Monitoring and reporting suspicious activity Sample Clauses

Monitoring and reporting suspicious activity. The Company collects and verifies identification data of the Client and also logs and tracks itemized statements of all transactions carried out by the Client. If The Company tracks suspicious transactions of the clients and transactions executed under nonstandard conditions. The Company performs its anti-money laundering compliance on the basis of AML/FATF recommendations. The Company neither accepts cash deposits nor disburses cash under any circumstances. In addition, any wire deposit of USD 200,000 and above may be subjected to approval prior to acceptance of fund. The Client may be required to complete an ECDD (Enhance Customer Due Diligence) form. If approval is not given, fund may be rejected and returned, and applicable charges are borne by the Client. The Company reserves the right to refuse to process a transaction at any stage, when it believes the transaction to be connected in any way to money laundering or criminal activity. In accordance with international law, The Company is not obligated to inform the client that they were reported to the corresponding governing bodies due to client’s suspicious activity.
AutoNDA by SimpleDocs
Monitoring and reporting suspicious activity. The Company collects and verifies identification data of the Client and logs and tracks itemized statements of all transactions carried out by the Client. If the Company tracks suspicious transactions of the clients and transactions executed under nonstandard conditions. The Company performs its anti-money laundering compliance based on AML/FATF recommendations. The Company neither accepts cash deposits nor disburses cash under any circumstances. The Company reserves the right to refuse to process a transaction at any stage, when it believes the transaction to be connected in any way to money laundering or criminal activity. In accordance with international law, The Company is not obligated to inform the client that they were reported to the corresponding governing bodies due to client’s suspicious activity.

Related to Monitoring and reporting suspicious activity

  • Monitoring and Reporting 3.1 The Contractor shall provide workforce monitoring data as detailed in paragraph 3.2 of this Schedule 8. A template for data collected in paragraphs 3.2, 3.3 and 3.4 will be provided by the Authority. Completed templates for the Contractor and each Sub-contractor will be submitted by the Contractor with the Diversity and Equality Delivery Plan within six (6) Months of the Commencement Date and annually thereafter. Contractors are required to provide workforce monitoring data for the workforce involved in delivery of the Contract. Data relating to the wider Contractor workforce and wider Sub-contractors workforce would however be well received by the Authority. Contractors and any Sub-contractors are required to submit percentage figures only in response to paragraphs 3.2(a), 3.2(b) and 3.2(c).

  • Safeguards Monitoring and Reporting 8. The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • PERFORMANCE MONITORING AND REPORTING Performance indicators

  • Diverse Spend Reporting If the total value of the Contract may exceed $500,000, including all extension options, Contractor must track and report, on a quarterly basis, the amount paid to diverse businesses both: 1) directly to subcontractors performing under the Contract, and 2) indirectly to diverse businesses that provide supplies/services to your company (in proportion to the revenue from this Contract compared to Contractor’s overall revenue). When this applies, Contractor will register in a free portal to help report the Tier 2 diverse spend, and the requirement continues as long as the Contract is in effect.

  • Record Keeping and Reporting 15.01 The Accredited Entity shall ensure that:

  • Funding, Services and Reporting The HSP represents warrants and covenants that

  • Documenting and Reporting Breaches 6.1 Business Associate shall report to Covered Entity any Breach of Unsecured PHI, including Breaches reported to it by a Subcontractor, as soon as it (or any of its employees or agents) becomes aware of any such Breach, and in no case later than two (2) business days after it (or any of its employees or agents) becomes aware of the Breach, except when a law enforcement official determines that a notification would impede a criminal investigation or cause damage to national security.

  • GOVERNANCE AND REPORTING Measure 3a Is the school complying with governance requirements? Meets Standard: The school materially complies with applicable laws, rules, regulations and provisions of the charter contract relating to governance by its board, including but not limited to: • Governing board composition and membership requirements pursuant to Ch. 302D, HRS • Governing board policies • Governing board reporting requirements • Procurement policies • State Ethics Code (Ch. 84, HRS), including conflict of interest policy Measure 3b Is the school holding management accountable? Meets Standard: The school materially complies with applicable laws, rules, regulations and provisions of the charter contract relating to oversight of school management, including but not limited to: • (For Education Service Providers [ESPs]) maintaining authority over management, holding it accountable for performance as agreed under a written performance agreement and requiring annual financial reports of the ESP • (For Others) oversight of management that includes holding it accountable for performance expectations that may or may not be agreed to under a written performance agreement Measure 3c Is the school complying with data and reporting requirements? Meets Standard: The school materially complies with applicable laws, rules, regulations and provisions of the charter contract relating to relevant reporting requirements to the State Public Charter School Commission, State Department of Education as the State Education Agency (SEA) and sole Local Education Agency (LEA) and/or federal authorities, including but not limited to: • Compliance with minimum educational data reporting standards established by the BOE • Maintaining and reporting accurate enrollment and attendance data • Maintaining and reporting accurate personnel data • Annual reporting and immediate notice requirements • Additional information requested by the State Public Charter School Commission

  • Recordkeeping and Reporting The Subadvisor shall maintain the records and information required by Rule 31a-1 under the 1940 Act described in Schedule B attached hereto, with respect to the Assets of the Series. In addition, the Subadvisor shall maintain such other records relating to the services the Subadvisor provides under this Agreement as may be required in the future by applicable SEC and other applicable rules, and shall retain such information for such times and in such manner as required by applicable rules, including but not limited to Rule 31a-2 under the 1940 Act. The records maintained by the Subadvisor hereunder shall be the property of the Fund and shall be surrendered promptly upon request; subject, however, to the Subadvisor's right to retain all such records as the Subadvisor is required to maintain under the Advisers Act and the rules and regulations promulgated thereunder; provided, further, that the Fund shall be entitled to make and maintain copies of any records so retained by request.

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request. In addition to the requirements set forth in any applicable Business Associate Agreement as may be attached to this Contract, in the event of any actual security breach or reasonable belief of an actual security breach the Contractor either suffers or learns of that either compromises or could compromise State Data (a “Security Breach”), the Contractor shall notify the State within 24 hours of its discovery. Contractor shall immediately determine the nature and extent of the Security Breach, contain the incident by stopping the unauthorized practice, recover records, shut down the system that was breached, revoke access and/or correct weaknesses in physical security. Contractor shall report to the State: (i) the nature of the Security Breach; (ii) the State Data used or disclosed; (iii) who made the unauthorized use or received the unauthorized disclosure; (iv) what the Contractor has done or shall do to mitigate any deleterious effect of the unauthorized use or disclosure; and (v) what corrective action the Contractor has taken or shall take to prevent future similar unauthorized use or disclosure. The Contractor shall provide such other information, including a written report, as reasonably requested by the State. Contractor shall analyze and document the incident and provide all notices required by applicable law. In accordance with Section 9 V.S.A. §2435(b)(3), the Contractor shall notify the Office of the Attorney General, or, if applicable, Vermont Department of Financial Regulation (“DFR”), within fourteen (14) business days of the Contractor’s discovery of the Security Breach. The notice shall provide a preliminary description of the breach. The foregoing notice requirement shall be included in the subcontracts of any of Contractor’s subcontractors, affiliates or agents which may be “data collectors” hereunder. The Contractor agrees to fully cooperate with the State and assume responsibility at its own expense for the following, to be determined in the sole discretion of the State: (i) notice to affected consumers if the State determines it to be appropriate under the circumstances of any particular Security Breach, in a form recommended by the AGO; and (ii) investigation and remediation associated with a Security Breach, including but not limited to, outside investigation, forensics, counsel, crisis management and credit monitoring, in the sole determination of the State. The Contractor agrees to comply with all applicable laws, as such laws may be amended from time to time (including, but not limited to, Chapter 62 of Title 9 of the Vermont Statutes and all applicable State and federal laws, rules or regulations) that require notification in the event of unauthorized release of personally-identifiable information or other event requiring notification. In addition to any other indemnification obligations in this Contract, the Contractor shall fully indemnify and save harmless the State from any costs, loss or damage to the State resulting from a Security Breach or the unauthorized disclosure of State Data by the Contractor, its officers, agents, employees, and subcontractors.

Time is Money Join Law Insider Premium to draft better contracts faster.