Vulnerable Clients and Temporary Holds Vulnerable Sample Clauses

Vulnerable Clients and Temporary Holds Vulnerable. Clients As per applicable securities law, vulnerable clients are those clients that may have an illness, impairment, disability or aging-process limitation that places the client at risk of financial exploitation. CFIS is committed to protecting the integrity of vulnerable client accounts through multiple measures, including: • Enhanced “Know Your Client (KYC)” information collection measures, • The request to designate a “trusted contact personin connection with client accounts, • Enhanced disclosures relating to CFIS conflicts of interest that are resolved in the best interests of the client, as well as enhanced product offering details, and • The use of “temporary holds” when it is suspected that a client’s account is the object of financial exploitation or is otherwise at risk of being compromised. Temporary Holds “Temporary Holds” may be used by CFIS as a way to protect the integrity of client accounts, especially in the context of accounts that are held by clients that fall into the definition of being “vulnerable”, as described above. For clarity, temporary holds are ones that are placed on the purchase or sale of a security on behalf of the client, or on a withdrawal or transfer of cash or securities from a clients account. Temporary holds are intended to be specific to certain transactions, and not blanket account freezes. Temporary holds will only be placed in situations where CFIS reasonably believes that a client is a) a vulnerable client, and b) the financial exploitation of the client has occurred, is occurring, has been attempted or is presently being attempted. CFIS may also place a temporary hold on a clients account if it is reasonably believed that the client lacks mental capacity to make decisions involving financial matters. If CFIS places a temporary hold on a client account, we will also: • Document the reasons for such a hold and its need for continued application, • Provide notice to the client of the temporary hold as soon as is practicable after it has been imposed, • Review all relevant facts related to the circumstances giving rise to the temporary hold on a reasonably frequent basis to determine the ongoing need to have it in place, and, • At any rate, within 30 days of placing the temporary hold, and, until the temporary hold is revoked, within every subsequent 30 day period, either: • Revoke the temporary hold, or • Provide the client with notice of CFIS’s decision to continue the temporary hold, along with all applicable ...
AutoNDA by SimpleDocs

Related to Vulnerable Clients and Temporary Holds Vulnerable

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Reporting of Non-Force Majeure Events Each Party (the “Notifying Party”) shall notify the other Parties when the Notifying Party becomes aware of its inability to comply with the provisions of this Agreement for a reason other than a Force Majeure event. The Parties agree to cooperate with each other and provide necessary information regarding such inability to comply, including the date, duration, reason for the inability to comply, and corrective actions taken or planned to be taken with respect to such inability to comply. Notwithstanding the foregoing, notification, cooperation or information provided under this Article shall not entitle the Party receiving such notification to allege a cause for anticipatory breach of this Agreement.

  • Confidential or Proprietary Information The term "Confidential --------------------------------------- or Proprietary Information" for purposes of this Agreement shall mean any secret, confidential, or proprietary information of SunTrust or a SunTrust Affiliate (not otherwise included in the definition of Trade Secret in (S) 1.23 of this Agreement) that has not become generally available to the public by the act of one who has the right to disclose such information without violating any right of SunTrust or a SunTrust Affiliate.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Certification Regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code, PROVIDER certifies it is not engaged in business with Iran, Sudan, or a foreign terrorist organization. PROVIDER acknowledges this Purchase Order may be terminated if this certification is or becomes inaccurate.

  • Proprietary Information and Developments 9.1 The Consultant will not at any time, whether during or after the termination of this Agreement for any reason, reveal to any person or entity any of the trade secrets or confidential information concerning the organization, business or finances of the Company or of any third party which the Company is under an obligation to keep confidential, except as may be required in the ordinary course of performing the Consultant Services to the Company, and the Consultant shall keep secret such trade secrets and confidential information and shall not use or attempt to use any such secrets or information in any manner which is designed to injure or cause loss to the Company. Trade secrets or confidential information shall include, but not be limited to, the Company's financial statements and projections, expansion proposals, property acquisition opportunities and business relationships with banks, lenders and other parties not otherwise publicly available.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • ACCESS TO PROTECTED HEALTH INFORMATION 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524. 7.2 If any Individual requests access to Protected Health Information directly from Business Associate or its agents or Subcontractors, Business Associate shall notify Covered Entity in writing within two (2) days of the receipt of the request. Whether access shall be provided or denied shall be determined by Covered Entity. 7.3 To the extent that Business Associate maintains Protected Health Information that is subject to access as set forth above in one or more Designated Record Sets electronically and if the Individual requests an electronic copy of such information, Business Associate shall provide the Individual with access to the Protected Health Information in the electronic form and format requested by the Individual, if it is readily producible in such form and format; or, if not, in a readable electronic form and format as agreed to by Covered Entity and the Individual.

  • Use of Proprietary Information Officer recognizes that Corporation possesses a proprietary interest in all of the information described in Section 6 and has the exclusive right and privilege to use, protect by copyright, patent or trademark, manufacture or otherwise exploit the processes, ideas and concepts described therein to the exclusion of Officer, except as otherwise agreed between Corporation and Officer in writing. Officer expressly agrees that any products, inventions, discoveries or improvements made by Officer, his agents or affiliates based on or arising out of the information described in Section 6 shall be (i) deemed a work made for hire under the terms of United States Copyright Act, 17 U.S.C. § 101 et seq., and Corporation shall be the owner of all such rights with respect thereto and (ii) the property of and inure to the exclusive benefit of Corporation.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!