Credit Bureau Identity and Fraud Services Sample Clauses

Credit Bureau Identity and Fraud Services. I. Client certifies that it will use Credit Bureau identity and fraud services (“IFS Services”) exclusively within Client’s own organization for the purpose of verifying the identity of individual persons (ID Subjects) who initiates a business transaction with the Client and not for any other purpose; and that it will use and ensure that its employees’ access to the IFS Services is in accordance with the terms of the Client agreement.
AutoNDA by SimpleDocs
Credit Bureau Identity and Fraud Services. Client certifies that it will use Credit Bureau identity and fraud services (“IFS Services”) exclusively within Clients own organization for the purpose of verifying the identity of individual persons (ID Subjects) who initiates a business transaction with the Client and not for any other purpose; and that it will use and ensure that its employees access to the IFS Services is in accordance with the terms of the Client Agreement. Client acknowledges and agrees that the IFS Services do not guarantee the identity of the ID Subject, but merely provide a risk assessment regarding the ID Subject’s identity that is derived, in part, from information provided by the ID Subject or otherwise collected from an ID Subjects use of the IFS Services and relayed by Client to Credit Bureau (“ID Subject Content”); and that in connection with certain IFS Services; (i) Client will establish a risk decision threshold above which the ID Subject is verified or authenticated, depending on the applicable Service, and below which the ID Subject is not verified or authenticated (“Risk Decision Threshold”) and Credit Bureau may act as a consultant to review Client’s risk strategies, but Client, in its sole discretion, will set its Risk Decision Threshold(s); and (ii) that depending upon Client’s Risk Decision Threshold an ID Subject may be able to successfully pass verification and authentication even though the individual submitting the ID Subject Content is not the actual individual to whom the ID Subject Content pertains. Client shall not maintain, copy, capture, reproduce, re-use or otherwise retain in any manner the interactive questions or multiple choice answers provided as part of the IFS Services (“Queries”), the ID Subject responses to the Queries (“Answers”) or the scores, flags and reason codes generated or other information relating to such Queries and Answers provided by the IFS Services (Scores); provided, however, that Client may capture and retain the unique transaction number generated by the IFS Services with each transaction (each a “Transaction ID” solely for the purpose of (i) audit trail; (ii) calculation of the amount of usage of IFS Services; and (iii) billing. Without limiting the generality of the foregoing, Client shall not retain or make copies of, and must purge from its system, the Queries and Answers prior to Client’s receipt of any Score relating to such Queries and Answers; and in the event Client receives the IFS Services at its call center (or cal...

Related to Credit Bureau Identity and Fraud Services

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Fraud, Xxxxx and Abuse If you have concerns about being billed for services you never received, or that your insurance information has been stolen or used by someone else, you may report potential health care fraud, waste or abuse to our Special Investigations Unit by using our confidential anti-fraud hotline at 0-000-000-0000 or by email at XXX@xxxxxx.xxx. You may also send an anonymous letter to us at: Blue Cross & Blue Shield of Rhode Island Special Investigations Unit 000 Xxxxxxxx Xxxxxx Providence RI, 02903

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Information and Services 2.1.1 The Owner shall provide full information in a timely manner regarding the requirements of the Project, including the Owner’s objectives, constraints and criteria, space requirements and relationships, flexibility and expandability requirements, special equipment and systems, and site requirements as reasonably requested by Construction Manager in writing.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • DATA PROTECTION AND FREEDOM OF INFORMATION 7.1. Each party will:-

  • Substance Abuse Treatment Information Substance abuse treatment information shall be maintained in compliance with 42 C.F.R. Part 2 if the Party or subcontractor(s) are Part 2 covered programs, or if substance abuse treatment information is received from a Part 2 covered program by the Party or subcontractor(s).

  • Contact Information for Privacy and Security Officers and Reports 2.1 Business Associate shall provide, within ten (10) days of the execution of this Agreement, written notice to the Contract or Grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer of the Business Associate. This information must be updated by Business Associate any time these contacts change.

Time is Money Join Law Insider Premium to draft better contracts faster.