Detecting and Reporting Suspicious Activity Sample Clauses

Detecting and Reporting Suspicious Activity. Associates have a duty to understand their responsibilities for detecting and reporting suspicious activity. It is the requirement of RCS Third Party that Associates follow established “Know Your Customer” (or KYC) procedures; that any customer, Associate, or other suspicious activity (or possible suspicious activity) be promptly reported to designated persons as set forth in the Requirements; that all such reports be timely and diligently investigated by such designated persons; and to timely and comprehensively fulfill all suspicious activity report filing requirements by providing proper notice to RCS Third Party BSA/AML Compliance Officer. Any suspicious activity identified by RCS Third Party should be reported to the Bank’s Non-Traditional BSA Manager or designated BSA Staff in a timely manner upon identification via the established agreed upon reporting mechanism. RCS Third Party shall require that all Associates should maintain the strict confidentiality of all such suspicious activity investigations and reports. In pursuit of its obligations to diligence and oversight, RCS Third Party should develop or acquire tools for use in reviewing account activity. These tools, when deployed in conjunction with a formal risk management training program should represent a broad spectrum approach to detecting and reporting suspicious activity. Per the Requirements, tools and resources should include the following: a. Daily application reviews of: i. Account applications at addresses with prior known fraud history [****] = CERTAIN CONFIDENTIAL INFORMATION CONTAINED IN THIS DOCUMENT, MARKED BY BRACKETS, HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION PURSUANT TO RULE 406 OF THE SECURITIES ACT OF 1933, AS AMENDED. ii. Account application details, to include social security numbers, dates of birth and phone numbers, that may match prior established account with a history of suspect behavior iii. Account applications that appear to be associated with identified fraud rings iv. Unusual or suspicious transactional loan activity v. Any other alerts related to fraud or suspicious activity, as applicable Training for use and implementation of these resources is an ongoing process with emphasis on associative analysis and metrics base analytics is recommended. Training courses should include overview of AML requirements, OFAC program measures, and detailed review of Customer activity and behavior. Records of activity reviews, including co...
AutoNDA by SimpleDocs

Related to Detecting and Reporting Suspicious Activity

  • Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Monitoring and Reporting The Programme Operator shall monitor, record and report on progress towards the programme’s outcomes in accordance with the provisions contained in the legal framework. The Programme Operator shall ensure that suitable and sufficient monitoring and reporting arrangements are made with the project promoters in order to enable the Programme Operator and the National Focal Point to meet its obligations to the Donors. When reporting on progress achieved in Annual and Final Programme Reports, the Programme Operator shall disaggregate results achieved as appropriate and in accordance with instructions received from the FMO.

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request.

  • Information and Reporting The Adviser shall provide the Trust and its respective officers with such periodic reports concerning the obligations the Adviser has assumed under this Agreement as the Trust may from time to time reasonably request.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Documenting and Reporting Breaches 6.1 Business Associate shall report to Covered Entity any Breach of Unsecured PHI, including Breaches reported to it by a Subcontractor, as soon as it (or any of its employees or agents) becomes aware of any such Breach, and in no case later than two (2) business days after it (or any of its employees or agents) becomes aware of the Breach, except when a law enforcement official determines that a notification would impede a criminal investigation or cause damage to national security. 6.2 Business Associate shall provide Covered Entity with the names of the individuals whose Unsecured PHI has been, or is reasonably believed to have been, the subject of the Breach and any other available information that is required to be given to the affected individuals, as set forth in 45 CFR § 164.404(c), and, if requested by Covered Entity, information necessary for Covered Entity to investigate the impermissible use or disclosure. Business Associate shall continue to provide to Covered Entity information concerning the Breach as it becomes available to it. Business Associate shall require its Subcontractor(s) to agree to these same terms and conditions. 6.3 When Business Associate determines that an impermissible acquisition, use or disclosure of PHI by a member of its workforce is not a Breach, as that term is defined in 45 CFR § 164.402, and therefore does not necessitate notice to the impacted individual(s), it shall document its assessment of risk, conducted as set forth in 45 CFR § 402(2). When requested by Covered Entity, Business Associate shall make its risk assessments available to Covered Entity. It shall also provide Covered Entity with 1) the name of the person(s) making the assessment, 2) a brief summary of the facts, and 3) a brief statement of the reasons supporting the determination of low probability that the PHI had been compromised. When a breach is the responsibility of a member of its Subcontractor’s workforce, Business Associate shall either 1) conduct its own risk assessment and draft a summary of the event and assessment or 2) require its Subcontractor to conduct the assessment and draft a summary of the event. In either case, Business Associate shall make these assessments and reports available to Covered Entity. 6.4 Business Associate shall require, by contract, a Subcontractor to report to Business Associate and Covered Entity any Breach of which the Subcontractor becomes aware, no later than two (2) business days after becomes aware of the Breach.

  • Infectious Diseases The Employer and the Union desire to arrest the spread of infectious diseases in the nursing home. To achieve this objective, the Joint Health and Safety Committee may review and offer input into infection control programs and protocols including surveillance, outbreak control, isolation, precautions, worker education and training, and personal protective equipment. The Employer will provide training and ongoing education in communicable disease recognition, use of personal protective equipment, decontamination of equipment, and disposal of hazardous waste.

  • Inspection and Reporting Each Grantor shall permit the Collateral Agent, or any agent or representatives thereof or such professionals or other Persons as the Collateral Agent may designate, not more than once a year in the absence of an Event of Default, (i) to examine and make copies of and abstracts from such Grantor's records and books of account, (ii) to visit and inspect its properties, (iii) to verify materials, leases, Instruments, Accounts, Inventory and other assets of such Grantor from time to time, (iii) to conduct audits, physical counts, appraisals and/or valuations, examinations at the locations of such Grantor. Each Grantor shall also permit the Collateral Agent, or any agent or representatives thereof or such professionals or other Persons as the Collateral Agent may designate to discuss such Grantor's affairs, finances and accounts with any of its officers subject to the execution by the Collateral Agent or its designee(s) of a mutually agreeable confidentiality agreement.

  • PERFORMANCE MONITORING AND REPORTING Performance indicators

  • Record Keeping and Reporting The Accredited Entity shall ensure that:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!