Document all security report and log other pertinent information including but not limited to incidents or theft, injury / illness and safety violations.
Not exact matches
Documents in a mortgage backed
security fraud case «reveal that J.P. Morgan, as well as... Washington Mutual and Bear Stearns, flouted quality controls and ignored problems, sometimes hiding them entirely, in a quest for profit,» the New York Times
reported.
The communication,
reported by Motherboard, came a week after Julian Assange's initial statement that he would help the companies close
security loopholes disclosed in a set of leaked CIA
documents.
In June 2013, The Guardian
reported the first leak based on top - secret
documents that then 29 - year - old Edward Snowden stole from the National
Security Agency.
The
report, distilled from a more detailed classified
document submitted to Congress last year, warns that America's two authoritarian rivals are actively seeking to «co-opt or replace the free and open order that has enabled global
security and prosperity in since World War II.»
A
document filed Thursday with the
Securities and Exchange Commission shows that Sandberg has transferred 590,000 shares of Facebook stock, which Recode
reports is worth nearly $ 100 million, to a fund she uses for charitable giving.
Since the scope and breadth of the nation's surveillance program was revealed by
documents leaked by former
security contractor Edward Snowden last summer, other
reports about the NSA's surveillance methods have followed, including one that alleges the agency placed spyware on consumer electronics made by Microsoft, Cisco and other major brands.
The comments from Warner, the ranking Democrat on the Senate Intelligence Committee, came one day after The Intercept
reported on a top - secret National
Security Agency
document that said hackers associated with Russia's military intelligence agency targeted a company with information on US voting software days before the election.
The foregoing review of important factors should not be construed as exhaustive and should be read in conjunction with the other cautionary statements that are included herein and elsewhere, including the Risk Factors included in Tesla's and SolarCity's most recent
reports on Form 10 - K and Form 10 - Q and other
documents of Tesla and SolarCity on file with the
Securities and Exchange Commission.
In addition to factors previously disclosed in Tesla's and SolarCity's
reports filed with the U.S.
Securities and Exchange Commission (the «SEC») and those identified elsewhere in this
document, the following factors, among others, could cause actual results to differ materially from forward - looking statements and historical performance: the ability to obtain regulatory approvals and meet other closing conditions to the transaction, including requisite approval by Tesla and SolarCity stockholders, on a timely basis or at all; delay in closing the transaction; the ultimate outcome and results of integrating the operations of Tesla and SolarCity and the ultimate ability to realize synergies and other benefits; business disruption following the transaction; the availability and access, in general, of funds to meet debt obligations and to fund ongoing operations and necessary capital expenditures; and the ability to comply with all covenants in the indentures and credit facilities of Tesla and SolarCity, any violation of which, if not cured in a timely manner, could trigger a default of other obligations under cross-default provisions.
The Company's actual results could also be impacted by the other risks detailed from time to time in its publicly filed
documents, including in Item 1A (Risk Factors) of its most recent Annual
Report on Form 10 - K, in its Quarterly
Report on Form 10 - Q and in other
reports filed with the
Securities and Exchange Commission.
Factors that could cause or contribute to actual results differing from our forward - looking statements include risks relating to: failure of DBRS to rate the Notes at the anticipated ratings levels, which is a closing condition, or at all; changes in the financial markets, including changes in credit markets, interest rates, securitization markets generally and our proposed securitization in particular; the willingness of investors to buy the Notes; adverse developments regarding OnDeck, its business or the online or broader marketplace lending industry generally, any of which could impact what credit ratings, if any, are issued with respect to the Notes; the extended settlement cycle for the scheduled closing on April 17, 2018, which may exacerbate the foregoing risks; and other risks, including those described in our Annual
Report on Form 10 - K for the year ended December 31, 2017 and in other
documents that we file with the
Securities and Exchange Commission from time to time which are or will be available on the Commission's website at www.sec.gov.
Important factors that could cause actual results to differ from OnDeck's forward - looking statements are the risks that OnDeck may not be able to manage its anticipated or actual growth effectively, that its credit models do not adequately identify potential risks, and other risks, including those under the heading «Risk Factors» in OnDeck's Annual
Report on Form 10 - K for the year ended December 31, 2016, its Quarterly
Reports for the quarters ended June 30 and September 30, 2017 and in other
documents that OnDeck files with the
Securities and Exchange Commission, or SEC, from time to time which are available on the SEC website at www.sec.gov.
There have been conflicting
reports on whether Cohen then delivered this
document to the White House and then - National
Security Adviser Michael Flynn.
On Tuesday, The Intercept
reported that Edward Snowden furnished
documents which demonstrate that the National
Security Agency (NSA) has kept a careful eye on digital currencies, including bitcoin, through codenamed projects like OAKSTAR and MONKEYROCKET.
This process, which can take between one to four weeks, typically involves reviewing fund
documents, current financial
reports, and business and
securities documentation.
The Center for Investigative Journalism managed to make a compendium of their profiles and gathered some data on its top executives collected from official
documents of the
Securities and Exchange Commission (SEC) or from
reports mainly published by foreign media.
What we've learned from court
documents released Friday, and subsequent
reporting, is that during the transition, Kushner instructed Flynn to try to get the Russian ambassador to block a United Nations
Security Council vote condemning Israeli settlements.
The Intercept recently
reported: Classified
documents provided by whistleblower Edward Snowden show that the National
Security Agency indeed worked urgently to target bitcoin users around the world — and wielded at least one mysterious source of information to «help track down senders and receivers of Bitcoins,» according to a top - secret passage in an internal NSA
report dating to March 2013.
That, in light of $ 3.1 billion of missing funds outlined in Chapter Eight of the 2013 Spring
Report of the Auditor General of Canada, an order of the House do issue for the following
documents from 2001 to the present, allowing for redaction based on national
security: (a) all Public Security and Anti-Terrorism annual reports submitted to the Treasury Board Secretariat; (b) all Treasury Board submissions made as part of the Initiative; (c) all departmental evaluations of the Initiative; (d) the Treasury Board corporate database established to monitor funding; that these records be provided to the House in both official languages by June 17, 2013; that the Speaker make arrangements for these records to be made available online; and that the Auditor - General be given all necessary resources to perform an in - depth forensic audit until the missing $ 3.1 billion is found and accoun
security: (a) all Public
Security and Anti-Terrorism annual reports submitted to the Treasury Board Secretariat; (b) all Treasury Board submissions made as part of the Initiative; (c) all departmental evaluations of the Initiative; (d) the Treasury Board corporate database established to monitor funding; that these records be provided to the House in both official languages by June 17, 2013; that the Speaker make arrangements for these records to be made available online; and that the Auditor - General be given all necessary resources to perform an in - depth forensic audit until the missing $ 3.1 billion is found and accoun
Security and Anti-Terrorism annual
reports submitted to the Treasury Board Secretariat; (b) all Treasury Board submissions made as part of the Initiative; (c) all departmental evaluations of the Initiative; (d) the Treasury Board corporate database established to monitor funding; that these records be provided to the House in both official languages by June 17, 2013; that the Speaker make arrangements for these records to be made available online; and that the Auditor - General be given all necessary resources to perform an in - depth forensic audit until the missing $ 3.1 billion is found and accounted for.
The publication
reported that the current breach could be the most dangerous of all since the attackers were able to acquire key personal identification
documents — names, addresses, Social
Security numbers and dates of birth — all at once.
While the «left - wing» assessment
reported on known criminal activities, the «right - wing»
document started with the acknowledgment that Department of Homeland
Security intelligence «has no specific information that domestic rightwing terrorists are currently planning acts of violence.»
This is not the first time that, claims of
security reports and research
documents are making the rounds in the NPP.
A spokesman said the
documents were «not of a sensitive nature» but the Mirror
reported that one contained details of how
security forces failed to «get the truth» on British involvement in terror interrogations.
I have in front of me as I write a meticulously - compiled
document from the Community
Security Trust — its «Antisemitic Incidents
Report 2009».
«Building on the innovative legacy of the New Deal, this
report describes a far - reaching, two-fold agenda to tame the growth of wealth among the top one percent and establish rules and institutions that ensure
security and opportunity for the middle class,» reads the
document, which calls for the federal government to adopt several recommendations, including childcare subsidies and universal pre-K.
A year after two murderers escaped from Clinton Correctional Facility in Dannemora, N.Y., the state inspector general's office released a
report documenting a series of
security failings that enabled the prison break.
Emergency Contact Info Emergency Preparedness
Documents Campus
Security Report Sign up for E2Campus alerts
Report an Accident UWS Emergency Preparedness Presentation
NAI's financial performance and the forward - looking statements contained herein are further qualified by other risks including those set forth from time to time in the
documents filed by us with the
Securities and Exchange Commission, including our most recent Annual
Report on Form 10 - K and Quarterly
Report on Form 10 - Q.
NAI's financial performance and the forward - looking statements contained herein are further qualified by other risks including those set forth from time to time in the
documents filed by us with the
Securities and Exchange Commission, including our most recent Annual
Report on Form 10 - K.
However, we strongly recommend that you also check with the three major credit
reporting agencies (TransUnion, Equifax and Experian) to ensure you are submitting the proper
documents when placing and using the
security freeze.
Bank accounts, credit applications, and other
documents that become part of your credit history come to be on your
report through a variety of ways, many of which do not have many other identifying factors like your social
security number...
For
security reasons, tax
documents are available for online viewing only by the owner of the Taxpayer Identification Number (TIN) associated with the IRS
reporting.
This analytical
report explores the livelihood and food
security benefits of agroforestry and conservation agriculture in Malawi and Zambia, as well as economic feasibility analyses of the practices.It finds that agroforestry has well -
documented improvements in yields and profitability in both countries, while the evidence - base for the benefits of conservation agriculture is positive, but weaker.
Grist Special
Report — By Antonia Juhasz on Jun 1, 2017 As people nationwide rallied last year to support the Standing Rock Sioux's attempts to block the Dakota Access Pipeline, a private
security firm with experience fighting in Iraq and Afghanistan launched an intrusive military - style surveillance and counterintelligence campaign against the activists and their allies, according to internal company
documents.
In a
report on Monday to the SEC rebutting Exxon's contention, a former head of the SEC's Office of Municipal
Securities said she had reviewed the disclosure
documents at the request of the municipalities and found no inconsistencies or conflicts between the allegations made by the local governments in their lawsuits regarding sea level rise and the disclosures they made in their bond
documents.
This
document summarizes the key points highlighted in the report «Climate Change and Food Security: a Framework Document
document summarizes the key points highlighted in the
report «Climate Change and Food
Security: a Framework
DocumentDocument».
With support for all known legal entity types, it includes and self - fills all applicable regulatory forms and e-filings, governs all management bodies, meetings, minutes and agendas, streamlines intellectual property management and tracking, possesses one of the most complete and powerful transactional
securities management systems, provides
document automation and management capabilities and addresses
security, workflows, audits and
reports to the most stringent compliance and governance requirements.
Topics may include: creating
document templates; understanding and using tokens; modifying user preferences and
security preferences; creating file menu templates, creating custom windows; leveraging the power of Task Wizards and the Open File Wizard; managing changing data /
reporting needs; capturing online, legal research time within a file; tracking time in a more efficient and flexible way; and protecting your data using Legal Files
security controls.
These
documents include copies of your driver's license, social
security card, one year of bank statements, six months of payroll, two years of taxes, deed and mortgages, student loan
documents, credit
report, all outstanding bills and the credit - counseling certificate.
Step 8: get every
document relevant to your accident (i.e.
security reports, receipts, contact information of witnesses, etc.) and ensure that you provide everything to your lawyer so they are working with all the relevant evidence
Andrew has experience drafting, negotiating and advising on a wide range of corporate and commercial
documents, including sale and purchase agreements, joint venture and shareholder agreements, commercial contracts, terms of trade, confidentiality agreements,
securities offer
documents and due diligence
reports.
If an imposter obtains key personal information such as a Social
Security or Driver's License number, or other method of identifying an insured person in order to impersonate or obtain credit, merchandise or services in the insured person's name, the Outreach plans provide coverage for up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen identity event; notarization of legal
documents, long - distance telephone calls, and postage that has resulted solely as a result of
reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit
reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
If an imposter obtains key personal information such as a Social
Security or Driver's License number, or other method of identifying an insured person in order to impersonate or obtain credit, merchandise or services in the insured person's name, thePatriot Platinum plans provide coverage for up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen identity event; notarization of legal
documents, long - distance telephone calls, and postage that has resulted solely as a result of
reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit
reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
If an imposter obtains key personal information such as a Social
Security or Driver's License number, or other method of identifying an insured person in order impersonate or obtain credit, merchandise or services in the insured person's name, the Patriot Multi-Trip plans provide coverage for up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen indentity event; notarization of legal
documents, long distance telephone calls, and postage that has resulted solely as a result of
reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit
reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
If an imposter obtains key personal information such as a Social
Security or Driver's License number, or other method of identifying an insured person in order to impersonate or obtain credit, merchandise or services in the insured person's name, the Patriot GoTravel plans provide coverage up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen identity event; notarization of legal
documents, long dis - tance telephone calls, and postage that has resulted solely as a result of
reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit
reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
Recent
reports state that certain classified
documents were leaked which reveal that the US National
Security Agency (NSA) has developed a system that can locate senders as well as receivers of Bitcoin across the world.
The news, first
reported by
Securities Times, a state - owned media outlet launched by the Communism Party mouthpiece the People's Daily, said the
document requires payment companies to start internal investigations to ascertain if cryptocurrency trading activities are being conducted via their payment services.
Although the
report found cryptocurrencies attached to public blockchains, such as bitcoin and ether, should not be regulated as
securities, the team behind the
document did find that the definition of a
security may apply to some of the more centralized crypto - assets currently on the market.
The recent string of
reports pertaining to a WikiLeaks
document dump alleging the CIA's hacking tools caused a fit of unrest over data
security.