Laundering Policies and Procedures Sample Clauses

Laundering Policies and Procedures. The Adviser will promptly furnish the Subadviser from time to time with copies, properly certified or otherwise authenticated, of all amendments of or supplements to any of the foregoing documents. The Adviser will also furnish the Subadviser with copies of all the documents listed on Schedule 1 to this Agreement, and shall promptly notify the Subadviser of any material change in any of the Fund's investment objectives, investment strategies, investment policies, investment restrictions, guidelines or procedures set forth in any of the documents listed in Schedule 1. In addition, the Chief Compliance Officer for the Trust and the Adviser shall provide the Subadviser with a certification that they have adopted and approved a compliance program for the Trust adopted in accordance with Rule 38a-1 under the 1940 Act and the compliance program for the Adviser adopted in accordance with Rule 206(4)-7 under the Investment Advisers Act of 1940, as amended ("Advisers Act"), respectively. The Chief Compliance Officer for the Subadviser shall provide the Trust and the Adviser with copies of the Subadviser's Compliance Policies and Procedures, a summary of its compliance program, and a certification that the Subadviser has adopted and approved a compliance program for the Subadviser in accordance with Rule 206(4)-7 under the Advisers Act and such other information as may be reasonably requested in order to permit the Board of Trustees of the Trust to make such determinations with respect to the Subadviser's compliance program as may be required under Rule 38a-1 under the 1940 Act. The Subadviser has furnished the Adviser with a copy of the Subadviser's Form ADV most recently filed with the SEC, (which Form ADV includes a description of the Subadviser's policies regarding allocation of securities among clients with common investment objectives, soft dollars and brokerage selection) and the code of ethics established by the Subadviser pursuant to Rule 17j-1 under the 1940 Act ("Subadviser's Code of Ethics"). The Subadviser will promptly furnish the Adviser with copies of any amendments to each of those documents, including any revisions required by Rule 204A-1 under the Advisers Act. The Subadviser will also provide the Adviser with the Subadviser's approved list of securities for equity portfolios and list of affiliated persons, and any updates or revisions thereto at least monthly. The Subadviser will also provide the Adviser and the Fund accountant with a list and sp...
AutoNDA by SimpleDocs
Laundering Policies and Procedures. If you have any questions about
Laundering Policies and Procedures. If you have any questions about the Anti-Money Laundering Policy and Procedures or any concerns regarding suspicious activity please contact your AML Compliance Officer.
Laundering Policies and Procedures. INTRODUCTION New River Funds (the “Trust”), an open-end management investment company registered under the Investment Company Act of 1940, has established this anti-money laundering compliance program (“AML Program”), which includes the Trust’s customer identification program (“CIP”). The AML Program is designed to comply with the various anti-money laundering regulations (“AML Rules”) promulgated by the Department of the Treasury’s Financial Crimes Enforcement Network (“FinCEN”) and the U.S. Securities and Exchange Commission (“SEC”) that are applicable to the Trust. The International Money Laundering and Abatement and Anti-Terrorist Financing Act of 2001 was signed into law as Title III of The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (the “USA Patriot Act”) on October 26, 2001. The USA Patriot Act amended existing anti-money laundering laws, most notably the Bank Secrecy Act of 1970 (“BSA”). In general, the anti-money laundering provisions of the USA Patriot Act apply to financial institutions (“Financial Institutions”), as that term is defined under the BSA. The BSA, as amended by the USA Patriot Act, defines Financial Institutions to include investment companies. Accordingly, several of the AML Rules that implement the requirements established by the USA Patriot Act apply to the Trust. Section 352(h) of the USA Patriot Act and the implementing regulations thereunder require certain Financial Institutions, including registered open-end management investment companies (“Mutual Funds”), to adopt and implement a written anti-money laundering program. Section 326 of the USA Patriot Act and the implementing regulations thereunder require certain Financial Institutions, including Mutual Funds, to implement customer identification verification programs as a part of their written anti-money laundering program. Section 351 of the USA Patriot Act and the implementing regulations thereunder require certain Financial Institutions to submit suspicious activity reports (“SARs”). The Trust has established this AML Program pursuant to, and in compliance with, Sections 352(h), 326 and 351 of the USA Patriot Act and the implementing regulations thereunder. Accordingly, this AML Program is designed to: (i) detect and deter suspicious transactions that reasonably may be associated with money laundering; (ii) cause the timely reporting of such transactions; and (iii) ensure compliance with the ...

Related to Laundering Policies and Procedures

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites. ii) Only the designated employer shall have exclusive authority over the employee in regard to discipline, reporting to the College of Nurses of Ontario and/or investigations of family/resident complaints. iii) The designated employer will ensure that the employee is covered by WSIB at all times, regardless of worksite, while in the employ of either home. iv) The designated employer will ensure that the employee is covered by liability insurance at all times, regardless of worksite, while in the employ of either home. v) The designated employer shall have exclusive authority over the employee’s personnel files and health records. These files will be maintained on the site of the designated employer.

  • Company Policies and Procedures 7.1.1 The Company will ensure that Employees are able to readily access Company policies and procedures that apply to the Employees. 7.1.2 The Employees will observe and act in accordance with Company policies and procedures that apply to the Employees, as implemented and amended from time to time.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Ordering Guidelines and Processes 1.13.1 For information regarding Ordering Guidelines and Processes for various Network Elements, Combinations and Other Services, PLI should refer to the “Guides” section of the BellSouth Interconnection Web site, which is incorporated herein by reference, as amended from time to time. The Web site address is: http//xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/. 1.13.2 Additional information may also be found in the individual CLEC Information Packages, which are incorporated herein by reference, as amended from time to time, located at the “CLEC UNE Products” Web site address: xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/guides/html/unes.html. 1.13.3 The provisioning of Network Elements, Combinations and Other Services to PLI’s Collocation Space will require cross-connections within the central office to connect the Network Element, Combinations or Other Services to the demarcation point associated with PLI’s Collocation Space. These cross-connects are separate components that are not considered a part of the Network Element, Combinations or Other Services and, thus, have a separate charge pursuant to this Agreement.

  • Policy and Procedures If the resident leaves the facility due to hospitalization or a therapeutic leave, the facility shall not be obligated to hold the resident’s bed available until his or her return, unless prior arrangements have been made for a bed hold pursuant to the facility’s “Bed Reservation Policy and Procedure” and pursuant to applicable law. In the absence of a bed hold, the resident is not guaranteed readmission unless the resident is eligible for Medicaid and requires the services provided by the facility. However, the resident may be placed in any appropriate bed in a semi-private room in the facility at the time of his or her return from hospitalization or therapeutic leave provided a bed is available and the resident’s admission is appropriate and meets the readmission requirements of the facility.

  • Anti-Money Laundering Compliance Programs Soliciting Dealer represents to the Dealer Manager and to the Company that it has established and implemented anti-money laundering compliance programs in accordance with applicable law, including applicable FINRA Conduct Rules, the Exchange Act Rules and Regulations and the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, as amended (the “USA PATRIOT Act”), specifically including, but not limited to, Section 352 of the International Money Laundering Abatement and Anti-Terrorist Financing Act of 2001 (the “Money Laundering Abatement Act,” and together with the USA PATRIOT Act, the “AML Rules”) reasonably expected to detect and cause the reporting of suspicious transactions in connection with the offering and sale of the Shares. Soliciting Dealer further represents that it currently is in compliance with all AML Rules, specifically including, but not limited to, the Customer Identification Program requirements under Section 326 of the Money Laundering Abatement Act, and Soliciting Dealer hereby covenants to remain in compliance with such requirements and shall, upon request by the Dealer Manager or the Company, provide a certification to the Dealer Manager or the Company that, as of the date of such certification (a) its AML Program is consistent with the AML Rules, and (b) it is currently in compliance with all AML Rules, specifically including, but not limited to, the Customer Identification Program requirements under Section 326 of the Money Laundering Abatement Act. Upon request by the Dealer Manager at any time, Soliciting Dealer will (i) furnish a written copy of its AML Program to the Dealer Manager for review, and (ii) furnish a copy of the findings and any remedial actions taken in connection with its most recent independent testing of its AML Program.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.

  • Notice and Procedures If any suit, action, proceeding (including any governmental or regulatory investigation), claim or demand shall be brought or asserted against any person in respect of which indemnification may be sought pursuant to either paragraph (a) or (b) above, such person (the “Indemnified Person”) shall promptly notify the person against whom such indemnification may be sought (the “Indemnifying Person”) in writing; provided that the failure to notify the Indemnifying Person shall not relieve it from any liability that it may have under paragraph (a) or (b) above except to the extent that it has been materially prejudiced (through the forfeiture of substantive rights or defenses) by such failure; and provided, further, that the failure to notify the Indemnifying Person shall not relieve it from any liability that it may have to an Indemnified Person otherwise than under paragraph (a) or (b) above. If any such proceeding shall be brought or asserted against an Indemnified Person and it shall have notified the Indemnifying Person thereof, the Indemnifying Person shall retain counsel reasonably satisfactory to the Indemnified Person (who shall not, without the consent of the Indemnified Person, be counsel to the Indemnifying Person) to represent the Indemnified Person in such proceeding and shall pay the fees and expenses of such counsel related to such proceeding, as incurred. In any such proceeding, any Indemnified Person shall have the right to retain its own counsel, but the fees and expenses of such counsel shall be at the expense of such Indemnified Person unless (i) the Indemnifying Person and the Indemnified Person shall have mutually agreed to the contrary; (ii) the Indemnifying Person has failed within a reasonable time to retain counsel reasonably satisfactory to the Indemnified Person; (iii) the Indemnified Person shall have reasonably concluded that there may be legal defenses available to it that are different from or in addition to those available to the Indemnifying Person; or (iv) the named parties in any such proceeding (including any impleaded parties) include both the Indemnifying Person and the Indemnified Person and representation of both parties by the same counsel would be inappropriate due to actual or potential differing interest between them. It is understood and agreed that the Indemnifying Person shall not, in connection with any proceeding or related proceedings in the same jurisdiction, be liable for the fees and expenses of more than one separate firm (in addition to any local counsel) for all Indemnified Persons, and that all such fees and expenses shall be paid or reimbursed as they are incurred. Any such separate firm for any Underwriter, its affiliates, directors and officers and any control persons of such Underwriter shall be designated in writing by the Representatives and any such separate firm for the Company, its directors, its officers who signed the Registration Statement and any control persons of the Company shall be designated in writing by the Company. The Indemnifying Person shall not be liable for any settlement of any proceeding effected without its written consent, but if settled with such consent or if there be a final judgment for the plaintiff, the Indemnifying Person agrees to indemnify each Indemnified Person from and against any loss or liability by reason of such settlement or judgment. Notwithstanding the foregoing sentence, if at any time an Indemnified Person shall have requested that an Indemnifying Person reimburse the Indemnified Person for fees and expenses of counsel as contemplated by this paragraph, the Indemnifying Person shall be liable for any settlement of any proceeding effected without its written consent if (i) such settlement is entered into more than 30 days after receipt by the Indemnifying Person of such request and (ii) the Indemnifying Person shall not have reimbursed the Indemnified Person in accordance with such request prior to the date of such settlement. No Indemnifying Person shall, without the written consent of the Indemnified Person, effect any settlement of any pending or threatened proceeding in respect of which any Indemnified Person is or could have been a party and indemnification could have been sought hereunder by such Indemnified Person, unless such settlement (x) includes an unconditional release of such Indemnified Person, in form and substance reasonably satisfactory to such Indemnified Person, from all liability on claims that are the subject matter of such proceeding and (y) does not include any statement as to or any admission of fault, culpability or a failure to act by or on behalf of any Indemnified Person.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!