User Identity Verification Sample Clauses

User Identity Verification. With registration of an AENX Account on Aenco, you agree to share personal information requested for the purposes of identity verification (“KYC”). You confirm that all and any details of your identity that you have supplied to Aenco are accurate and complete. You agree to complete the relevant KYC process as requested by Aenco as may be requested by us from time to time. If you fail to complete any requisite KYC process, Aenco reserves the right to reject your access to AENX Account and use of AENX Services. The information we collect in the KYC process is information is used specifically for the detection of money laundering, terrorist financing, fraud and other financial crimes on AENX. We will collect, use and share this information in accordance with the Privacy Policy. In addition to providing this information, to facilitate compliance with global industry standards for data retention, you agree to permit us to keep a record of such information for the lifetime of your AENX Account plus 5 years beyond account closing. You also authorise us to make inquiries, either directly or through third parties, that are deemed necessary to verify your identity or to protect you and/or us against financial crimes such as fraud. The identity verification information we request may include, but is not limited to, your: name, email address, contact information, contact number, username, government-issued ID and other information collected at the time of the registration of the AENX Account. After registration the AENX Account, you must guarantee that the identity verification information is truthful, complete and updated in a timely manner with any changes. If there is any reasonable doubt that any information provided by you is wrong, untruthful, outdated or incomplete, Aenco shall have the right to send you a notice to demand corrections, remove relevant information directly and, as the case may be, terminate all or part of the AENX Services to you. You shall be solely and fully responsible for any loss or expenses incurred during the use of AENX Service if you cannot be reached through the contact information provided. You hereby acknowledge and agree that you have the obligation to keep all information provided up to date if there are any changes. BY SIGNING UP FOR AENX ACCOUNT YOU HEREBY AUTHORIZE AENCO TO MAKE INQUIRIES, WHETHER DIRECTLY OR THROUGH THIRD PARTIES, THAT AENCO CONSIDERS NECESSARY TO VERIFY YOUR IDENTITY OR PROTECT YOU AND/OR AENCO AGAINST FRAUD O...
AutoNDA by SimpleDocs
User Identity Verification. 3.5.1. For the purpose of verifying the provided Identification Data or other data or documents, FUMBI is entitled to take all steps necessary to verify the identity of the User and the identity of end users of the User's benefits, take the necessary steps to protect against fraud, money laundering, terrorist financing or any other illegal activities, either directly or through a third party.
User Identity Verification. 4.3.1. You acknowledge that Cassava may require you to provide personal information and other for identity verification in order to provide the full extent of Cassava Services. The collection, use and sharing of any such information shall be governed by the KYC/AML Policy which may be published and/or updated from time to time.

Related to User Identity Verification

  • Identity Verification In the case that the Subscriber provides telecommunication services to any Subscriber’s Customers pursuant to Section 8.1, the Subscriber is responsible for performing and shall perform personal identification of Subscriber’s Customer. SORACOM shall not bear any responsibility in relation to dealing with such matters.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Certain of PNC’s affiliates are financial institutions, and PNC may, as a matter of policy, request (or may have already requested) the Fund’s name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party’s date of birth. PNC may also ask (and may have already asked) for additional identifying information, and PNC may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.

  • Customer Identification Program (A) To assist the Fund in complying with requirements regarding a customer identification program in accordance with applicable regulations promulgated by U.S. Department of Treasury under Section 326 of the USA PATRIOT Act (“CIP Regulations”), BNYM will do the following:

  • Taxpayer Identification Number; Other Identifying Information The true and correct U.S. taxpayer identification number of the Borrower is set forth on Schedule 10.02.

  • Vendor Identity and Contact Information It is Vendor’s sole responsibility to ensure that all identifying vendor information (name, EIN, d/b/a’s, etc.) and contact information is updated and current at all times within the TIPS eBid System and the TIPS Vendor Portal. It is Vendor’s sole responsibility to confirm that all e-correspondence issued from xxxx-xxx.xxx, xxxxxxx.xxx, and xxxxxxxxxxxxxxxx.xxx to Vendor’s contacts are received and are not blocked by firewall or other technology security. Failure to permit receipt of correspondence from these domains and failure to keep vendor identity and contact information current at all times during the life of the contract may cause loss of TIPS Sales, accumulating TIPS fees, missed rebid opportunities, lapse of TIPS Contract(s), and unnecessary collection or legal actions against Vendor. It is no defense to any of the foregoing or any breach of this Agreement that Vendor was not receiving TIPS’ electronic communications issued by TIPS to Vendor’s listed contacts.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Separate Identity The Seller shall, to the extent applicable to it, act in a manner that is consistent with the statements set forth in Exhibit 4.2(f).

  • E-Verification If applicable, Contractor represents and warrants that it will ensure its compliance with the Mississippi Employment Protection Act of 2008, and will register and participate in the status verification system for all newly hired employees. Mississippi Code Annotated §§ 71-11-1 et seq. The term “employee” as used herein means any person that is hired to perform work within the State of Mississippi. As used herein, “status verification system” means the Illegal Immigration Reform and Immigration Responsibility Act of 1996 that is operated by the United States Department of Homeland Security, also known as the E-Verify Program, or any other successor electronic verification system replacing the E-Verify Program. Contractor agrees to maintain records of such compliance. Upon request of the State and after approval of the Social Security Administration or Department of Homeland Security when required, Contractor agrees to provide a copy of each such verification. Contractor further represents and warrants that any person assigned to perform services hereafter meets the employment eligibility requirements of all immigration laws. The breach of this agreement may subject Contractor to the following:

  • Third Party Verification 4.8.1 The SPD shall be further required to provide entry to the site of the Power Project free of all encumbrances at all times during the Term of the Agreement to SECI and a third Party nominated by any Indian Governmental Instrumentality for inspection and verification of the works being carried out by the SPD at the site of the Power Project.

Time is Money Join Law Insider Premium to draft better contracts faster.