Detecting Red Flags Clause Samples
The "Detecting Red Flags" clause establishes procedures for identifying warning signs or indicators of potential issues, such as fraud, non-compliance, or other risks, within a contractual or business relationship. Typically, this clause outlines the types of behaviors, transactions, or documentation that should be monitored, and may require parties to report or investigate suspicious activities. Its core practical function is to promote vigilance and early detection of problems, thereby helping to prevent or mitigate harm before it escalates.
Detecting Red Flags. The Federal Trade Commission has adopted rules requiring certain financial institutions to implement an Identity Theft Prevention Program and to detect “Red Flags”(as defined in this section) to prevent identity theft.
(a) PNC will provide the Fund with its “Red Flag Services”, which are hereby defined to mean the following services:
(i) PNC will maintain written controls reasonably designed to detect the occurrence of Red Flags (as defined below) in connection with (A) account opening and other account activities and transactions conducted directly through PNC with respect to Direct Accounts (as defined below), and (B) transactions effected directly through PNC by Covered Persons (as defined below) in Covered Accounts (as defined below). Such controls, as they may be revised from time to time hereunder, are referred to herein as the “Controls”. Solely for purposes of the Red Flag Section, the capitalized terms below will have the respective meaning ascribed to each below or, to the extent that the definition of any such term under the Rule is, at any time, different from the definition set forth below, such term will have the meaning ascribed thereto in the then-effective version of the Rule:
Detecting Red Flags. Having identified the potential Red Flags as outlined above, Badcock seeks to detect Red Flags in connection with opening and servicing Badcock accounts by:
A. Obtaining identifying information about, and verifying the identity of, a person making an application to open a new account or access an existing account, for example, using the policies and procedures regarding identification and verification of customers; and
B. Authenticating consumers, monitoring transactions, and verifying the validity of change of address requests, in the case of existing covered account.
Detecting Red Flags. We have reviewed our covered accounts, how we open and maintain them, and how to detect Red Flags that may have occurred in them. Our detection of those Red Flags is based on our methods of getting information about applicants and verifying it under our CIP of our AML compliance procedures, authenticating customers who access the accounts, and monitoring transactions and change of address requests. For opening covered accounts, that can include getting identifying information about and verifying the identity of the person opening the account by using the firm’s CIP. For existing covered accounts, it can include authenticating customers, monitoring transactions, and verifying the validity of changes of address. Based on this review, we have included in the second column (“Detecting the Red Flag”) of the attached Grid how we will detect each of our firm’s identified Red Flags.
