Ponzi definition

Ponzi or other "pyramid" schemes of any type.
Ponzi or other "pyramid" schemes of any type is prohibited. Students learn collaboration, communication, creativity and critical thinking in a variety of ways throughout the school day. In an effort to increase access to those 21st Century skills, Los Alamitos Unified School District will allow personal devices on our guest network and school grounds for students who follow the responsibilities stated in the Acceptable Use Policy and the guidelines regarding Bring Your Own Device (BYOD). Furthermore, the student must agree to the following conditions:
Ponzi or other "pyramid" schemes of any type is strictly prohibited; and

Examples of Ponzi in a sentence

  • The opaque underlying or spot market poses asset verification challenges for market participants, regulators and auditors and gives rise to an increased risk of manipulation and fraud, including the potential for Ponzi schemes, bucket shops and pump and dump schemes, which may undermine market confidence in a cryptocurrency and negatively impact its price.

  • Activities that may be harmful to other users of the Product, their operations, or their reputations, including without limitation, offering or disseminating fraudulent goods, services, schemes or promotions (e.g., make-money-fast schemes, Ponzi and pyramid schemes, phishing or pharming), or engaging in other deceptive practices.

  • The Company’s compliance service implements regular checks on the traces of transactions in Products to discourage the use of funds of dubious origin, including Ponzi schemes, Tor internet, mixers, etc.

  • In these negotiations, potential victims of the Stanford Ponzi scheme were well-represented.

  • The injunction against any such claims against Underwriters is therefore a necessary and appropriate order ancillary to the relief obtained for the Stanford Entities, and by extension, the victims of the Stanford Ponzi scheme, pursuant to the Agreement.

  • After years of diligent investigation, the Plaintiffs believe that they have identified claims against a number of third parties, including the BDO Entities, that Plaintiffs claim enabled the Stanford Ponzi scheme.

  • Using service to make fraudulent offers to sell or buy products, items or services, or to advance any type of financial scam such as pyramid schemes, Ponzi schemes and unregistered sales of securities, securities fraud ad chain letters.

  • You may not use the Services to mail fraudulent offers to sell or buy products, items or services or to advance any type of financial scam such as pyramid schemes, Ponzi schemes and chain letters.

  • After years of investigation, the Plaintiffs believe that they have identified claims against a number of third parties, including Trustmark, which Plaintiffs allege enabled the Stanford Ponzi scheme.

  • Notwithstanding the foregoing, however, Independent does not have a duty to cooperate in responding to discovery requests and/or trial subpoenas (except as required by law) in the Rotstain Litigation, the SEC Action, the ▇▇▇▇▇ Litigation, or in any other action relating to the Stanford Ponzi scheme.


More Definitions of Ponzi

Ponzi or other “pyramid” schemes, “junk mail”, or other mate- rials that may be offensive in nature (e.g. sexually explicit pictures or text, crude language, racially oriented, etc.);
Ponzi or other “pyramid” schemes of any type. Transmission of any communications where the meaning of the message or its transmission or distribution would violate any applicable law or regulation, or which may be offensive to the recipient.
Ponzi or other “pyramid” schemes of any type. Personal Use - Using a reasonable amount of Mettex Electric Co Ltd resources for personal e-mails is acceptable, but non work related e-mail shall be saved in a separate folder from work related e-mail. Sending chain letters or joke e-mails from a Mettex Electric Co Ltd e-mail account is prohibited. These restrictions also apply to the forwarding of mail received by an employee. Users to exhibit extreme caution when open email and attachments from unknown sources. E-mail Retention - emails should not be retained for longer than is necessary. Any sensitive emails should be stored on the secure network drive G. Employees shall have no expectation of privacy in anything they store, send or receive on the Firm’s e-mail system. Mettex Electric Co Ltd may monitor messages without prior notice. Mobile computing and storage devices include, but are not limited to: laptop computers, plug-ins, USB port devices, CDs, DVDs, flash drives, smartphones, tablets, wireless networking cards, and any other existing or future mobile computing or storage device. Only equipment owned by Mettex Electric Co Ltd may connect to or access the company’s information systems Mobile computing and storage devices are easily lost or stolen, presenting a high risk for unauthorised access and introduction of malicious software to the network, these risks must be mitigated to acceptable levels as follows. Any employees issued with company owned flash drives, must sign the equipment out when removing it from the company premises and sign it back in on its return. A log of users and their equipment ID is kept on the company G drive under Flash Drive Log, MTX2018-FDL. Databases or portions thereof, which reside on the network shall not be downloaded to mobile computing or storage devices. Report lost or stolen mobile computing and storage devices to the IT department as soon as possible. Only approved employees and authorized third parties may utilise the benefits of VPNs. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to internal networks. VPN gateways will be set up and managed by Lakeview Computers.
Ponzi or other "pyramid" fraudulent schemes of any type.

Related to Ponzi