Sentences with phrase «document all security report»

Document all security report and log other pertinent information including but not limited to incidents or theft, injury / illness and safety violations.

Not exact matches

Documents in a mortgage backed security fraud case «reveal that J.P. Morgan, as well as... Washington Mutual and Bear Stearns, flouted quality controls and ignored problems, sometimes hiding them entirely, in a quest for profit,» the New York Times reported.
The communication, reported by Motherboard, came a week after Julian Assange's initial statement that he would help the companies close security loopholes disclosed in a set of leaked CIA documents.
In June 2013, The Guardian reported the first leak based on top - secret documents that then 29 - year - old Edward Snowden stole from the National Security Agency.
The report, distilled from a more detailed classified document submitted to Congress last year, warns that America's two authoritarian rivals are actively seeking to «co-opt or replace the free and open order that has enabled global security and prosperity in since World War II.»
A document filed Thursday with the Securities and Exchange Commission shows that Sandberg has transferred 590,000 shares of Facebook stock, which Recode reports is worth nearly $ 100 million, to a fund she uses for charitable giving.
Since the scope and breadth of the nation's surveillance program was revealed by documents leaked by former security contractor Edward Snowden last summer, other reports about the NSA's surveillance methods have followed, including one that alleges the agency placed spyware on consumer electronics made by Microsoft, Cisco and other major brands.
The comments from Warner, the ranking Democrat on the Senate Intelligence Committee, came one day after The Intercept reported on a top - secret National Security Agency document that said hackers associated with Russia's military intelligence agency targeted a company with information on US voting software days before the election.
The foregoing review of important factors should not be construed as exhaustive and should be read in conjunction with the other cautionary statements that are included herein and elsewhere, including the Risk Factors included in Tesla's and SolarCity's most recent reports on Form 10 - K and Form 10 - Q and other documents of Tesla and SolarCity on file with the Securities and Exchange Commission.
In addition to factors previously disclosed in Tesla's and SolarCity's reports filed with the U.S. Securities and Exchange Commission (the «SEC») and those identified elsewhere in this document, the following factors, among others, could cause actual results to differ materially from forward - looking statements and historical performance: the ability to obtain regulatory approvals and meet other closing conditions to the transaction, including requisite approval by Tesla and SolarCity stockholders, on a timely basis or at all; delay in closing the transaction; the ultimate outcome and results of integrating the operations of Tesla and SolarCity and the ultimate ability to realize synergies and other benefits; business disruption following the transaction; the availability and access, in general, of funds to meet debt obligations and to fund ongoing operations and necessary capital expenditures; and the ability to comply with all covenants in the indentures and credit facilities of Tesla and SolarCity, any violation of which, if not cured in a timely manner, could trigger a default of other obligations under cross-default provisions.
The Company's actual results could also be impacted by the other risks detailed from time to time in its publicly filed documents, including in Item 1A (Risk Factors) of its most recent Annual Report on Form 10 - K, in its Quarterly Report on Form 10 - Q and in other reports filed with the Securities and Exchange Commission.
Factors that could cause or contribute to actual results differing from our forward - looking statements include risks relating to: failure of DBRS to rate the Notes at the anticipated ratings levels, which is a closing condition, or at all; changes in the financial markets, including changes in credit markets, interest rates, securitization markets generally and our proposed securitization in particular; the willingness of investors to buy the Notes; adverse developments regarding OnDeck, its business or the online or broader marketplace lending industry generally, any of which could impact what credit ratings, if any, are issued with respect to the Notes; the extended settlement cycle for the scheduled closing on April 17, 2018, which may exacerbate the foregoing risks; and other risks, including those described in our Annual Report on Form 10 - K for the year ended December 31, 2017 and in other documents that we file with the Securities and Exchange Commission from time to time which are or will be available on the Commission's website at www.sec.gov.
Important factors that could cause actual results to differ from OnDeck's forward - looking statements are the risks that OnDeck may not be able to manage its anticipated or actual growth effectively, that its credit models do not adequately identify potential risks, and other risks, including those under the heading «Risk Factors» in OnDeck's Annual Report on Form 10 - K for the year ended December 31, 2016, its Quarterly Reports for the quarters ended June 30 and September 30, 2017 and in other documents that OnDeck files with the Securities and Exchange Commission, or SEC, from time to time which are available on the SEC website at www.sec.gov.
There have been conflicting reports on whether Cohen then delivered this document to the White House and then - National Security Adviser Michael Flynn.
On Tuesday, The Intercept reported that Edward Snowden furnished documents which demonstrate that the National Security Agency (NSA) has kept a careful eye on digital currencies, including bitcoin, through codenamed projects like OAKSTAR and MONKEYROCKET.
This process, which can take between one to four weeks, typically involves reviewing fund documents, current financial reports, and business and securities documentation.
The Center for Investigative Journalism managed to make a compendium of their profiles and gathered some data on its top executives collected from official documents of the Securities and Exchange Commission (SEC) or from reports mainly published by foreign media.
What we've learned from court documents released Friday, and subsequent reporting, is that during the transition, Kushner instructed Flynn to try to get the Russian ambassador to block a United Nations Security Council vote condemning Israeli settlements.
The Intercept recently reported: Classified documents provided by whistleblower Edward Snowden show that the National Security Agency indeed worked urgently to target bitcoin users around the world — and wielded at least one mysterious source of information to «help track down senders and receivers of Bitcoins,» according to a top - secret passage in an internal NSA report dating to March 2013.
That, in light of $ 3.1 billion of missing funds outlined in Chapter Eight of the 2013 Spring Report of the Auditor General of Canada, an order of the House do issue for the following documents from 2001 to the present, allowing for redaction based on national security: (a) all Public Security and Anti-Terrorism annual reports submitted to the Treasury Board Secretariat; (b) all Treasury Board submissions made as part of the Initiative; (c) all departmental evaluations of the Initiative; (d) the Treasury Board corporate database established to monitor funding; that these records be provided to the House in both official languages by June 17, 2013; that the Speaker make arrangements for these records to be made available online; and that the Auditor - General be given all necessary resources to perform an in - depth forensic audit until the missing $ 3.1 billion is found and accounsecurity: (a) all Public Security and Anti-Terrorism annual reports submitted to the Treasury Board Secretariat; (b) all Treasury Board submissions made as part of the Initiative; (c) all departmental evaluations of the Initiative; (d) the Treasury Board corporate database established to monitor funding; that these records be provided to the House in both official languages by June 17, 2013; that the Speaker make arrangements for these records to be made available online; and that the Auditor - General be given all necessary resources to perform an in - depth forensic audit until the missing $ 3.1 billion is found and accounSecurity and Anti-Terrorism annual reports submitted to the Treasury Board Secretariat; (b) all Treasury Board submissions made as part of the Initiative; (c) all departmental evaluations of the Initiative; (d) the Treasury Board corporate database established to monitor funding; that these records be provided to the House in both official languages by June 17, 2013; that the Speaker make arrangements for these records to be made available online; and that the Auditor - General be given all necessary resources to perform an in - depth forensic audit until the missing $ 3.1 billion is found and accounted for.
The publication reported that the current breach could be the most dangerous of all since the attackers were able to acquire key personal identification documents — names, addresses, Social Security numbers and dates of birth — all at once.
While the «left - wing» assessment reported on known criminal activities, the «right - wing» document started with the acknowledgment that Department of Homeland Security intelligence «has no specific information that domestic rightwing terrorists are currently planning acts of violence.»
This is not the first time that, claims of security reports and research documents are making the rounds in the NPP.
A spokesman said the documents were «not of a sensitive nature» but the Mirror reported that one contained details of how security forces failed to «get the truth» on British involvement in terror interrogations.
I have in front of me as I write a meticulously - compiled document from the Community Security Trust — its «Antisemitic Incidents Report 2009».
«Building on the innovative legacy of the New Deal, this report describes a far - reaching, two-fold agenda to tame the growth of wealth among the top one percent and establish rules and institutions that ensure security and opportunity for the middle class,» reads the document, which calls for the federal government to adopt several recommendations, including childcare subsidies and universal pre-K.
A year after two murderers escaped from Clinton Correctional Facility in Dannemora, N.Y., the state inspector general's office released a report documenting a series of security failings that enabled the prison break.
Emergency Contact Info Emergency Preparedness Documents Campus Security Report Sign up for E2Campus alerts Report an Accident UWS Emergency Preparedness Presentation
NAI's financial performance and the forward - looking statements contained herein are further qualified by other risks including those set forth from time to time in the documents filed by us with the Securities and Exchange Commission, including our most recent Annual Report on Form 10 - K and Quarterly Report on Form 10 - Q.
NAI's financial performance and the forward - looking statements contained herein are further qualified by other risks including those set forth from time to time in the documents filed by us with the Securities and Exchange Commission, including our most recent Annual Report on Form 10 - K.
However, we strongly recommend that you also check with the three major credit reporting agencies (TransUnion, Equifax and Experian) to ensure you are submitting the proper documents when placing and using the security freeze.
Bank accounts, credit applications, and other documents that become part of your credit history come to be on your report through a variety of ways, many of which do not have many other identifying factors like your social security number...
For security reasons, tax documents are available for online viewing only by the owner of the Taxpayer Identification Number (TIN) associated with the IRS reporting.
This analytical report explores the livelihood and food security benefits of agroforestry and conservation agriculture in Malawi and Zambia, as well as economic feasibility analyses of the practices.It finds that agroforestry has well - documented improvements in yields and profitability in both countries, while the evidence - base for the benefits of conservation agriculture is positive, but weaker.
Grist Special Report — By Antonia Juhasz on Jun 1, 2017 As people nationwide rallied last year to support the Standing Rock Sioux's attempts to block the Dakota Access Pipeline, a private security firm with experience fighting in Iraq and Afghanistan launched an intrusive military - style surveillance and counterintelligence campaign against the activists and their allies, according to internal company documents.
In a report on Monday to the SEC rebutting Exxon's contention, a former head of the SEC's Office of Municipal Securities said she had reviewed the disclosure documents at the request of the municipalities and found no inconsistencies or conflicts between the allegations made by the local governments in their lawsuits regarding sea level rise and the disclosures they made in their bond documents.
This document summarizes the key points highlighted in the report «Climate Change and Food Security: a Framework Documentdocument summarizes the key points highlighted in the report «Climate Change and Food Security: a Framework DocumentDocument».
With support for all known legal entity types, it includes and self - fills all applicable regulatory forms and e-filings, governs all management bodies, meetings, minutes and agendas, streamlines intellectual property management and tracking, possesses one of the most complete and powerful transactional securities management systems, provides document automation and management capabilities and addresses security, workflows, audits and reports to the most stringent compliance and governance requirements.
Topics may include: creating document templates; understanding and using tokens; modifying user preferences and security preferences; creating file menu templates, creating custom windows; leveraging the power of Task Wizards and the Open File Wizard; managing changing data / reporting needs; capturing online, legal research time within a file; tracking time in a more efficient and flexible way; and protecting your data using Legal Files security controls.
These documents include copies of your driver's license, social security card, one year of bank statements, six months of payroll, two years of taxes, deed and mortgages, student loan documents, credit report, all outstanding bills and the credit - counseling certificate.
Step 8: get every document relevant to your accident (i.e. security reports, receipts, contact information of witnesses, etc.) and ensure that you provide everything to your lawyer so they are working with all the relevant evidence
Andrew has experience drafting, negotiating and advising on a wide range of corporate and commercial documents, including sale and purchase agreements, joint venture and shareholder agreements, commercial contracts, terms of trade, confidentiality agreements, securities offer documents and due diligence reports.
If an imposter obtains key personal information such as a Social Security or Driver's License number, or other method of identifying an insured person in order to impersonate or obtain credit, merchandise or services in the insured person's name, the Outreach plans provide coverage for up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen identity event; notarization of legal documents, long - distance telephone calls, and postage that has resulted solely as a result of reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
If an imposter obtains key personal information such as a Social Security or Driver's License number, or other method of identifying an insured person in order to impersonate or obtain credit, merchandise or services in the insured person's name, thePatriot Platinum plans provide coverage for up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen identity event; notarization of legal documents, long - distance telephone calls, and postage that has resulted solely as a result of reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
If an imposter obtains key personal information such as a Social Security or Driver's License number, or other method of identifying an insured person in order impersonate or obtain credit, merchandise or services in the insured person's name, the Patriot Multi-Trip plans provide coverage for up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen indentity event; notarization of legal documents, long distance telephone calls, and postage that has resulted solely as a result of reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
If an imposter obtains key personal information such as a Social Security or Driver's License number, or other method of identifying an insured person in order to impersonate or obtain credit, merchandise or services in the insured person's name, the Patriot GoTravel plans provide coverage up to $ 500 for the reasonable, customary and necessary costs incurred by the insured for: re-filing a loan or other credit application that is rejected solely as a result of the stolen identity event; notarization of legal documents, long dis - tance telephone calls, and postage that has resulted solely as a result of reporting, amending and / or rectifying records as a result of the stolen identity event; up to three credit reports obtained within one year of the insured person's knowledge of the stolen identity event; and stop payment orders placed on missing or unauthorized checks as a result of the stolen identity event.
Recent reports state that certain classified documents were leaked which reveal that the US National Security Agency (NSA) has developed a system that can locate senders as well as receivers of Bitcoin across the world.
The news, first reported by Securities Times, a state - owned media outlet launched by the Communism Party mouthpiece the People's Daily, said the document requires payment companies to start internal investigations to ascertain if cryptocurrency trading activities are being conducted via their payment services.
Although the report found cryptocurrencies attached to public blockchains, such as bitcoin and ether, should not be regulated as securities, the team behind the document did find that the definition of a security may apply to some of the more centralized crypto - assets currently on the market.
The recent string of reports pertaining to a WikiLeaks document dump alleging the CIA's hacking tools caused a fit of unrest over data security.
a b c d e f g h i j k l m n o p q r s t u v w x y z