REPORTING CERTAIN ACTIVITIES Sample Clauses

REPORTING CERTAIN ACTIVITIES. Banks are required to file a report called a Currency Transaction Report (CTR) with the Internal Revenue Service whenever it has currency transactions that exceed $10,000 in one business day. This includes both single and multiple transactions, transactions to or from or on behalf of any one individual or other entity, or in or out of any one account, and exchanges of currency. Banks are also required to file other reports with the U.S. Treasury Department when a transaction is conducted or attempted by, at, or through a bank, involves or aggregates at least $5,000 in funds or other assets, and the bank knows, suspects, or has reason to suspect that: (a) the transaction involves funds derived from illegal activities or is intended or conducted in order to hide or disguise funds or assets derived from illegal activities (including, without limitation, the ownership, nature, source, location, or control of such funds or assets) as part of a plan to violate or evade any federal law or regulation or to avoid any transaction reporting requirement under federal law or regulation; (b) the transaction is designed to evade any requirements of this part or of any other regulations promulgated under the Bank Secrecy Act; or (c) the transaction has no business or apparent lawful purpose or is not the sort in which the particular customer would normally be expected to engage, and the Bank knows of no reasonable explanation for the transaction after examining the available facts, including the background and possible purpose of the transaction. Banks are also required to maintain a record of: (i) sales of certain negotiable instruments such as cashier’s checks, money orders, traveler’s checks, and other similar instruments when the amount of cash involved is $3,000 to $10,000 inclusive; and (ii) funds transfers of $3,000 or greater. These records must be made available to the U.S. Treasury Department upon request. Other crimes under the Bank Secrecy Act are: (i) causing or attempting to cause a financial institution to fail to file a currency transaction report; (ii) causing or attempting to cause a financial institution to file an inaccurate report; and (iii) structuring or attempting to structure large transactions with financial institutions into several smaller transactions in an attempt to avoid reporting. Financial institutions, financial institution employees, and individuals may all be subject to prosecution for evading the reporting requirements. There are both...
AutoNDA by SimpleDocs

Related to REPORTING CERTAIN ACTIVITIES

  • Compliance Reporting a. Provide reports to the Securities and Exchange Commission, the National Association of Securities Dealers and the States in which the Fund is registered.

  • Compliance Reports The Subadvisor at its expense will provide the Advisor with such compliance reports relating to its duties under this Agreement as may be agreed upon by such parties from time to time.

  • REGULATORY FILINGS AND CAISO TARIFF COMPLIANCE 3.1 Filing

  • Requirement to Utilize HUB Compliance Reporting System Pursuant to Texas Administrative Code, Title 34, Part 1, Sections 20.285(f) and 20.287(b), TFC administers monthly administration HSP-PAR compliance monitoring through its HUB Compliance Reporting System commonly known as B2G. PSP and PSP’s subcontractors/subconsultants shall submit required PAR information into the B2G system. Any delay in the timely submission of PAR information into the B2G system will be treated as an invoicing error subject to dispute under Texas Government Code Section 2251.042.

  • Compliance Reviews The Department may conduct a compliance review of the Contractor’s security procedures before and during the Contract term to protect Confidential Information.

  • Compliance Audit LEA shall have the right but shall be under no obligation to conduct audit(s), from time to time, of Provider’s records concerning its compliance obligations as set forth in this Article V. Provider shall make such records and other documents available to LEA upon request.

  • Compliance Review During the Term, Developer agrees to permit the GLO, HUD, and/or a designated representative of the GLO or HUD to access the Property for the purpose of performing Compliance-Monitoring Procedures. In accordance with GLO Compliance-Monitoring Procedures, the GLO or HUD will periodically monitor and audit Developer’s compliance with the requirements of this Agreement, the CDBG-DR Regulations, the CDBG Multifamily Rental Housing Guidelines, and any and all other Governmental Requirements during the Term. In conducting any compliance reviews, the GLO or HUD will rely primarily on information obtained from Developer’s records and reports, on-site monitoring, and audit reports. The GLO or HUD may also consider other relevant information gained from other sources, including litigation and citizen complaints. Attachment G GLO Contract No. 19-097-041-B662 5.04 HAZARDOUS MATERIALS: INDEMNIFICATION

  • Contractual and Operational Compliance Audits (a) ICANN may from time to time (not to exceed twice per calendar year) conduct, or engage a third party to conduct, contractual compliance audits to assess compliance by Registry Operator with its representations and warranties contained in Article 1 of this Agreement and its covenants contained in Article 2 of this Agreement. Such audits shall be tailored to achieve the purpose of assessing compliance, and ICANN will (a) give reasonable advance notice of any such audit, which notice shall specify in reasonable detail the categories of documents, data and other information requested by ICANN, and

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.

  • Compliance Monitoring Grantee must be subject to compliance monitoring during the period of performance in which funds are Expended and up to three years following the closeout of all funds. In order to assure that the program can be adequately monitored, the following is required of Grantee:

Time is Money Join Law Insider Premium to draft better contracts faster.