Detecting Red Flags Clause Samples

The "Detecting Red Flags" clause establishes procedures for identifying warning signs or indicators of potential issues, such as fraud, non-compliance, or other risks, within a contractual or business relationship. Typically, this clause outlines the types of behaviors, transactions, or documentation that should be monitored, and may require parties to report or investigate suspicious activities. Its core practical function is to promote vigilance and early detection of problems, thereby helping to prevent or mitigate harm before it escalates.
Detecting Red Flags. The Federal Trade Commission has adopted rules requiring certain financial institutions to implement an Identity Theft Prevention Program and to detect “Red Flags”(as defined in this section) to prevent identity theft. (a) PNC will provide the Fund with its “Red Flag Services”, which are hereby defined to mean the following services: (i) PNC will maintain written controls reasonably designed to detect the occurrence of Red Flags (as defined below) in connection with (A) account opening and other account activities and transactions conducted directly through PNC with respect to Direct Accounts (as defined below), and (B) transactions effected directly through PNC by Covered Persons (as defined below) in Covered Accounts (as defined below). Such controls, as they may be revised from time to time hereunder, are referred to herein as the “Controls”. Solely for purposes of the Red Flag Section, the capitalized terms below will have the respective meaning ascribed to each below or, to the extent that the definition of any such term under the Rule is, at any time, different from the definition set forth below, such term will have the meaning ascribed thereto in the then-effective version of the Rule:
Detecting Red Flags. Having identified the potential Red Flags as outlined above, Badcock seeks to detect Red Flags in connection with opening and servicing Badcock accounts by: A. Obtaining identifying information about, and verifying the identity of, a person making an application to open a new account or access an existing account, for example, using the policies and procedures regarding identification and verification of customers; and B. Authenticating consumers, monitoring transactions, and verifying the validity of change of address requests, in the case of existing covered account.
Detecting Red Flags. We have reviewed our covered accounts, how we open and maintain them, and how to detect Red Flags that may have occurred in them. Our detection of those Red Flags is based on our methods of getting information about applicants and verifying it under our CIP of our AML compliance procedures, authenticating customers who access the accounts, and monitoring transactions and change of address requests. For opening covered accounts, that can include getting identifying information about and verifying the identity of the person opening the account by using the firm’s CIP. For existing covered accounts, it can include authenticating customers, monitoring transactions, and verifying the validity of changes of address. Based on this review, we have included in the second column (“Detecting the Red Flag”) of the attached Grid how we will detect each of our firm’s identified Red Flags.

Related to Detecting Red Flags

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Periodic Review of Costs of Environmental Compliance In the ordinary course of its business, the Company conducts a periodic review of the effect of Environmental Laws on the business, operations and properties of the Company and its subsidiaries, in the course of which it identifies and evaluates associated costs and liabilities (including, without limitation, any capital or operating expenditures required for clean-up, closure of properties or compliance with Environmental Laws or any permit, license or approval, any related constraints on operating activities and any potential liabilities to third parties). On the basis of such review and the amount of its established reserves, the Company has reasonably concluded that such associated costs and liabilities would not, individually or in the aggregate, result in a Material Adverse Change.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Interconnection Facilities Engineering Procurement and Construction Interconnection Facilities, Network Upgrades, and Distribution Upgrades shall be studied, designed, and constructed pursuant to Good Utility Practice. Such studies, design and construction shall be based on the assumed accuracy and completeness of all technical information received by the Participating TO and the CAISO from the Interconnection Customer associated with interconnecting the Large Generating Facility.