices breach predefined zones.

On Supervised iOS and Android Enterprise devices, enforced Factory Reset Protection (FRP) ensures that even after a forced wipe, the device cannot be reactivated without organisational credentials, eliminating resale value.

For BYOD environments, we cannot ignore the fear that corporate oversight equates to a digital invasion of personal lives. However, containerization through managed Work Profiles creates a secure boundary between corporate and personal data. This enables selective wipe capabilities, removing enterprise assets without intruding on personal privacy.

When integrated with identity providers, device posture and user identity can be evaluated together through multi-condition compliance rules. Access can then be granted, restricted, or revoked based on real-time risk signals.

Platforms built around unified endpoint management and identity integration enable this model of control. At Hexnode, this convergence of device governance and identity enforcement forms the foundation of a proactive security mandate. It transforms mobile fleets from distributed risk points into centrally controlled assets.

In high-risk environments, security cannot be passive. The goal is not recovery. It is irrelevant, ensuring that once a device leaves authorised hands, it holds no data, no identity leverage, and no operational value.

Apu Pavithran is the CEO and founder of Hexnode

Continue Reading

Feature/OPED

Daniel Koussou Highlights Self-Awareness as Key to Business Success

Published

on

Ambassador Daniel Kossouno

By Adedapo Adesanya

At a time when young entrepreneurs are reshaping global industries—including the traditionally capital-intensive oil and gas sector—Ambassador Daniel Koussou has emerged as a compelling example of how resilience, strategic foresight, and disciplined execution can transform modest beginnings into a thriving business conglomerate.

Koussou, who is the chairman of the Nigeria Chapter of the International Human Rights Observatory-Africa (IHRO-Africa), currently heads the Committee on Economic Diplomacy, Trade and Investment for the forum’s Nigeria chapter. He is one of the young entrepreneurs instilling a culture of nation-building and leadership dynamics that are key to the nation’s transformation in the new millennium.

The entrepreneurial landscape in Nigeria is rapidly evolving, with leaders like Koussou paving the way for innovation and growth, and changing the face of the global business climate. Being enthusiastic about entrepreneurship, Koussou notes that “the best thing that can happen to any entrepreneur is to start chasing their dreams as early as possible. One of the first things I realised in life is self-awareness. If you want to connect the dots, you must start early and know your purpose.”

Successful business people are passionate about their business and stubbornly driven to succeed. Koussou stresses the importance of persistence and resilience. He says he realised early that he had a ‘calling’ and pursued it with all his strength, “working long weekends and into the night, giving up all but necessary expenditures, and pressing on through severe setbacks.”

However, he clarifies that what accounted for an early success is not just tenacity but also the ability to adapt, to recognise and respond to rapidly changing markets and unexpected events.

Ambassador Koussou is the CEO of Dau-O GIK Oil and Gas Limited, an indigenous oil and natural gas company with a global outlook, delivering solutions that power industries, strengthen communities, and fuel progress. The firm’s operations span exploration, production, refining, and distribution.

Recognising the value of strategic alliances, Koussou partners with business like-minds, a move that significantly bolsters Dau-O GIK’s credibility and capacity in the oil industry. This partnership exemplifies the importance of building strong networks and collaborations.

The astute businessman, who was recently nominated by the African Union’s Agenda 2063 as AU Special Envoy on Oil and Gas (Continental), admonishes young entrepreneurs to be disciplined and firm in their decision-making, a quality he attributed to his success as a player in the oil and gas sector. By embracing opportunities, building strong partnerships, and maintaining a commitment to excellence, Koussou has not only achieved personal success but has also set a benchmark for future generations of African entrepreneurs.

His journey serves as a powerful reminder that with determination and vision, success is within reach.

Continue Reading

Trending