Identification of Fraud Methods Sample Clauses

Identification of Fraud Methods. RSA uses reasonable efforts to: a. identify methods used by Fraudsters to collect and/or redirect funds misappropriated from the Customer and/or its accounts holders; b. identify cross channel exploits (such as methods which may combine both online fraud and phone “voice phishing” or “social engineering”) which are discovered on the Forums and which may relate to or may affect the business of the Customer; c. identify specific bank or other financial services accounts (being accounts set up by Fraudsters and/or related third parties for the purpose of holding funds appropriated from Customer and/or its account holders by fraudulent means) and collection locations used by Fraudsters to withdraw such funds; and d. analyze Fraudster communications both general and specific to the Customer on an ongoing basis to detect emerging threats and trends.
AutoNDA by SimpleDocs

Related to Identification of Fraud Methods

  • Identification of Data a. All Background, Third Party Proprietary and Controlled Government Data provided by Disclosing Party shall be identified in the Annex under which it will be provided. b. NASA software and related Data provided to Partner shall be identified in the Annex under which it will be used. Notwithstanding H.4., Software and related Data will be provided to Partner under a separate Software Usage Agreement (SUA). Partner shall use and protect the related Data in accordance with this Article. Unless the SUA authorizes retention, or Partner enters into a license under 37 C.F.R. Part 404, the related Data shall be disposed of as instructed by NASA.

  • Identification of Goods Identification of the goods shall not be deemed to have been made until both Buyer and Seller have agreed that the goods in question are to be appropriate to the performance of this Agreement.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Certification of Public Information Holdings and each Lender acknowledge that certain of the Lenders may be “public-side” Lenders (Lenders that do not wish to receive material non-public information with respect to Holdings, its Subsidiaries or their securities) and, if documents or notices required to be delivered pursuant to this Section 5.01 or otherwise are being distributed through IntraLinks/IntraAgency, SyndTrak or another relevant website or other information platform (the “Platform”), any document or notice that Holdings has indicated contains Non-Public Information shall not be posted on that portion of the Platform designated for such public-side Lenders. Holdings agrees to clearly designate all Information provided to the Administrative Agent by or on behalf of Holdings which is suitable to make available to Public Lenders. If Holdings has not indicated whether a document or notice delivered pursuant to this Section 5.01 contains Non-Public Information, the Administrative Agent reserves the right to post such document or notice solely on that portion of the Platform designated for Lenders who wish to receive material non-public information with respect to Holdings, its Subsidiaries and their securities;

  • Use of FIIOC’s and FSC's Name The Trust shall not use the name of FIIOC and FSC in any Prospectus, sales literature or other material relating to the Trust or any Fund of the Trust in a manner not consented to by FIIOC and FSC prior to use; provided, however, that FIIOC and FSC shall approve all uses of its name which merely refer in accurate terms to its appointments, duties or fees hereunder or which are required by the Securities and Exchange Commission ("SEC" or “Commission”) or a state securities commission; and further, provided that in no event shall such approval be unreasonably withheld.

  • Provision of further information Each Borrower will, as soon as practicable after receiving the request, provide the Agent with any additional financial or other information relating: (a) to that Borrower, the Ship owned by it, the Earnings or the Insurances; or (b) to any other matter relevant to, or to any provision of, a Finance Document, which may be requested by the Agent, the Security Trustee or any Lender at any time.

  • Type and Jurisdiction of Organization, Organizational and Identification Numbers The type of entity of such Grantor, its state of organization, the organizational number issued to it by its state of organization and its federal employer identification number are set forth on Exhibit A.

  • Identification Cards Identification (“ID”) cards are issued by Us for identification purposes only. Possession of any ID card confers no right to services or benefits under this Contract. To be entitled to such services or benefits, Your Premiums must be paid in full at the time that the services are sought to be received.

  • No Reliance on Agent’s Customer Identification Program Each Lender acknowledges and agrees that neither such Lender, nor any of its Affiliates, participants or assignees, may rely on the Agent to carry out such Lender’s, Affiliate’s, participant’s or assignee’s customer identification program, or other obligations required or imposed under or pursuant to the USA PATRIOT Act or the regulations thereunder, including the regulations contained in 31 CFR 103.121 (as hereafter amended or replaced, the “CIP Regulations”), or any other Anti-Terrorism Law, including any programs involving any of the following items relating to or in connection with any Borrower, its Affiliates or its agents, this Agreement, the Other Documents or the transactions hereunder or contemplated hereby: (1) any identity verification procedures, (2) any record-keeping, (3) comparisons with government lists, (4) customer notices or (5) other procedures required under the CIP Regulations or such other laws.

  • Types of Personal Data Contact Information, the extent of which is determined and controlled by the Customer in its sole discretion, and other Personal Data such as navigational data (including website usage information), email data, system usage data, application integration data, and other electronic data submitted, stored, sent, or received by end users via the Subscription Service.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!