Detecting Red Flags Sample Clauses

Detecting Red Flags. The Federal Trade Commission has adopted rules requiring certain financial institutions to implement an Identity Theft Prevention Program and to detect “Red Flags”(as defined in this section) to prevent identity theft. (a) PNC will provide the Fund with its “Red Flag Services”, which are hereby defined to mean the following services: (i) PNC will maintain written controls reasonably designed to detect the occurrence of Red Flags (as defined below) in connection with (A) account opening and other account activities and transactions conducted directly through PNC with respect to Direct Accounts (as defined below), and (B) transactions effected directly through PNC by Covered Persons (as defined below) in Covered Accounts (as defined below). Such controls, as they may be revised from time to time hereunder, are referred to herein as the “Controls”. Solely for purposes of the Red Flag Section, the capitalized terms below will have the respective meaning ascribed to each below or, to the extent that the definition of any such term under the Rule is, at any time, different from the definition set forth below, such term will have the meaning ascribed thereto in the then-effective version of the Rule:
AutoNDA by SimpleDocs
Detecting Red Flags. Having identified the potential Red Flags as outlined above, Badcock seeks to detect Red Flags in connection with opening and servicing Badcock accounts by: A. Obtaining identifying information about, and verifying the identity of, a person making an application to open a new account or access an existing account, for example, using the policies and procedures regarding identification and verification of customers; and B. Authenticating consumers, monitoring transactions, and verifying the validity of change of address requests, in the case of existing covered account.
Detecting Red Flags. We have reviewed our covered accounts, how we open and maintain them, and how to detect Red Flags that may have occurred in them. Our detection of those Red Flags is based on our methods of getting information about applicants and verifying it under our CIP of our AML compliance procedures, authenticating customers who access the accounts, and monitoring transactions and change of address requests. For opening covered accounts, that can include getting identifying information about and verifying the identity of the person opening the account by using the firm’s CIP. For existing covered accounts, it can include authenticating customers, monitoring transactions, and verifying the validity of changes of address. Based on this review, we have included in the second column (“Detecting the Red Flag”) of the attached Grid how we will detect each of our firm’s identified Red Flags.

Related to Detecting Red Flags

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Periodic Review of Costs of Environmental Compliance In the ordinary course of its business, the Company conducts a periodic review of the effect of Environmental Laws on the business, operations and properties of the Company and its subsidiaries, in the course of which it identifies and evaluates associated costs and liabilities (including, without limitation, any capital or operating expenditures required for clean-up, closure of properties or compliance with Environmental Laws or any permit, license or approval, any related constraints on operating activities and any potential liabilities to third parties). On the basis of such review and the amount of its established reserves, the Company has reasonably concluded that such associated costs and liabilities would not, individually or in the aggregate, result in a Material Adverse Change.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Interconnection Facilities Engineering Procurement and Construction Interconnection Facilities, Network Upgrades, and Distribution Upgrades shall be studied, designed, and constructed pursuant to Good Utility Practice. Such studies, design and construction shall be based on the assumed accuracy and completeness of all technical information received by the Participating TO and the CAISO from the Interconnection Customer associated with interconnecting the Large Generating Facility.

  • Default – Reprocurement Costs In case of Contract breach by Contractor, resulting in termination by the County, the County may procure the goods and/or services from other sources. If the cost for those goods and/or services is higher than under the terms of the existing Contract, Contractor will be responsible for paying the County the difference between the Contract cost and the price paid, and the County may deduct this cost from any unpaid balance due the Contractor. The price paid by the County shall be the prevailing market price at the time such purchase is made. This is in addition to any other remedies available under this Contract and under law.

  • Outage Repair Standard In the event of an outage or trouble in any Service being provided by a Party hereunder, the Providing Party will follow Verizon’s standard procedures for isolating and clearing the outage or trouble.

  • Environmentally Preferable Procurement Policy The Environmentally Preferable Procurement Policy, along with a brief policy description, is located on the City’s website at the following link: xxxx://xxx.xxxxxxxxx.xxx/esd/natural-energy-resources/epp.htm. Environmental procurement policies and activities related to the completion of any Work will include, whenever practicable, but are not limited to:  The use of recycled and/or recyclable products in daily operations (i.e. 30%, 50%, 100% PCW paper, chlorine process free, triclosan free hand cleaner, etc.);  The use of energy-star compliant equipment;  The use of alternative fuel and hybrid vehicles, and implementation of protocols aimed at increasing the efficiency of vehicle operation;  The implementation of internal waste reduction and reuse protocol(s); and  Water and resource conservation activities within facilities, including bans on individual serving bottled water and the use of compostable food service products.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract. a. The contractor shall notify all potential subcontractors and suppliers and lessors of their EEO obligations under this contract. b. The contractor will use good faith efforts to ensure subcontractor compliance with their EEO obligations.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!