Suspicious Activity Monitoring and Reporting Sample Clauses

Suspicious Activity Monitoring and Reporting. Within 90 days of this Agreement, the Branch shall submit a written program acceptable to the Reserve Bank reasonably designed to ensure the identification and timely, accurate, and complete reporting by the Branch of all known or suspected violations of law or suspicious transactions to law enforcement and supervisory authorities, as required by applicable suspicious activity reporting laws and regulations. The program shall include the following three items:
Suspicious Activity Monitoring and Reporting. (a) Correspondent shall be responsible for monitoring Customer accounts for any suspicious transactions. In this regard, Correspondent will monitor, on a regular basis. among other things. Customer activity introduced by Correspondent for clearing, including but not limited to trading, wire transfers into accounts maintained on behalf of Customers, journals and the deposit of and withdrawal from Customer accounts of funds or other assets. (b) Correspondent shall immediately notify Apex of any suspicious transactions it detects or of which it is aware with respect to the accounts of Customers for whom it introduces transactions to Apex. Correspondent shall be responsible for filing with the Department of Treasury any resulting Suspicious Activity Reports as required by the Patriot Act. (c) Apex shall also be responsible for filing with the Department of Treasury Suspicious Activity Reports related to suspicious transactions in Correspondent Customer accounts detected by Apex. (d) Apex shall be responsible for filing with the Internal Revenue Service, and any other applicable regulatory bodies. joint FinCEN/ IRS forms, as required by applicable law, with respect to transactions in which it receives more than $10,000 in currency or coins. Such reports will be filed pursuant to the relevant procedures set forth in Apex’s anti-money laundering compliance program. (e) Correspondent shall be responsible for doing sufficient diligence on its Customers to ensure that opening the account would not violate the provisions of the Executive Orders and regulations administered by the U.S. Treasury Department’s Office of Foreign Assets Control or be subject to other restrictions based on such relevant government lists as may be published from time to time. Correspondent shall immediately inform Apex of the existence of any account subject to an OFAC or government list restriction. Correspondent and Apex jointly shall monitor account activity to ensure that Customers do not engage in any transaction that would be or potentially be subject to an OFAC or government list restriction. Apex shall monitor Customer Accounts to detect possible violations of OFAC or government list restrictions in respect of incoming and outgoing FedWires and incoming and outgoing securities. (f) Correspondent shall maintain for at least 6 years (or such longer period as is required under any applicable laws, rules and/or regulations) all necessary records and background documentation on such fi l...
Suspicious Activity Monitoring and Reporting. (1) Within one hundred twenty (120) days of this Agreement, the GM shall ensure that the Branch develops, implements, and thereafter adheres to an enhanced written risk-based program of internal controls and processes to ensure, pursuant to 12 C.F.R. § 21.11, the timely and appropriate review and disposition of BSA/AML suspicious activity alerts and the timely filing of Suspicious Activity Reports (“SARs”). This written Branch program shall include, at a minimum: (a) Procedures for identifying, monitoring and reporting suspicious activity, known or suspected violations of Federal law, violations of the BSA, or suspicious transactions related to potential money laundering across all Branch lines of business, including suspicious activity relating to the opening of new accounts, the monitoring of existing accounts, and the transfer of funds through the Branch, consistent with the Suspicious Activity Reporting section of the FFIEC BSA/AML Examination Manual; (b) Application of appropriate thresholds and filters for automated surveillance systems in monitoring all types of transactions, accounts, customers, products, services, and geographic areas that include, at a minimum: (i) Meaningful thresholds and alert scenarios for filtering accounts and customers for further monitoring, review and analyses; (ii) Adequate documentation supporting the Branch’s methodology for establishing alert thresholds and filters; and (iii) Periodic independent validation of thresholds and filters for their appropriateness to the Branch’s customer base, products, services, and geographic area; (c) Appropriate linkage between EDD information and suspicious activity monitoring functions to ensure BSA/AML staff appropriately use EDD information in suspicious activity investigations; (d) Procedures to address cases where there is on-going suspicious activity to ensure appropriate management review and determination of whether the customer relationship should be continued; (e) Meaningful, accurate, and timely reporting to the HO, or designated committee, and management of suspicious activity investigations and SAR filings; (f) Review of any new surveillance systems to ensure it has the capacity to operate on multiple platforms and is appropriate for the Branch’s size and complexity; (g) Procedures to ensure the Branch files SARs within the time frames specified in the applicable rules, regulations, and regulatory guidance, and files follow-up SARs every ninety (90) days in cases where s...
Suspicious Activity Monitoring and Reporting. Within 90 days of this Agreement, DFS shall submit a written program acceptable to the Reserve Bank to reasonably ensure the identification and timely, accurate, and complete reporting of all known or suspected violations of law or suspicious transactions to law enforcement and supervisory authorities for transactions at, by, or through DFS or its nonbank subsidiaries, as required by section 225.4(f) of Regulation Y of the Board of Governors (12 C.F.R. § 225.4(f)). At a minimum, the program shall include:
Suspicious Activity Monitoring and Reporting. Within 60 days of the Agreement, SSC and the Bank shall jointly submit a written revised program acceptable to the Supervisors to reasonably ensure the identification and timely, accurate, and complete reporting by SSC, its nonbank subsidiaries, and the Bank, as applicable, of all known or suspected violations of law or suspicious transactions to law enforcement and supervisory authorities, as required by applicable suspicious activity reporting laws and regulations. At a minimum, the revised program shall include:
Suspicious Activity Monitoring and Reporting. Banks are required to report suspicious activity that may involve money laundering, BSA violations, terrorist financing, and certain other crimes above prescribed dollar thresholds. Any customer or transaction that fails any stage of Prosper’s verification procedures or that exhibits other risk factors is manually reviewed by Pxxxxxx’s Risk team. As a part of this process, if Pxxxxxx knows, suspects, or has reason to suspect, (1) insider abuse (in any amount), or (2) any suspicious transaction involving a violation of federal law of $5,000 or more, Pxxxxxx will aid WebBank in filing its Suspicious Activity Report (“SAR”) by providing sufficient information for WebBank to complete its Treasury Form TD F 90-22.47. Prosper will develop and maintain sufficient operational procedures to allow its employees to identify red flags for suspicious activity, including when transactions are: · Obtained from illegal activity · Intended or conducted to hide or disguise funds or assets derived from illegal activity · Designed to evade any reporting requirements of the Bank Secrecy Act (BSA) · Transacted with no business or lawful purpose · Not the sort the customer normally engages · Pxxxxxx knows of no reasonable explanation for the transaction after examining available facts including the background and possible purpose of the transaction Bank Secrecy Act Policy Pxxxxxx, its directors, officers, employees, and agents will not notify any person involved in the suspicious transaction that information has been provided to WebBank for purposes of filing a SAR, or that a SAR has been reported. Prosper shall retain the information provided to WebBank for the purposes of filing SARs and any supporting documentation for five (5) years from the date the information was reported.
Suspicious Activity Monitoring and Reporting. Within 60 days of the effective date of this Agreement, the Bank shall submit a written revised program acceptable to the Reserve Bank to reasonably ensure the identification and timely, accurate, and complete reporting by the Bank of all known or suspected violations of law or suspicious transactions to law enforcement and supervisory authorities, as required by applicable suspicious activity reporting laws and regulations. The revised program shall include the following four items:

Related to Suspicious Activity Monitoring and Reporting

  • Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Monitoring and Reporting The Programme Operator shall monitor, record and report on progress towards the programme’s outcomes in accordance with the provisions contained in the legal framework. The Programme Operator shall ensure that suitable and sufficient monitoring and reporting arrangements are made with the project promoters in order to enable the Programme Operator and the National Focal Point to meet its obligations to the Donors. When reporting on progress achieved in Annual and Final Programme Reports, the Programme Operator shall disaggregate results achieved as appropriate and in accordance with instructions received from the FMO.

  • PERFORMANCE MONITORING AND REPORTING Performance indicators

  • Record Keeping and Reporting The Accredited Entity shall ensure that:

  • Information and Reporting The Adviser shall provide the Trust and its respective officers with such periodic reports concerning the obligations the Adviser has assumed under this Agreement as the Trust may from time to time reasonably request.

  • Inspection and Reporting Each Grantor shall permit the Collateral Agent, or any agent or representatives thereof or such attorneys, accountant or other professionals or other Persons as the Collateral Agent may designate (at Grantors’ sole cost and expense) (i) to examine and make copies of and abstracts from any Grantor’s Records and books of account, (ii) to visit and inspect its properties, (iii) to verify materials, leases, Instruments, Accounts, Inventory and other assets of any Grantor from time to time, and (iv) to conduct audits, physical counts, appraisals, valuations and/or examinations at the locations of any Grantor. Each Grantor shall also permit the Collateral Agent, or any agent or representatives thereof or such attorneys, accountants or other professionals or other Persons as the Collateral Agent may designate to discuss such Grantor’s affairs, finances and accounts with any of its directors, officers, managerial employees, attorneys, independent accountants or any of its other representatives. Without limiting the foregoing, the Collateral Agent may, at any time, in the Collateral Agent’s own name, in the name of a nominee of the Collateral Agent, or in the name of any Grantor communicate (by mail, telephone, facsimile or otherwise) with the Account Debtors of such Grantor, parties to contracts with such Grantor and/or obligors in respect of Instruments or Pledged Debt of such Grantor to verify with such Persons, to the Collateral Agent’s satisfaction, the existence, amount, terms of, and any other matter relating to, Accounts, Instruments, Pledged Debt, Chattel Paper, payment intangibles and/or other receivables.

  • Funding, Services and Reporting The HSP represents warrants and covenants that (a) the Funding is, and will continue to be, used only to provide the Services in accordance with the terms of this Agreement; (b) the Services are and will continue to be provided: by persons with the expertise, professional qualifications, licensing and skills necessary to complete their respective tasks; and in compliance with Applicable Law and Applicable Policy; and (c) every Report is accurate and in full compliance with the provisions of this Agreement, including any particular requirements applicable to the Report and any material change to a Report will be communicated to the Funder immediately.

  • Monitoring and Compliance Every year during the term of this Agreement on the anniversary date of the effective date of the Agreement, the Restaurant shall provide to the United States a narrative report of the actions taken during the reporting period to remove any barriers to access and otherwise enhance accessibility for individuals with disabilities at the Restaurant and any plans for action concerning ADA compliance in the coming year. The report shall include as an exhibit copies of any complaint, whether formal or informal, received during the reporting period alleging that the Restaurant was not being operated in compliance with the ADA or otherwise discriminated against any person on account of disability. The Owner and Operator of the Restaurant shall cooperate in good faith with any and all reasonable requests by the United States for access to the Restaurant and for information and documents concerning the Restaurant's compliance with this Agreement and the ADA. The United States shall have the right to verify compliance with this Agreement and the ADA, both as set forth in this Agreement and through any means available to the general public, including visits to the public areas of the Restaurant and communications with Restaurant staff. The United States shall have the right to inspect the facility at any time, and counsel for the United States need not identify themselves in the course of visits to the public areas.

  • Money Market Fund Compliance Testing and Reporting Services Subject to the authorization and direction of the Trust and, in each case where appropriate, the review and comment by the Trust’s independent accountants and legal counsel, and in accordance with procedures that may be established from time to time between the Trust and the Administrator, the Administrator will:

  • Documenting and Reporting Breaches 6.1 Business Associate shall report to Covered Entity any Breach of Unsecured PHI, including Breaches reported to it by a Subcontractor, as soon as it (or any of its employees or agents) becomes aware of any such Breach, and in no case later than two (2) business days after it (or any of its employees or agents) becomes aware of the Breach, except when a law enforcement official determines that a notification would impede a criminal investigation or cause damage to national security. 6.2 Business Associate shall provide Covered Entity with the names of the individuals whose Unsecured PHI has been, or is reasonably believed to have been, the subject of the Breach and any other available information that is required to be given to the affected individuals, as set forth in 45 CFR § 164.404(c), and, if requested by Covered Entity, information necessary for Covered Entity to investigate the impermissible use or disclosure. Business Associate shall continue to provide to Covered Entity information concerning the Breach as it becomes available to it. Business Associate shall require its Subcontractor(s) to agree to these same terms and conditions. 6.3 When Business Associate determines that an impermissible acquisition, use or disclosure of PHI by a member of its workforce is not a Breach, as that term is defined in 45 CFR § 164.402, and therefore does not necessitate notice to the impacted individual(s), it shall document its assessment of risk, conducted as set forth in 45 CFR § 402(2). When requested by Covered Entity, Business Associate shall make its risk assessments available to Covered Entity. It shall also provide Covered Entity with 1) the name of the person(s) making the assessment, 2) a brief summary of the facts, and 3) a brief statement of the reasons supporting the determination of low probability that the PHI had been compromised. When a breach is the responsibility of a member of its Subcontractor’s workforce, Business Associate shall either 1) conduct its own risk assessment and draft a summary of the event and assessment or 2) require its Subcontractor to conduct the assessment and draft a summary of the event. In either case, Business Associate shall make these assessments and reports available to Covered Entity. 6.4 Business Associate shall require, by contract, a Subcontractor to report to Business Associate and Covered Entity any Breach of which the Subcontractor becomes aware, no later than two (2) business days after becomes aware of the Breach.