diff --git a/.env b/.env index 30c3243e..fdfe9c80 100644 --- a/.env +++ b/.env @@ -4,8 +4,8 @@ ENVIRONMENT=dev DB_HOST=localhost DB_USER=postgres DB_PORT=5432 -DB_PASSWORD=admin -DB_NAME=GPT +DB_PASSWORD=quick +DB_NAME=QuickGpt SUPER_ADMIN_EMAIL=superadmin@email.com SUPER_ADMIN_PASSWORD=supersecretpassword diff --git a/alembic/versions/39c817e4fc4a_udpate_cascade.py b/alembic/versions/b7b896502e8e_update.py similarity index 90% rename from alembic/versions/39c817e4fc4a_udpate_cascade.py rename to alembic/versions/b7b896502e8e_update.py index 4481199a..ab6a1d84 100644 --- a/alembic/versions/39c817e4fc4a_udpate_cascade.py +++ b/alembic/versions/b7b896502e8e_update.py @@ -1,8 +1,8 @@ -"""udpate cascade +"""update -Revision ID: 39c817e4fc4a -Revises: cb320e7880fc -Create Date: 2024-03-17 11:08:22.426368 +Revision ID: b7b896502e8e +Revises: +Create Date: 2024-03-17 15:07:10.795935 """ from typing import Sequence, Union @@ -12,16 +12,16 @@ import sqlalchemy as sa # revision identifiers, used by Alembic. -revision: str = '39c817e4fc4a' -down_revision: Union[str, None] = 'cb320e7880fc' +revision: str = 'b7b896502e8e' +down_revision: Union[str, None] = None branch_labels: Union[str, Sequence[str], None] = None depends_on: Union[str, Sequence[str], None] = None def upgrade() -> None: # ### commands auto generated by Alembic - please adjust! ### - op.drop_constraint('document_department_association_document_id_fkey', 'document_department_association', type_='foreignkey') op.drop_constraint('document_department_association_department_id_fkey', 'document_department_association', type_='foreignkey') + op.drop_constraint('document_department_association_document_id_fkey', 'document_department_association', type_='foreignkey') op.create_foreign_key(None, 'document_department_association', 'document', ['document_id'], ['id'], onupdate='CASCADE', ondelete='CASCADE') op.create_foreign_key(None, 'document_department_association', 'departments', ['department_id'], ['id'], onupdate='CASCADE', ondelete='CASCADE') # op.create_unique_constraint('unique_user_role', 'user_roles', ['user_id', 'role_id', 'company_id']) @@ -33,6 +33,6 @@ def downgrade() -> None: # op.drop_constraint('unique_user_role', 'user_roles', type_='unique') op.drop_constraint(None, 'document_department_association', type_='foreignkey') op.drop_constraint(None, 'document_department_association', type_='foreignkey') - op.create_foreign_key('document_department_association_department_id_fkey', 'document_department_association', 'departments', ['department_id'], ['id']) op.create_foreign_key('document_department_association_document_id_fkey', 'document_department_association', 'document', ['document_id'], ['id']) + op.create_foreign_key('document_department_association_department_id_fkey', 'document_department_association', 'departments', ['department_id'], ['id']) # ### end Alembic commands ### diff --git a/alembic/versions/cb320e7880fc_update.py b/alembic/versions/cb320e7880fc_update.py deleted file mode 100644 index 577571a8..00000000 --- a/alembic/versions/cb320e7880fc_update.py +++ /dev/null @@ -1,157 +0,0 @@ -"""update - -Revision ID: cb320e7880fc -Revises: -Create Date: 2024-03-17 10:09:40.034197 - -""" -from typing import Sequence, Union - -from alembic import op -import sqlalchemy as sa -from sqlalchemy.dialects import postgresql - -# revision identifiers, used by Alembic. -revision: str = 'cb320e7880fc' -down_revision: Union[str, None] = None -branch_labels: Union[str, Sequence[str], None] = None -depends_on: Union[str, Sequence[str], None] = None - - -def upgrade() -> None: - # ### commands auto generated by Alembic - please adjust! ### - op.create_table('companies', - sa.Column('id', sa.Integer(), nullable=False), - sa.Column('name', sa.String(), nullable=True), - sa.PrimaryKeyConstraint('id') - ) - op.create_index(op.f('ix_companies_id'), 'companies', ['id'], unique=False) - op.create_index(op.f('ix_companies_name'), 'companies', ['name'], unique=True) - op.create_table('document_type', - sa.Column('id', sa.Integer(), nullable=False), - sa.Column('type', sa.String(length=225), nullable=False), - sa.PrimaryKeyConstraint('id'), - sa.UniqueConstraint('type') - ) - op.create_index(op.f('ix_document_type_id'), 'document_type', ['id'], unique=False) - op.create_table('roles', - sa.Column('id', sa.Integer(), nullable=False), - sa.Column('name', sa.String(length=100), nullable=True), - sa.Column('description', sa.Text(), nullable=True), - sa.PrimaryKeyConstraint('id') - ) - op.create_index(op.f('ix_roles_id'), 'roles', ['id'], unique=False) - op.create_index(op.f('ix_roles_name'), 'roles', ['name'], unique=False) - op.create_table('departments', - sa.Column('id', sa.Integer(), nullable=False), - sa.Column('name', sa.String(), nullable=True), - sa.Column('company_id', sa.Integer(), nullable=True), - sa.Column('total_users', sa.Integer(), nullable=True), - sa.Column('total_documents', sa.Integer(), nullable=True), - sa.ForeignKeyConstraint(['company_id'], ['companies.id'], ), - sa.PrimaryKeyConstraint('id') - ) - op.create_index(op.f('ix_departments_id'), 'departments', ['id'], unique=False) - op.create_index(op.f('ix_departments_name'), 'departments', ['name'], unique=True) - op.create_table('subscriptions', - sa.Column('sub_id', sa.Integer(), nullable=False), - sa.Column('company_id', sa.Integer(), nullable=True), - sa.Column('start_date', sa.DateTime(), nullable=True), - sa.Column('end_date', sa.DateTime(), nullable=True), - sa.ForeignKeyConstraint(['company_id'], ['companies.id'], ), - sa.PrimaryKeyConstraint('sub_id') - ) - op.create_index(op.f('ix_subscriptions_sub_id'), 'subscriptions', ['sub_id'], unique=False) - op.create_table('users', - sa.Column('id', sa.Integer(), nullable=False), - sa.Column('email', sa.String(length=225), nullable=False), - sa.Column('hashed_password', sa.String(), nullable=False), - sa.Column('username', sa.String(length=225), nullable=False), - sa.Column('is_active', sa.Boolean(), nullable=True), - sa.Column('last_login', sa.DateTime(), nullable=True), - sa.Column('created_at', sa.DateTime(), nullable=True), - sa.Column('updated_at', sa.DateTime(), nullable=True), - sa.Column('password_created', sa.DateTime(), nullable=True), - sa.Column('checker', sa.Boolean(), nullable=True), - sa.Column('company_id', sa.Integer(), nullable=True), - sa.Column('department_id', sa.Integer(), nullable=False), - sa.ForeignKeyConstraint(['company_id'], ['companies.id'], ), - sa.ForeignKeyConstraint(['department_id'], ['departments.id'], ), - sa.PrimaryKeyConstraint('id'), - sa.UniqueConstraint('email'), - sa.UniqueConstraint('username'), - sa.UniqueConstraint('username', name='unique_username_no_spacing') - ) - op.create_table('audit', - sa.Column('id', sa.Integer(), nullable=False), - sa.Column('timestamp', sa.DateTime(), nullable=False), - sa.Column('user_id', sa.Integer(), nullable=True), - sa.Column('model', sa.String(length=100), nullable=False), - sa.Column('action', sa.String(length=50), nullable=False), - sa.Column('details', postgresql.JSONB(astext_type=sa.Text()), nullable=True), - sa.Column('ip_address', sa.String(length=45), nullable=True), - sa.ForeignKeyConstraint(['user_id'], ['users.id'], ondelete='SET NULL'), - sa.PrimaryKeyConstraint('id') - ) - op.create_index(op.f('ix_audit_id'), 'audit', ['id'], unique=False) - op.create_table('document', - sa.Column('id', sa.Integer(), nullable=False), - sa.Column('filename', sa.String(length=225), nullable=False), - sa.Column('uploaded_by', sa.Integer(), nullable=False), - sa.Column('uploaded_at', sa.DateTime(), nullable=False), - sa.Column('is_enabled', sa.Boolean(), nullable=True), - sa.Column('verified', sa.Boolean(), nullable=True), - sa.Column('doc_type_id', sa.Integer(), nullable=True), - sa.Column('action_type', sa.Enum('INSERT', 'UPDATE', 'DELETE', name='makercheckeractiontype'), nullable=False), - sa.Column('status', sa.Enum('PENDING', 'APPROVED', 'REJECTED', name='makercheckerstatus'), nullable=False), - sa.Column('verified_at', sa.DateTime(), nullable=True), - sa.Column('verified_by', sa.Integer(), nullable=True), - sa.ForeignKeyConstraint(['doc_type_id'], ['document_type.id'], ), - sa.ForeignKeyConstraint(['uploaded_by'], ['users.id'], ), - sa.ForeignKeyConstraint(['verified_by'], ['users.id'], ), - sa.PrimaryKeyConstraint('id'), - sa.UniqueConstraint('filename') - ) - op.create_index(op.f('ix_document_id'), 'document', ['id'], unique=False) - op.create_table('user_roles', - sa.Column('user_id', sa.Integer(), nullable=False), - sa.Column('role_id', sa.Integer(), nullable=False), - sa.Column('company_id', sa.Integer(), nullable=False), - sa.ForeignKeyConstraint(['company_id'], ['companies.id'], ), - sa.ForeignKeyConstraint(['role_id'], ['roles.id'], ), - sa.ForeignKeyConstraint(['user_id'], ['users.id'], ), - sa.PrimaryKeyConstraint('user_id', 'role_id', 'company_id'), - sa.UniqueConstraint('user_id', 'role_id', 'company_id', name='unique_user_role') - ) - op.create_table('document_department_association', - sa.Column('department_id', sa.Integer(), nullable=True), - sa.Column('document_id', sa.Integer(), nullable=True), - sa.ForeignKeyConstraint(['department_id'], ['departments.id'], ), - sa.ForeignKeyConstraint(['document_id'], ['document.id'], ) - ) - # ### end Alembic commands ### - - -def downgrade() -> None: - # ### commands auto generated by Alembic - please adjust! ### - op.drop_table('document_department_association') - op.drop_table('user_roles') - op.drop_index(op.f('ix_document_id'), table_name='document') - op.drop_table('document') - op.drop_index(op.f('ix_audit_id'), table_name='audit') - op.drop_table('audit') - op.drop_table('users') - op.drop_index(op.f('ix_subscriptions_sub_id'), table_name='subscriptions') - op.drop_table('subscriptions') - op.drop_index(op.f('ix_departments_name'), table_name='departments') - op.drop_index(op.f('ix_departments_id'), table_name='departments') - op.drop_table('departments') - op.drop_index(op.f('ix_roles_name'), table_name='roles') - op.drop_index(op.f('ix_roles_id'), table_name='roles') - op.drop_table('roles') - op.drop_index(op.f('ix_document_type_id'), table_name='document_type') - op.drop_table('document_type') - op.drop_index(op.f('ix_companies_name'), table_name='companies') - op.drop_index(op.f('ix_companies_id'), table_name='companies') - op.drop_table('companies') - # ### end Alembic commands ### diff --git a/ffmpy-0.3.2-py3-none-any.whl b/ffmpy-0.3.2-py3-none-any.whl new file mode 100644 index 00000000..1f20c582 Binary files /dev/null and b/ffmpy-0.3.2-py3-none-any.whl differ diff --git a/local_data/private_gpt/docstore.json b/local_data/private_gpt/docstore.json index b5bd9424..1acf1a66 100644 --- a/local_data/private_gpt/docstore.json +++ b/local_data/private_gpt/docstore.json @@ -1 +1 @@ -{"docstore/data": {"6a631852-fb8e-4ca6-8cb0-1e3b7b881be0": {"__data__": {"id_": "6a631852-fb8e-4ca6-8cb0-1e3b7b881be0", "embedding": null, "metadata": {"window": "Slavery\nHow did the Abolition Acts of 1807 \nand 1833 affect the slave trade?\n Key Stages 3-4 | Empire and Industry 1750-1850\nLesson pack\n", "original_text": "Slavery\nHow did the Abolition Acts of 1807 \nand 1833 affect the slave trade?\n", "page_label": "1", "file_name": "slavery.pdf", "doc_id": "29dc06d4-2164-4129-868f-4a613daa06dc"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "29dc06d4-2164-4129-868f-4a613daa06dc", "node_type": "4", "metadata": {"page_label": "1", "file_name": "slavery.pdf", "doc_id": "29dc06d4-2164-4129-868f-4a613daa06dc"}, "hash": "68b2d73a90f40a008c9ada87415c99209a19d546488a12d77a906da2707908c8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5494819d-a99c-4902-ac0a-ae3353796805", "node_type": "1", "metadata": {"window": "Slavery\nHow did the Abolition Acts of 1807 \nand 1833 affect the slave trade?\n Key Stages 3-4 | Empire and Industry 1750-1850\nLesson pack\n", "original_text": "Key Stages 3-4 | Empire and Industry 1750-1850\nLesson pack\n"}, "hash": "61c95d9af135c1c6eddf0cd47a253fc63d8567be727071e6476e65c070dadf7e", "class_name": "RelatedNodeInfo"}}, "text": "Slavery\nHow did the Abolition Acts of 1807 \nand 1833 affect the slave trade?\n", "start_char_idx": 0, "end_char_idx": 77, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5494819d-a99c-4902-ac0a-ae3353796805": {"__data__": {"id_": "5494819d-a99c-4902-ac0a-ae3353796805", "embedding": null, "metadata": {"window": "Slavery\nHow did the Abolition Acts of 1807 \nand 1833 affect the slave trade?\n Key Stages 3-4 | Empire and Industry 1750-1850\nLesson pack\n", "original_text": "Key Stages 3-4 | Empire and Industry 1750-1850\nLesson pack\n", "page_label": "1", "file_name": "slavery.pdf", "doc_id": "29dc06d4-2164-4129-868f-4a613daa06dc"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "29dc06d4-2164-4129-868f-4a613daa06dc", "node_type": "4", "metadata": {"page_label": "1", "file_name": "slavery.pdf", "doc_id": "29dc06d4-2164-4129-868f-4a613daa06dc"}, "hash": "68b2d73a90f40a008c9ada87415c99209a19d546488a12d77a906da2707908c8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6a631852-fb8e-4ca6-8cb0-1e3b7b881be0", "node_type": "1", "metadata": {"window": "Slavery\nHow did the Abolition Acts of 1807 \nand 1833 affect the slave trade?\n Key Stages 3-4 | Empire and Industry 1750-1850\nLesson pack\n", "original_text": "Slavery\nHow did the Abolition Acts of 1807 \nand 1833 affect the slave trade?\n", "page_label": "1", "file_name": "slavery.pdf", "doc_id": "29dc06d4-2164-4129-868f-4a613daa06dc"}, "hash": "c9db004cc9ab78eb07e58a74000f7fc3d2cdca27ba34f95587e90df97d50a2dd", "class_name": "RelatedNodeInfo"}}, "text": "Key Stages 3-4 | Empire and Industry 1750-1850\nLesson pack\n", "start_char_idx": 77, "end_char_idx": 136, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c2c51f1a-3c4c-4f7c-b814-4da4ef71765b": {"__data__": {"id_": "c2c51f1a-3c4c-4f7c-b814-4da4ef71765b", "embedding": null, "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. ", "original_text": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "24a22607-3347-48a6-ba9e-d72156f02a9b", "node_type": "1", "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. ", "original_text": "Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. "}, "hash": "91b89e735d830b6edebd89b52dc682a5fbc61e5a1d77abc33cc0922ef49dcbeb", "class_name": "RelatedNodeInfo"}}, "text": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n", "start_char_idx": 0, "end_char_idx": 119, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "24a22607-3347-48a6-ba9e-d72156f02a9b": {"__data__": {"id_": "24a22607-3347-48a6-ba9e-d72156f02a9b", "embedding": null, "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. ", "original_text": "Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c2c51f1a-3c4c-4f7c-b814-4da4ef71765b", "node_type": "1", "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. ", "original_text": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "25312ac031bbf85e5c609a68efb6c4a55685113dd97de44437b399cfb9f7752c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "83143d31-b3ca-4cbc-bfc9-1dab636c966a", "node_type": "1", "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. ", "original_text": "Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n"}, "hash": "d2c4a08c0c9452372974cae1911b5f1adbb99ab86bf42672447cfe329ebff6b3", "class_name": "RelatedNodeInfo"}}, "text": "Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. ", "start_char_idx": 119, "end_char_idx": 270, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "83143d31-b3ca-4cbc-bfc9-1dab636c966a": {"__data__": {"id_": "83143d31-b3ca-4cbc-bfc9-1dab636c966a", "embedding": null, "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. ", "original_text": "Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "24a22607-3347-48a6-ba9e-d72156f02a9b", "node_type": "1", "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. ", "original_text": "Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "b6fcb21a8700301929aede64f2efd79a6e8b948be13afd2c0a6210eee0a86a4a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "68a75094-0a21-47c5-b93e-c35a8d18d947", "node_type": "1", "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n", "original_text": "As European settlement grew, so did the demand for enslaved \npeople. "}, "hash": "e98e3d31fd8b9d5cb90d7be8853c016269ab648059c18b5b859ec32ee50359d3", "class_name": "RelatedNodeInfo"}}, "text": "Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n", "start_char_idx": 270, "end_char_idx": 1024, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "68a75094-0a21-47c5-b93e-c35a8d18d947": {"__data__": {"id_": "68a75094-0a21-47c5-b93e-c35a8d18d947", "embedding": null, "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n", "original_text": "As European settlement grew, so did the demand for enslaved \npeople. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "83143d31-b3ca-4cbc-bfc9-1dab636c966a", "node_type": "1", "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. ", "original_text": "Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "2d7ecf7f99882f37e92b81895a8c21ba1878600b2865ea411c2a62d734ce6c50", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d0f5d94a-a64e-4cd1-b52d-9fb0f2113a21", "node_type": "1", "metadata": {"window": "Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. ", "original_text": "Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. "}, "hash": "f615a6024348291b84388714614599ec72d8598fc7b9614b7daf5e442c77be3f", "class_name": "RelatedNodeInfo"}}, "text": "As European settlement grew, so did the demand for enslaved \npeople. ", "start_char_idx": 1024, "end_char_idx": 1093, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d0f5d94a-a64e-4cd1-b52d-9fb0f2113a21": {"__data__": {"id_": "d0f5d94a-a64e-4cd1-b52d-9fb0f2113a21", "embedding": null, "metadata": {"window": "Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. ", "original_text": "Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "68a75094-0a21-47c5-b93e-c35a8d18d947", "node_type": "1", "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n", "original_text": "As European settlement grew, so did the demand for enslaved \npeople. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "da325efe8d239b789519ff565d0de03aeca8050d92293c8c00ed0914d8fadcf5", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b02533b8-c391-4c12-b275-64526272c0bf", "node_type": "1", "metadata": {"window": "Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. ", "original_text": "Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. "}, "hash": "799c17c03087fb3209a8056a8f680d05cc8d507cf18de1eb2e1000f6e1bf4b5f", "class_name": "RelatedNodeInfo"}}, "text": "Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. ", "start_char_idx": 1093, "end_char_idx": 1300, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b02533b8-c391-4c12-b275-64526272c0bf": {"__data__": {"id_": "b02533b8-c391-4c12-b275-64526272c0bf", "embedding": null, "metadata": {"window": "Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. ", "original_text": "Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d0f5d94a-a64e-4cd1-b52d-9fb0f2113a21", "node_type": "1", "metadata": {"window": "Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. ", "original_text": "Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "89d4ee84f4baf25e6f9fc47b018739f19e4dd0e68b4ad2d7b4f33386b8dbceb0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d028ff1f-c35d-46cc-bd7f-0ea3a655e513", "node_type": "1", "metadata": {"window": "As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. ", "original_text": "Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n"}, "hash": "4cc543eb7a008c57f55f88c2458d7ec330096a2d58f56f426795013d7d73a3de", "class_name": "RelatedNodeInfo"}}, "text": "Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. ", "start_char_idx": 1300, "end_char_idx": 1429, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d028ff1f-c35d-46cc-bd7f-0ea3a655e513": {"__data__": {"id_": "d028ff1f-c35d-46cc-bd7f-0ea3a655e513", "embedding": null, "metadata": {"window": "As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. ", "original_text": "Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b02533b8-c391-4c12-b275-64526272c0bf", "node_type": "1", "metadata": {"window": "Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. ", "original_text": "Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "52dbb0aecc850ef4db9f47d24222375320875012c354a19d1f97f0bb734cfb81", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "83509f26-a88a-45a3-b0cd-4db3cdca12ae", "node_type": "1", "metadata": {"window": "Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n", "original_text": "The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. "}, "hash": "c472fc0e070349d7b4c414a3987de93ea3faa5347b0011e260e5dc2b3f237f1d", "class_name": "RelatedNodeInfo"}}, "text": "Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n", "start_char_idx": 1429, "end_char_idx": 1571, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "83509f26-a88a-45a3-b0cd-4db3cdca12ae": {"__data__": {"id_": "83509f26-a88a-45a3-b0cd-4db3cdca12ae", "embedding": null, "metadata": {"window": "Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n", "original_text": "The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d028ff1f-c35d-46cc-bd7f-0ea3a655e513", "node_type": "1", "metadata": {"window": "As European settlement grew, so did the demand for enslaved \npeople. Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. ", "original_text": "Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "464d6b8cdfd665124655f2436a76be2e45422bd764c5ce9c15e7560b998e4933", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "45e2c9d6-f52d-456d-b335-2ff8a3efc624", "node_type": "1", "metadata": {"window": "Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. ", "original_text": "The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. "}, "hash": "621008401854408d37dc4f2651e6c698f229cb65cc37988e945aeea5952ea73a", "class_name": "RelatedNodeInfo"}}, "text": "The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. ", "start_char_idx": 1571, "end_char_idx": 1684, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "45e2c9d6-f52d-456d-b335-2ff8a3efc624": {"__data__": {"id_": "45e2c9d6-f52d-456d-b335-2ff8a3efc624", "embedding": null, "metadata": {"window": "Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. ", "original_text": "The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "83509f26-a88a-45a3-b0cd-4db3cdca12ae", "node_type": "1", "metadata": {"window": "Over the next 300 years more than 11 million enslaved \npeople were transported across the Atlantic from Africa to \nAmerica and the West Indies, and Britain led this trade from the \nmid-17th century onwards. Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n", "original_text": "The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "acae0459527b0607aff40a4c527a36eef213d3dcbccf957ae2e0ee30593aac19", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f4dde1b9-a171-4ba5-84f9-f033722675e0", "node_type": "1", "metadata": {"window": "Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. ", "original_text": "However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. "}, "hash": "7a11b76e0794fcde31f0d70e22e8d284ff12a860cc7e0aa1d3c561f0086e3944", "class_name": "RelatedNodeInfo"}}, "text": "The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. ", "start_char_idx": 1684, "end_char_idx": 1886, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f4dde1b9-a171-4ba5-84f9-f033722675e0": {"__data__": {"id_": "f4dde1b9-a171-4ba5-84f9-f033722675e0", "embedding": null, "metadata": {"window": "Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. ", "original_text": "However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "45e2c9d6-f52d-456d-b335-2ff8a3efc624", "node_type": "1", "metadata": {"window": "Ports such as Bristol, Liverpool and \nGlasgow sent out many slaving ships each year, bringing great \nprosperity to their owners. Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. ", "original_text": "The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "bbde829c1d50d17dcf97dacc190aa925c69275a5957aeadd6c1887a759790e00", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f6e1d1a5-cf15-41ab-9d85-c1884305d548", "node_type": "1", "metadata": {"window": "The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n"}, "hash": "b0f1f782294b78bae8aef811f725f1f135512f85823774dbc14cebb6727736a5", "class_name": "RelatedNodeInfo"}}, "text": "However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. ", "start_char_idx": 1886, "end_char_idx": 2098, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f6e1d1a5-cf15-41ab-9d85-c1884305d548": {"__data__": {"id_": "f6e1d1a5-cf15-41ab-9d85-c1884305d548", "embedding": null, "metadata": {"window": "The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f4dde1b9-a171-4ba5-84f9-f033722675e0", "node_type": "1", "metadata": {"window": "Many other cities also grew rich on \nthe profits of industries which depended on slave-produced \nmaterials such as cotton, sugar and tobacco.\n The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. ", "original_text": "However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "61d79e3ffe5ab0eca2a40bf623590aad609dac7b1a0af41103678f5f548f9f80", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "1564a509-3858-4618-8b3e-f251f2d7eb84", "node_type": "1", "metadata": {"window": "The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. "}, "hash": "82b24f7e211f890478436f1cf966bce39b35a42f96c239038dd054be6507344a", "class_name": "RelatedNodeInfo"}}, "text": "Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n", "start_char_idx": 2098, "end_char_idx": 2287, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "1564a509-3858-4618-8b3e-f251f2d7eb84": {"__data__": {"id_": "1564a509-3858-4618-8b3e-f251f2d7eb84", "embedding": null, "metadata": {"window": "The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f6e1d1a5-cf15-41ab-9d85-c1884305d548", "node_type": "1", "metadata": {"window": "The campaign in Britain to abolish slavery began in the 1760s, \nsupported by both black and white abolitionists. The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "e6629156fb5dbe8ef3f117f664cd9933fd42646d0118e8310b4807871b130626", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "866a4b6f-aee8-47d9-be5d-feaa3acad45b", "node_type": "1", "metadata": {"window": "However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. "}, "hash": "887f41122ace26e3b98d6b15a1a84f06d934f1b4f65f74c797c3d298c69591bb", "class_name": "RelatedNodeInfo"}}, "text": "The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. ", "start_char_idx": 2287, "end_char_idx": 2431, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "866a4b6f-aee8-47d9-be5d-feaa3acad45b": {"__data__": {"id_": "866a4b6f-aee8-47d9-be5d-feaa3acad45b", "embedding": null, "metadata": {"window": "However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "1564a509-3858-4618-8b3e-f251f2d7eb84", "node_type": "1", "metadata": {"window": "The battle was \nlong and hard-fought, with pro-slavery campaigners arguing \nthat the slave trade was important for the British economy \nand claiming that enslaved Africans were happy and well-\ntreated. However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "24683005f42b39dc50479bef6d42bdea379084eb7d89c807118e8975b37720f9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5250640b-2a90-4a3f-beae-e9c425b2e409", "node_type": "1", "metadata": {"window": "Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "In 1833 Parliament passed Introduction"}, "hash": "31a3e24cb8d71439a086b4a97ef6ec867408971b27a11bec4023bb84879b4bb0", "class_name": "RelatedNodeInfo"}}, "text": "However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. ", "start_char_idx": 2431, "end_char_idx": 2569, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5250640b-2a90-4a3f-beae-e9c425b2e409": {"__data__": {"id_": "5250640b-2a90-4a3f-beae-e9c425b2e409", "embedding": null, "metadata": {"window": "Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "In 1833 Parliament passed Introduction", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3", "node_type": "4", "metadata": {"page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "866a4b6f-aee8-47d9-be5d-feaa3acad45b", "node_type": "1", "metadata": {"window": "However the frequent rebellions by enslaved Africans \nand evidence of the appalling conditions endured by them \nduring and after transportation led to growing support for \nthe demands to abolish the slave trade. Eventually, in 1807, \nParliament passed an Act for the Abolition of the Slave Trade, \nwhich abolished the trade by Britain in enslaved peoples \nbetween Africa, the West Indies and America.\n The pro-slavery campaigners had argued that with no new \nenslaved Africans being traded slave-owners would treat their \nexisting slaves better. However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. In 1833 Parliament passed Introduction", "original_text": "However, it was clear that enslaved \npeople were still harshly treated and many continued to resist \nand rebel against their enslavement. ", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "hash": "1d9421657c777a5e164b093875fecae15dc998f55f5288dc59e0dd9dc9285569", "class_name": "RelatedNodeInfo"}}, "text": "In 1833 Parliament passed Introduction", "start_char_idx": 2569, "end_char_idx": 2607, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f09ad18b-809e-48c1-9594-08c0e7cd94e8": {"__data__": {"id_": "f09ad18b-809e-48c1-9594-08c0e7cd94e8", "embedding": null, "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. ", "page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34", "node_type": "4", "metadata": {"page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "hash": "2bf06f11a004c44b8a39a4c3cb79d07f39634c2bf6c672885e84c14d4cf85a17", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "27006bda-d38e-440b-9b44-51cb0c237139", "node_type": "1", "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. "}, "hash": "d2368942c8f9a69d0a1d43d39ff9c2cda2abd54849b76bbe970bc53398950b59", "class_name": "RelatedNodeInfo"}}, "text": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. ", "start_char_idx": 0, "end_char_idx": 184, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "27006bda-d38e-440b-9b44-51cb0c237139": {"__data__": {"id_": "27006bda-d38e-440b-9b44-51cb0c237139", "embedding": null, "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. ", "page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34", "node_type": "4", "metadata": {"page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "hash": "2bf06f11a004c44b8a39a4c3cb79d07f39634c2bf6c672885e84c14d4cf85a17", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f09ad18b-809e-48c1-9594-08c0e7cd94e8", "node_type": "1", "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. ", "page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "hash": "13833f19f2be9b828a5e1880a8da5ded468ec814ecc3f62114d2b3b7a0ee4ebe", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b83b8665-b20a-40cd-8635-744eb32f0865", "node_type": "1", "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. "}, "hash": "5473207d9444df845abae6660a42fe68a16b6d9a3891abb286b67740518968e2", "class_name": "RelatedNodeInfo"}}, "text": "However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. ", "start_char_idx": 184, "end_char_idx": 352, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b83b8665-b20a-40cd-8635-744eb32f0865": {"__data__": {"id_": "b83b8665-b20a-40cd-8635-744eb32f0865", "embedding": null, "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. ", "page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34", "node_type": "4", "metadata": {"page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "hash": "2bf06f11a004c44b8a39a4c3cb79d07f39634c2bf6c672885e84c14d4cf85a17", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "27006bda-d38e-440b-9b44-51cb0c237139", "node_type": "1", "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. ", "page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "hash": "5582276f90152897b280ac2aab5518c724b175b0650b319156bb96b2ccd817da", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "cb949682-7cf9-433d-a818-d9095bc087fc", "node_type": "1", "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "ddcadb3af88eb197c6c175278f76f937b41893057df1593c9cf25a2b1424a804", "class_name": "RelatedNodeInfo"}}, "text": "Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. ", "start_char_idx": 352, "end_char_idx": 604, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "cb949682-7cf9-433d-a818-d9095bc087fc": {"__data__": {"id_": "cb949682-7cf9-433d-a818-d9095bc087fc", "embedding": null, "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34", "node_type": "4", "metadata": {"page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "hash": "2bf06f11a004c44b8a39a4c3cb79d07f39634c2bf6c672885e84c14d4cf85a17", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b83b8665-b20a-40cd-8635-744eb32f0865", "node_type": "1", "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. ", "page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "hash": "d10c2a593f4f15cc9701d25c026e4363f05befda3bc13a9715b7dd5b87e38d15", "class_name": "RelatedNodeInfo"}}, "text": "Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 604, "end_char_idx": 877, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e8aaccc0-ad4a-4d97-a3cc-ede7c776cbe1": {"__data__": {"id_": "e8aaccc0-ad4a-4d97-a3cc-ede7c776cbe1", "embedding": null, "metadata": {"window": "4Contents\nIntroduction Page 2\nContents Page 4\nTeacher\u2019s notes Page 5\nBackground Page 6\nExternal links Page 8\nTasks Page 9\nSource 1 Page 11\nSource 2a Page 13\nSource 2b Page 14\nSource 2c Page 15Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "4Contents\nIntroduction Page 2\nContents Page 4\nTeacher\u2019s notes Page 5\nBackground Page 6\nExternal links Page 8\nTasks Page 9\nSource 1 Page 11\nSource 2a Page 13\nSource 2b Page 14\nSource 2c Page 15Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "4", "file_name": "slavery.pdf", "doc_id": "7a55c287-d0bf-464b-a5e8-76a17da3deb7"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7a55c287-d0bf-464b-a5e8-76a17da3deb7", "node_type": "4", "metadata": {"page_label": "4", "file_name": "slavery.pdf", "doc_id": "7a55c287-d0bf-464b-a5e8-76a17da3deb7"}, "hash": "5ec9e76633315901563f127fe97467a493e4dde09baa6c70e4738760a86a6f30", "class_name": "RelatedNodeInfo"}}, "text": "4Contents\nIntroduction Page 2\nContents Page 4\nTeacher\u2019s notes Page 5\nBackground Page 6\nExternal links Page 8\nTasks Page 9\nSource 1 Page 11\nSource 2a Page 13\nSource 2b Page 14\nSource 2c Page 15Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 0, "end_char_idx": 397, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "58e7818c-f650-401b-9c01-7d3905c2407b": {"__data__": {"id_": "58e7818c-f650-401b-9c01-7d3905c2407b", "embedding": null, "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. ", "original_text": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ddec1dd2-5542-4cf6-9516-364a188cb50c", "node_type": "1", "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. ", "original_text": "This lesson offers graphic evidence of the cruelty on which enslavement was based. "}, "hash": "9e3fd4a72779587b14caf06e64969e1ea8ba8a85257fdb92a1da9130cede7fe8", "class_name": "RelatedNodeInfo"}}, "text": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n", "start_char_idx": 0, "end_char_idx": 127, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ddec1dd2-5542-4cf6-9516-364a188cb50c": {"__data__": {"id_": "ddec1dd2-5542-4cf6-9516-364a188cb50c", "embedding": null, "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. ", "original_text": "This lesson offers graphic evidence of the cruelty on which enslavement was based. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "58e7818c-f650-401b-9c01-7d3905c2407b", "node_type": "1", "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. ", "original_text": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "d2cb81b295073cfaafd3f0709b330fad37359659f4fcb8f53d02ace1b991a3eb", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3d634f4a-6464-4604-b2ce-c9c1644b3d6e", "node_type": "1", "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n", "original_text": "The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. "}, "hash": "d124d9e096a675871270b04e91fa84247960fbb12eef4c9bf206d14c40dc9466", "class_name": "RelatedNodeInfo"}}, "text": "This lesson offers graphic evidence of the cruelty on which enslavement was based. ", "start_char_idx": 127, "end_char_idx": 210, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3d634f4a-6464-4604-b2ce-c9c1644b3d6e": {"__data__": {"id_": "3d634f4a-6464-4604-b2ce-c9c1644b3d6e", "embedding": null, "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n", "original_text": "The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ddec1dd2-5542-4cf6-9516-364a188cb50c", "node_type": "1", "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. ", "original_text": "This lesson offers graphic evidence of the cruelty on which enslavement was based. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "a712d9e8a04da808da931e536fb7b645c46ad3c19f514c1437a367169d8b24c7", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a07eb1c6-055b-4024-b693-e46624363a24", "node_type": "1", "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. ", "original_text": "Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. "}, "hash": "2f641b7df706b7b83d0994fbd682b9efa0370d62082ea408273bdbf3d99644e3", "class_name": "RelatedNodeInfo"}}, "text": "The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. ", "start_char_idx": 210, "end_char_idx": 319, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a07eb1c6-055b-4024-b693-e46624363a24": {"__data__": {"id_": "a07eb1c6-055b-4024-b693-e46624363a24", "embedding": null, "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. ", "original_text": "Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "3d634f4a-6464-4604-b2ce-c9c1644b3d6e", "node_type": "1", "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n", "original_text": "The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "f04a092e1241a9d14ae192314ee71fd646fe73887be88ad5371bcefe944a98c4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7b7b6905-0f25-4a92-8974-653add4ae317", "node_type": "1", "metadata": {"window": "This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. ", "original_text": "From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. "}, "hash": "7465ec5d9106fef2339a391cedefc493ce389c03e9adeeacba75070dcead2a6d", "class_name": "RelatedNodeInfo"}}, "text": "Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. ", "start_char_idx": 319, "end_char_idx": 419, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7b7b6905-0f25-4a92-8974-653add4ae317": {"__data__": {"id_": "7b7b6905-0f25-4a92-8974-653add4ae317", "embedding": null, "metadata": {"window": "This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. ", "original_text": "From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a07eb1c6-055b-4024-b693-e46624363a24", "node_type": "1", "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. ", "original_text": "Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "0b1b0db02bfcb89d33ed50dc724e719826a48684035b9b2a0d97994affc98358", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e1333b08-9d0d-4c3b-a8cd-f51cb20d7314", "node_type": "1", "metadata": {"window": "The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. ", "original_text": "It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n"}, "hash": "a519d89a4a6c8f7005b8c86693f4605e03898bc11141a3cb0a38c1b5f8ce6e20", "class_name": "RelatedNodeInfo"}}, "text": "From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. ", "start_char_idx": 419, "end_char_idx": 560, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e1333b08-9d0d-4c3b-a8cd-f51cb20d7314": {"__data__": {"id_": "e1333b08-9d0d-4c3b-a8cd-f51cb20d7314", "embedding": null, "metadata": {"window": "The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. ", "original_text": "It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7b7b6905-0f25-4a92-8974-653add4ae317", "node_type": "1", "metadata": {"window": "This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. ", "original_text": "From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "884b1880557fa727c175ed0d58149fd59022b7a1c6ee8771174c0a612e8cf686", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4fe7d6bf-eb33-493b-8b7a-23f0c94b5153", "node_type": "1", "metadata": {"window": "Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. ", "original_text": "The story of enslavement often ends in 1833. "}, "hash": "985df538eeb818a70b0e3717b9fc9c46e1848d1ccc3562672c80455aa9b9efea", "class_name": "RelatedNodeInfo"}}, "text": "It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n", "start_char_idx": 560, "end_char_idx": 729, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4fe7d6bf-eb33-493b-8b7a-23f0c94b5153": {"__data__": {"id_": "4fe7d6bf-eb33-493b-8b7a-23f0c94b5153", "embedding": null, "metadata": {"window": "Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. ", "original_text": "The story of enslavement often ends in 1833. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e1333b08-9d0d-4c3b-a8cd-f51cb20d7314", "node_type": "1", "metadata": {"window": "The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. ", "original_text": "It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "503b46b484101752f7629c381c64338e9d22368b194faf99a6bb73b992284d12", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7da8e5a7-784b-4f29-84f7-8d458417c35e", "node_type": "1", "metadata": {"window": "From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. ", "original_text": "But that was not the end of enslavement, \neven in the Americas. "}, "hash": "243de8e1153b9849f8267ab32d25b374463833aa3c75d93d4db6f9f205233b3b", "class_name": "RelatedNodeInfo"}}, "text": "The story of enslavement often ends in 1833. ", "start_char_idx": 729, "end_char_idx": 774, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7da8e5a7-784b-4f29-84f7-8d458417c35e": {"__data__": {"id_": "7da8e5a7-784b-4f29-84f7-8d458417c35e", "embedding": null, "metadata": {"window": "From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. ", "original_text": "But that was not the end of enslavement, \neven in the Americas. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4fe7d6bf-eb33-493b-8b7a-23f0c94b5153", "node_type": "1", "metadata": {"window": "Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. ", "original_text": "The story of enslavement often ends in 1833. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "3d0b38232f71814b2850b23cb6705830d87aba9526e669f8fd7ba3720d60bc80", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "22465b8a-248a-4772-ad2a-fbd03e55b3bf", "node_type": "1", "metadata": {"window": "It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n", "original_text": "It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. "}, "hash": "79061b3790650060f261f4b1a38ac1caa1d00a1b3733d5372ac08041a52e823d", "class_name": "RelatedNodeInfo"}}, "text": "But that was not the end of enslavement, \neven in the Americas. ", "start_char_idx": 774, "end_char_idx": 838, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "22465b8a-248a-4772-ad2a-fbd03e55b3bf": {"__data__": {"id_": "22465b8a-248a-4772-ad2a-fbd03e55b3bf", "embedding": null, "metadata": {"window": "It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n", "original_text": "It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7da8e5a7-784b-4f29-84f7-8d458417c35e", "node_type": "1", "metadata": {"window": "From this point the whole story of enslavement \u2013 why the \nenslaved were there, who ran the plantations, why they ran away \u2013 can be explored. It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. ", "original_text": "But that was not the end of enslavement, \neven in the Americas. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "b1541a0262e899644211a5d86d48b9c7a45a6193742c2e123769b5ee176c0a50", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0ecb0ff8-e372-4eaa-8208-e819b5a1714b", "node_type": "1", "metadata": {"window": "The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. ", "original_text": "It was not abolished in Brazil until 1888. "}, "hash": "6aad05622883fb023a634f5ff1caea2c59ced6cd01d16d59261c30846b45097a", "class_name": "RelatedNodeInfo"}}, "text": "It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. ", "start_char_idx": 838, "end_char_idx": 940, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0ecb0ff8-e372-4eaa-8208-e819b5a1714b": {"__data__": {"id_": "0ecb0ff8-e372-4eaa-8208-e819b5a1714b", "embedding": null, "metadata": {"window": "The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. ", "original_text": "It was not abolished in Brazil until 1888. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "22465b8a-248a-4772-ad2a-fbd03e55b3bf", "node_type": "1", "metadata": {"window": "It is \nalso an important piece of evidence of the reasons why the abolition campaign proceeded \nbeyond 1807 to full abolition of the institution of enslavement in 1833.\n The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n", "original_text": "It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "0a46b7241d90098790c8edfac946b44631b841ec7e86b1467dcf2c788d492653", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "192d43fd-b604-4e93-accc-cc6f5d07cdf9", "node_type": "1", "metadata": {"window": "But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. ", "original_text": "Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. "}, "hash": "1b59b24358ba72200447ba2c35be01c31c01e2f9de944d61731e957a29f4570d", "class_name": "RelatedNodeInfo"}}, "text": "It was not abolished in Brazil until 1888. ", "start_char_idx": 940, "end_char_idx": 983, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "192d43fd-b604-4e93-accc-cc6f5d07cdf9": {"__data__": {"id_": "192d43fd-b604-4e93-accc-cc6f5d07cdf9", "embedding": null, "metadata": {"window": "But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. ", "original_text": "Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0ecb0ff8-e372-4eaa-8208-e819b5a1714b", "node_type": "1", "metadata": {"window": "The story of enslavement often ends in 1833. But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. ", "original_text": "It was not abolished in Brazil until 1888. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "b1dac0129ae15e9fd65bab610391fcc05630ae5bfb1fe18fa876ee1b2cbe757c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6f129632-3f87-44a7-989c-ec9c49d59bc6", "node_type": "1", "metadata": {"window": "It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n"}, "hash": "1608082ef6117ec6a0e02e0900c5f2cd52c2431ecc94576637fa2fe28b56c99a", "class_name": "RelatedNodeInfo"}}, "text": "Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. ", "start_char_idx": 983, "end_char_idx": 1064, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6f129632-3f87-44a7-989c-ec9c49d59bc6": {"__data__": {"id_": "6f129632-3f87-44a7-989c-ec9c49d59bc6", "embedding": null, "metadata": {"window": "It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "192d43fd-b604-4e93-accc-cc6f5d07cdf9", "node_type": "1", "metadata": {"window": "But that was not the end of enslavement, \neven in the Americas. It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. ", "original_text": "Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "f99ae9ad763535454cb405a40de269a64388738f2722b94b3d2e9f72fcfa352a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f4706536-f8da-4795-92dc-d4c1071a07cd", "node_type": "1", "metadata": {"window": "It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. "}, "hash": "a11b11462680d51fdc0b4728d155b768d446e91422efe80976240d96252405f1", "class_name": "RelatedNodeInfo"}}, "text": "Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n", "start_char_idx": 1064, "end_char_idx": 1225, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f4706536-f8da-4795-92dc-d4c1071a07cd": {"__data__": {"id_": "f4706536-f8da-4795-92dc-d4c1071a07cd", "embedding": null, "metadata": {"window": "It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6f129632-3f87-44a7-989c-ec9c49d59bc6", "node_type": "1", "metadata": {"window": "It was not abolished in the USA until 1863, after a bloody Civil War \nhad been fought over the issue. It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "2ee50e5bd448fe74f700fa172f5b42426d6fa26466ed2de4590c958d8d7bd45d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "cbaafd8e-06d1-4576-9bc1-d93dad3170b8", "node_type": "1", "metadata": {"window": "Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. "}, "hash": "3db308e9b0ea1bad5adb83e77b94a7be291010e2bcc27575925890c6c473f8f4", "class_name": "RelatedNodeInfo"}}, "text": "Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. ", "start_char_idx": 1225, "end_char_idx": 1622, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "cbaafd8e-06d1-4576-9bc1-d93dad3170b8": {"__data__": {"id_": "cbaafd8e-06d1-4576-9bc1-d93dad3170b8", "embedding": null, "metadata": {"window": "Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f4706536-f8da-4795-92dc-d4c1071a07cd", "node_type": "1", "metadata": {"window": "It was not abolished in Brazil until 1888. Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "0b6d9ddbb74d42c7d39b565391950e86cb44042591c39c631c1711eb312b732d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5b642f65-112a-43d4-9b14-335caa53070d", "node_type": "1", "metadata": {"window": "Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "8ddff8b95cc90678d85d1ee58ff56eea6afc26076c6c8750e7a3c4db136c2b3d", "class_name": "RelatedNodeInfo"}}, "text": "HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. ", "start_char_idx": 1622, "end_char_idx": 1749, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5b642f65-112a-43d4-9b14-335caa53070d": {"__data__": {"id_": "5b642f65-112a-43d4-9b14-335caa53070d", "embedding": null, "metadata": {"window": "Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675", "node_type": "4", "metadata": {"page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "cbaafd8e-06d1-4576-9bc1-d93dad3170b8", "node_type": "1", "metadata": {"window": "Britain\u2019s high moral \nline about enslavement after 1833 is not often dealt with. Sources 2a, b and c reveal just \nhow much effort Britain put into its anti-enslavement activities in several parts of the world \nright through the 19th century.\n Sources\nIllustration ZPER 34/29 \u2013 an illustration from the Illustrated London News showing a slave \nsale in South Carolina around 1856\nSource 1 CO 71/51 \u2013 these are extracts from the court records for Dominica showing \npunishments for enslaved Africans\nSources 2 a, b, c FO 84/1310 \u2013 these photographs are a set showing East African enslaved \npeople rescued by the British naval ship, HMS Daphne. HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "HMS Daphne was often used to \nrescue enslaved people from slave runners after the 1833 abolition of slavery by Great \nBritain. ", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "hash": "c4b7bd9db0cf50761559b3d4ffdeff1c4cfaaa0fa3123ef5ccba8f82e4b458d3", "class_name": "RelatedNodeInfo"}}, "text": "Enslaved people who were rescued were often taken to a nearby island where they \nwould then set up new colonies.Teacher\u2019s notesSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 1749, "end_char_idx": 1951, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "65481478-3f66-4cc5-9784-6b8c54661654": {"__data__": {"id_": "65481478-3f66-4cc5-9784-6b8c54661654", "embedding": null, "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n", "original_text": "6Racism\nEnslavement is both a result and a cause of racism. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0026c333-d487-4ad1-82eb-c7465cb926b8", "node_type": "1", "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n", "original_text": "A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n"}, "hash": "df97f960036b86720b2ca4349ed5fb37544ed35799908554c5f9e45b06a78bb7", "class_name": "RelatedNodeInfo"}}, "text": "6Racism\nEnslavement is both a result and a cause of racism. ", "start_char_idx": 0, "end_char_idx": 60, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0026c333-d487-4ad1-82eb-c7465cb926b8": {"__data__": {"id_": "0026c333-d487-4ad1-82eb-c7465cb926b8", "embedding": null, "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n", "original_text": "A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "65481478-3f66-4cc5-9784-6b8c54661654", "node_type": "1", "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n", "original_text": "6Racism\nEnslavement is both a result and a cause of racism. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "4d4975168b6a514b10e81b220953c6585d4d8d04464c82dedd9e80f3c070b1f9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "65f5353c-1f93-436f-95b4-4aa3f60e03fc", "node_type": "1", "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. ", "original_text": "It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. "}, "hash": "fc1e2785e3b8b1e5b3757a56601365402dc6a819f24f93bd1bc23c64d0342119", "class_name": "RelatedNodeInfo"}}, "text": "A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n", "start_char_idx": 60, "end_char_idx": 193, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "65f5353c-1f93-436f-95b4-4aa3f60e03fc": {"__data__": {"id_": "65f5353c-1f93-436f-95b4-4aa3f60e03fc", "embedding": null, "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. ", "original_text": "It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0026c333-d487-4ad1-82eb-c7465cb926b8", "node_type": "1", "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n", "original_text": "A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "1e96da062165bfaa6d3269cecb4b90d6873b8f11b7bffcbd611fcd8e03a222a9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4436eb3c-9c54-4893-8d62-32bb42cb46ef", "node_type": "1", "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. ", "original_text": "Source 2 is just another example of this. \n"}, "hash": "8c87b0fbf3c7d3c84d670aab4b0bce6fd0eb61dcaa31282c5b321ab8748eb46e", "class_name": "RelatedNodeInfo"}}, "text": "It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. ", "start_char_idx": 193, "end_char_idx": 418, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4436eb3c-9c54-4893-8d62-32bb42cb46ef": {"__data__": {"id_": "4436eb3c-9c54-4893-8d62-32bb42cb46ef", "embedding": null, "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. ", "original_text": "Source 2 is just another example of this. \n", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "65f5353c-1f93-436f-95b4-4aa3f60e03fc", "node_type": "1", "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. ", "original_text": "It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "2a1729e07debe9a2a8e8f1ea0d16756a8a7427377a77eab2f93d322526f00cdf", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "dbe20a2a-1fc4-47c8-b82d-8cc0d59ce39e", "node_type": "1", "metadata": {"window": "A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. ", "original_text": "Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n"}, "hash": "cc540f1670f97f4ac44c5f04e337ae757fdcf38abc294127e352984746854dc0", "class_name": "RelatedNodeInfo"}}, "text": "Source 2 is just another example of this. \n", "start_char_idx": 418, "end_char_idx": 461, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "dbe20a2a-1fc4-47c8-b82d-8cc0d59ce39e": {"__data__": {"id_": "dbe20a2a-1fc4-47c8-b82d-8cc0d59ce39e", "embedding": null, "metadata": {"window": "A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. ", "original_text": "Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4436eb3c-9c54-4893-8d62-32bb42cb46ef", "node_type": "1", "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. ", "original_text": "Source 2 is just another example of this. \n", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "24bc6f9c97826aa5df8b0f8b6f7dc2891be2818d9716f46993c50c1686db2b3c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8b7b9878-5693-439a-a23e-4cc6d1493350", "node_type": "1", "metadata": {"window": "It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. ", "original_text": "The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. "}, "hash": "3d0f671420db5302861d2183da1562bb97f3edd69c931a8c7e967a3ac991c551", "class_name": "RelatedNodeInfo"}}, "text": "Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n", "start_char_idx": 461, "end_char_idx": 564, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8b7b9878-5693-439a-a23e-4cc6d1493350": {"__data__": {"id_": "8b7b9878-5693-439a-a23e-4cc6d1493350", "embedding": null, "metadata": {"window": "It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. ", "original_text": "The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "dbe20a2a-1fc4-47c8-b82d-8cc0d59ce39e", "node_type": "1", "metadata": {"window": "A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. ", "original_text": "Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "159125b8d52ecdfcd80fed49d6c4edcd7c0e0f09b31884bcc5f036ba2ce91715", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "95f99dab-63db-4b78-826d-696a8ff66ab9", "node_type": "1", "metadata": {"window": "Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. ", "original_text": "Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. "}, "hash": "3754b2afaf3a05ebb19eb8aa1a6f96a0b3ae7283a0344fdd3e729409c0cc5624", "class_name": "RelatedNodeInfo"}}, "text": "The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. ", "start_char_idx": 564, "end_char_idx": 771, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "95f99dab-63db-4b78-826d-696a8ff66ab9": {"__data__": {"id_": "95f99dab-63db-4b78-826d-696a8ff66ab9", "embedding": null, "metadata": {"window": "Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. ", "original_text": "Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8b7b9878-5693-439a-a23e-4cc6d1493350", "node_type": "1", "metadata": {"window": "It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. ", "original_text": "The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "447a47ccb4f049ff82ce2fed997f1d08252ea0f1aa40a1d4f1d9f4d2e07f5a10", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "bc64b8ee-928f-4d28-876b-fd773677e984", "node_type": "1", "metadata": {"window": "Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n", "original_text": "The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. "}, "hash": "7c456811424eae56555e13789c676259f34327c43da5313d04dd951f0f90d5f4", "class_name": "RelatedNodeInfo"}}, "text": "Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. ", "start_char_idx": 771, "end_char_idx": 895, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "bc64b8ee-928f-4d28-876b-fd773677e984": {"__data__": {"id_": "bc64b8ee-928f-4d28-876b-fd773677e984", "embedding": null, "metadata": {"window": "Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n", "original_text": "The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "95f99dab-63db-4b78-826d-696a8ff66ab9", "node_type": "1", "metadata": {"window": "Source 2 is just another example of this. \n Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. ", "original_text": "Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "96c1737632bb8b6fa59f5ef5979e105bb7b60a1d44084659f81e8cafb4a349ca", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3abde7ec-f74a-4629-b17d-67475d92da1f", "node_type": "1", "metadata": {"window": "The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. ", "original_text": "Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. "}, "hash": "761f482559e1ad4aca8936b55e05821c15651d215eb3880d1fe2b82866948e60", "class_name": "RelatedNodeInfo"}}, "text": "The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. ", "start_char_idx": 895, "end_char_idx": 1033, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3abde7ec-f74a-4629-b17d-67475d92da1f": {"__data__": {"id_": "3abde7ec-f74a-4629-b17d-67475d92da1f", "embedding": null, "metadata": {"window": "The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. ", "original_text": "Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "bc64b8ee-928f-4d28-876b-fd773677e984", "node_type": "1", "metadata": {"window": "Enslavement has also caused racism by setting up a stereotype of black people as victims in \nthe past.\n The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n", "original_text": "The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "a55b09f4fc8cfdd3deb3e6edc3135409ea6b65a1a3a05d62b96869ae707c3409", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7fdda8db-5310-487c-8bf5-6fa4fd27794d", "node_type": "1", "metadata": {"window": "Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. ", "original_text": "The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. "}, "hash": "8823445613a1fb60e68fbf8957531893d64fba7757d4221a9ccceef6b5a26fef", "class_name": "RelatedNodeInfo"}}, "text": "Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. ", "start_char_idx": 1033, "end_char_idx": 1120, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7fdda8db-5310-487c-8bf5-6fa4fd27794d": {"__data__": {"id_": "7fdda8db-5310-487c-8bf5-6fa4fd27794d", "embedding": null, "metadata": {"window": "Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. ", "original_text": "The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "3abde7ec-f74a-4629-b17d-67475d92da1f", "node_type": "1", "metadata": {"window": "The triangular trade\nThe British trade in enslaved people was a three-legged voyage: from British ports to West \nAfrica, where enslaved people were bought with guns and other British-manufactured \narticles. Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. ", "original_text": "Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "f75a5ed56b1378087563e58af5d7ce8d6c53911c61437c903cbbb6883d980caf", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9a94a297-d0f9-4898-9f65-0144aad5c26f", "node_type": "1", "metadata": {"window": "The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. ", "original_text": "Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n"}, "hash": "cb586e4d145f4ced2e99b308eeec616da4e420ba2e4a7af27ef9102da9b722ed", "class_name": "RelatedNodeInfo"}}, "text": "The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. ", "start_char_idx": 1120, "end_char_idx": 1238, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9a94a297-d0f9-4898-9f65-0144aad5c26f": {"__data__": {"id_": "9a94a297-d0f9-4898-9f65-0144aad5c26f", "embedding": null, "metadata": {"window": "The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. ", "original_text": "Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7fdda8db-5310-487c-8bf5-6fa4fd27794d", "node_type": "1", "metadata": {"window": "Then came the dreaded \u2018middle passage\u2019 to the Americas, with as many enslaved \npeople as possible were crammed below decks. The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. ", "original_text": "The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "04341d88cbb3e52481bc7df9cdcecfacdd6d2d84c99e517dac1990c89d5d32e3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3bc654c1-d5f3-4b58-8b5a-99a5ac5b7e07", "node_type": "1", "metadata": {"window": "Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. ", "original_text": "Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. "}, "hash": "b71bd236acdf1cac7aca657fb9a408368aab8b1eeb253a8a229f568fd783c8de", "class_name": "RelatedNodeInfo"}}, "text": "Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n", "start_char_idx": 1238, "end_char_idx": 1389, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3bc654c1-d5f3-4b58-8b5a-99a5ac5b7e07": {"__data__": {"id_": "3bc654c1-d5f3-4b58-8b5a-99a5ac5b7e07", "embedding": null, "metadata": {"window": "Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. ", "original_text": "Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9a94a297-d0f9-4898-9f65-0144aad5c26f", "node_type": "1", "metadata": {"window": "The enslaved were then sold in the \nsouthern USA, the Caribbean Islands and South America, where they were used to work \nthe plantations. Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. ", "original_text": "Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "6ee0229939f6684f40292cd232a0af772296ccedf281994c1f0cc6f98ecaf4b3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "cadbd380-380b-4f8e-929d-4bb1555aeb54", "node_type": "1", "metadata": {"window": "The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. "}, "hash": "2373061852483157990fbfe1fcc7083e84ed3b6a0d90c2418f8187dc74bc9ff4", "class_name": "RelatedNodeInfo"}}, "text": "Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. ", "start_char_idx": 1389, "end_char_idx": 1518, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "cadbd380-380b-4f8e-929d-4bb1555aeb54": {"__data__": {"id_": "cadbd380-380b-4f8e-929d-4bb1555aeb54", "embedding": null, "metadata": {"window": "The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "3bc654c1-d5f3-4b58-8b5a-99a5ac5b7e07", "node_type": "1", "metadata": {"window": "Plantations were farms growing only crops that Europe wanted: tobacco, \nsugar, cotton. The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. ", "original_text": "Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "279d09e986cea8399a98e283d0f20fb124a678fd68a4f609603a51388b2fd620", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ecd2acb0-bb8e-4f4d-9780-e3281c776920", "node_type": "1", "metadata": {"window": "Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Other enslaved people worked as craftspeople, or servants. "}, "hash": "041b1efc80302c18269f5eb330ee4441ecd974ee1803b15dd4d7fcfeddc3c056", "class_name": "RelatedNodeInfo"}}, "text": "They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. ", "start_char_idx": 1518, "end_char_idx": 1599, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ecd2acb0-bb8e-4f4d-9780-e3281c776920": {"__data__": {"id_": "ecd2acb0-bb8e-4f4d-9780-e3281c776920", "embedding": null, "metadata": {"window": "Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Other enslaved people worked as craftspeople, or servants. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "cadbd380-380b-4f8e-929d-4bb1555aeb54", "node_type": "1", "metadata": {"window": "The merchant ships would load up with these products and take them back \nto Britain on the last leg of their journey. Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "0cfaeab6ce09b8797f8a3d7d7b4f293736af3d16b14aade8efa9473e10bf21cf", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "078d64c7-eccc-4149-9a17-fb2926c65eb9", "node_type": "1", "metadata": {"window": "Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. "}, "hash": "364dada4644fb5c684cf5ce4239594cb0585e5ee3abd2b019dc9399852f4b7b5", "class_name": "RelatedNodeInfo"}}, "text": "Other enslaved people worked as craftspeople, or servants. ", "start_char_idx": 1599, "end_char_idx": 1658, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "078d64c7-eccc-4149-9a17-fb2926c65eb9": {"__data__": {"id_": "078d64c7-eccc-4149-9a17-fb2926c65eb9", "embedding": null, "metadata": {"window": "Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ecd2acb0-bb8e-4f4d-9780-e3281c776920", "node_type": "1", "metadata": {"window": "Profits from this trade made merchants rich as \nwell as providing the capital (money) for many of the enterprises of the early Industrial \nRevolution.\n Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Other enslaved people worked as craftspeople, or servants. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "94d9bc44c9d0cadb5d0ba9d614e76a61240a78edee7c5e4baeaa25ace424a965", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "69bc62b7-4d5c-452a-9b92-270911d4a0fe", "node_type": "1", "metadata": {"window": "They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "e05cfbde886d939e21eeafee068cdc9a9f3a3a581eab81f4e602e23ad0398045", "class_name": "RelatedNodeInfo"}}, "text": "The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. ", "start_char_idx": 1658, "end_char_idx": 1795, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "69bc62b7-4d5c-452a-9b92-270911d4a0fe": {"__data__": {"id_": "69bc62b7-4d5c-452a-9b92-270911d4a0fe", "embedding": null, "metadata": {"window": "They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b", "node_type": "4", "metadata": {"page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "078d64c7-eccc-4149-9a17-fb2926c65eb9", "node_type": "1", "metadata": {"window": "Plantation life\nThe enslaved people were worked in gangs, made up of both men and women, driven on \nby the whip of the overseer. They worked for ten to 12 hours a day in the tropical sun, for \nsix days a week. Other enslaved people worked as craftspeople, or servants. The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "The fact that \nthey could be bought or sold away from the plantation at any time made it very difficult to \nmaintain normal family life. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "hash": "5a531747e2d7950c8e338dd65775b7047a6fc55f809087c86faba7a3785519c4", "class_name": "RelatedNodeInfo"}}, "text": "Some of the \u2018runaways\u2019 listed in Source 1 may well have just \nbeen trying to visit friends or relations who had been sold to another plantation.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 1795, "end_char_idx": 2024, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "28a8185c-f125-4827-b001-61b93cd4bcc4": {"__data__": {"id_": "28a8185c-f125-4827-b001-61b93cd4bcc4", "embedding": null, "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n", "original_text": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f7144879-9b5e-4f29-bbf9-386cb07ef6fa", "node_type": "1", "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. ", "original_text": "From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. "}, "hash": "b2f61d3022180c30ed0a590447ca7795f949e90ba31a8fa2cd76c147cc304f76", "class_name": "RelatedNodeInfo"}}, "text": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. ", "start_char_idx": 0, "end_char_idx": 101, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f7144879-9b5e-4f29-bbf9-386cb07ef6fa": {"__data__": {"id_": "f7144879-9b5e-4f29-bbf9-386cb07ef6fa", "embedding": null, "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. ", "original_text": "From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "28a8185c-f125-4827-b001-61b93cd4bcc4", "node_type": "1", "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n", "original_text": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "104f45bc1bda3099027ea72e0875d17bca64f86a18bcfdaac8609258ef5baef7", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c511a92a-648f-4757-a9ad-d7f0323a2184", "node_type": "1", "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. ", "original_text": "Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. "}, "hash": "8d0559a621bf199cf43c053abfab7f0e9149b511de1e8cb6334c3da1de8a4656", "class_name": "RelatedNodeInfo"}}, "text": "From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. ", "start_char_idx": 101, "end_char_idx": 293, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c511a92a-648f-4757-a9ad-d7f0323a2184": {"__data__": {"id_": "c511a92a-648f-4757-a9ad-d7f0323a2184", "embedding": null, "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. ", "original_text": "Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f7144879-9b5e-4f29-bbf9-386cb07ef6fa", "node_type": "1", "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. ", "original_text": "From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "054e56c0760f5d47df3ff1cd43aa540fdffe8a5f50217ebdcb464793855bcfab", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "1e866be3-ffe5-46cf-b4a3-8ac41f938b69", "node_type": "1", "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. ", "original_text": "There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n"}, "hash": "712f5ce2bc3ab5d8113c8d02a7e396ae6dfe4706ed015265b18a79e6948ef52f", "class_name": "RelatedNodeInfo"}}, "text": "Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. ", "start_char_idx": 293, "end_char_idx": 388, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "1e866be3-ffe5-46cf-b4a3-8ac41f938b69": {"__data__": {"id_": "1e866be3-ffe5-46cf-b4a3-8ac41f938b69", "embedding": null, "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. ", "original_text": "There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c511a92a-648f-4757-a9ad-d7f0323a2184", "node_type": "1", "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. ", "original_text": "Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "de850203af4c7f840a350b5cfc1763419ee11f4e90d71923c5efdfedf0fcd336", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b6af877d-2390-4bd8-a6d2-6ed4a772215d", "node_type": "1", "metadata": {"window": "From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n", "original_text": "Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. "}, "hash": "cf5440240d996c4d418478b65104e49fe86acb2d263e282f4725d97f53f409a0", "class_name": "RelatedNodeInfo"}}, "text": "There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n", "start_char_idx": 388, "end_char_idx": 541, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b6af877d-2390-4bd8-a6d2-6ed4a772215d": {"__data__": {"id_": "b6af877d-2390-4bd8-a6d2-6ed4a772215d", "embedding": null, "metadata": {"window": "From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n", "original_text": "Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "1e866be3-ffe5-46cf-b4a3-8ac41f938b69", "node_type": "1", "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. ", "original_text": "There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "e1239e15ecca227949e8cb9870a237315d8b9e955c4d56ca18bfd1595f15e677", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d0b11037-1945-40ec-8ab3-47921d1fadcb", "node_type": "1", "metadata": {"window": "Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. ", "original_text": "Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. "}, "hash": "66087bb57d7cf1cbb9be5690365f2d0c142e51c604c56781cfa67de86894ff29", "class_name": "RelatedNodeInfo"}}, "text": "Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. ", "start_char_idx": 541, "end_char_idx": 1005, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d0b11037-1945-40ec-8ab3-47921d1fadcb": {"__data__": {"id_": "d0b11037-1945-40ec-8ab3-47921d1fadcb", "embedding": null, "metadata": {"window": "Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. ", "original_text": "Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b6af877d-2390-4bd8-a6d2-6ed4a772215d", "node_type": "1", "metadata": {"window": "From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n", "original_text": "Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "a79f61ff14dd91c1d5f7a31283023e9417e65c3ab5f46bc597b856a4a830eba2", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7fd8f050-d87e-41cc-9c63-0003e5ee1544", "node_type": "1", "metadata": {"window": "There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. ", "original_text": "They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. "}, "hash": "e5b3f33560e9d615ea8978d56d8c7ff51a8fba982f6f3827289132a7dee7f60b", "class_name": "RelatedNodeInfo"}}, "text": "Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. ", "start_char_idx": 1005, "end_char_idx": 1285, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7fd8f050-d87e-41cc-9c63-0003e5ee1544": {"__data__": {"id_": "7fd8f050-d87e-41cc-9c63-0003e5ee1544", "embedding": null, "metadata": {"window": "There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. ", "original_text": "They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d0b11037-1945-40ec-8ab3-47921d1fadcb", "node_type": "1", "metadata": {"window": "Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. ", "original_text": "Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "45007da16eaff293e642bccc7dc7dc629e1e2e8eaca14c6778e72e60899fb76e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a77ba583-0f1d-46b2-8ff7-ae17479ce0fd", "node_type": "1", "metadata": {"window": "Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. ", "original_text": "Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n"}, "hash": "0989a905d37992f1edb06b31b5c3d4140263ec7d749581842acc659ffb4232ac", "class_name": "RelatedNodeInfo"}}, "text": "They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. ", "start_char_idx": 1285, "end_char_idx": 1380, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a77ba583-0f1d-46b2-8ff7-ae17479ce0fd": {"__data__": {"id_": "a77ba583-0f1d-46b2-8ff7-ae17479ce0fd", "embedding": null, "metadata": {"window": "Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. ", "original_text": "Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7fd8f050-d87e-41cc-9c63-0003e5ee1544", "node_type": "1", "metadata": {"window": "There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. ", "original_text": "They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "d324fc68d317231c4c7fa2adab814271fbe414cf494de240bb8489ba860109b2", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "300666de-ee99-4e70-879a-f6089faafc46", "node_type": "1", "metadata": {"window": "Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Clearly, the campaign to abolish enslavement did not end in 1833. "}, "hash": "64a436b07da104ceb879e79cc09f6a39a3737c2e776c9b4a5bf5ec8ed9350a9a", "class_name": "RelatedNodeInfo"}}, "text": "Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n", "start_char_idx": 1380, "end_char_idx": 1558, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "300666de-ee99-4e70-879a-f6089faafc46": {"__data__": {"id_": "300666de-ee99-4e70-879a-f6089faafc46", "embedding": null, "metadata": {"window": "Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Clearly, the campaign to abolish enslavement did not end in 1833. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a77ba583-0f1d-46b2-8ff7-ae17479ce0fd", "node_type": "1", "metadata": {"window": "Abolition\nThe case against enslavement had several arguments:\n\u2022 The moral argument: enslavement is wicked, un-Christian\n\u2022 The economic argument: enslavement is expensive and inefficient\n\u2022 The legal argument: enslavement is illegal under British law\n\u2022 Problems in the plantations: enslaved people continued to resist enslavement and would \nnot be suppressed\nThe campaign to abolish enslavement was the first popular peaceful mass protest \nmovement of modern times. Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. ", "original_text": "Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "2d11f6f89d6d21b2daf59888afb8f2667b218817a282021a32d8407782d54951", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "fc29303b-07ce-4727-be27-983181f9f61e", "node_type": "1", "metadata": {"window": "They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. "}, "hash": "d81c2dd6d647587f432341124be0832d2f05891fce4cf08f29f979d88352564c", "class_name": "RelatedNodeInfo"}}, "text": "Clearly, the campaign to abolish enslavement did not end in 1833. ", "start_char_idx": 1558, "end_char_idx": 1624, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "fc29303b-07ce-4727-be27-983181f9f61e": {"__data__": {"id_": "fc29303b-07ce-4727-be27-983181f9f61e", "embedding": null, "metadata": {"window": "They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "300666de-ee99-4e70-879a-f6089faafc46", "node_type": "1", "metadata": {"window": "Leading white abolitionists were Granville Sharpe, who helped \nblack people fight test cases in the courts; Thomas Clarkson, who collected evidence of \nthe cruelty of the enslavement trade from all over Britain; and William Wilberforce, who \nfought for legislation in Parliament. They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Clearly, the campaign to abolish enslavement did not end in 1833. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "9aa98d54c47bb3556d4dc5205581df26d03acc4a7feffa37353a766bde529c7d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f8cbb712-32b8-4562-bde4-fb725b3d9205", "node_type": "1", "metadata": {"window": "Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. "}, "hash": "4bbe005990abec6c947843fc3f72d910e9102a9c094ab8f3dd82609f3dc9b52c", "class_name": "RelatedNodeInfo"}}, "text": "Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. ", "start_char_idx": 1624, "end_char_idx": 1823, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f8cbb712-32b8-4562-bde4-fb725b3d9205": {"__data__": {"id_": "f8cbb712-32b8-4562-bde4-fb725b3d9205", "embedding": null, "metadata": {"window": "Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "fc29303b-07ce-4727-be27-983181f9f61e", "node_type": "1", "metadata": {"window": "They worked with black abolitionist campaigners, such \nas Olaudah Equiano and Ottobah Cuguano. Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "f7f8bde444aba95be10ca69c90f4b0214c484c2317524896b0bef95c12182800", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5d9e999c-18a0-4cb2-9926-50c308eb129b", "node_type": "1", "metadata": {"window": "Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "3ae701af5ac670fae5c63f9d051dfd349188e4886c44203d7aa2074e02c404f7", "class_name": "RelatedNodeInfo"}}, "text": "Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. ", "start_char_idx": 1823, "end_char_idx": 2010, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5d9e999c-18a0-4cb2-9926-50c308eb129b": {"__data__": {"id_": "5d9e999c-18a0-4cb2-9926-50c308eb129b", "embedding": null, "metadata": {"window": "Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05", "node_type": "4", "metadata": {"page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f8cbb712-32b8-4562-bde4-fb725b3d9205", "node_type": "1", "metadata": {"window": "Mary Prince, who had been enslaved for part \nof her life, wrote an important book about her experiences which helped to influence the \neventual abolition of enslavement in 1833.\n Clearly, the campaign to abolish enslavement did not end in 1833. Plantation owners still \nused forced labour in the form of indentured workers (a worker who works for a fixed term \nfor their transportation, board and lodgings) particularly on tobacco plantations. Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Being an \nindentured worker meant, in theory, that you should be treated fairly and that although you \nweren\u2019t paid for your labour, you would be given proper food and somewhere to stay. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "hash": "f971c335a9403059a6bb9f40bb5d1301509f12d556007bb38cd8933f75ebed25", "class_name": "RelatedNodeInfo"}}, "text": "In \nactual fact, indentured workers were often treated no better than enslaved workers, with \nbeatings, and even death, a common factor.BackgroundSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 2010, "end_char_idx": 2231, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a56e9c7d-5513-45d6-a642-be7af0c2e85c": {"__data__": {"id_": "a56e9c7d-5513-45d6-a642-be7af0c2e85c", "embedding": null, "metadata": {"window": "8Son of the South1\nA useful site with lots of enslavement related images and resources.\n International Slavery Museum2\nInternational slavery museum collections at Liverpool Museum\nOlaudah Equiano3\nThe life of the 18th century writer and abolitionist Olaudah Equiano, with the Equiano \nSociety and Birmingham Museum and Art Gallery\nWhat is modern slavery?4\nWhat is modern slavery today?External links\n1 https://www.sonofthesouth.net/slavery/index.html\n2 https://www.liverpoolmuseums.org.uk/international-slavery-museum\n3 https://equiano.uk/\n4 https://www.antislavery.org/slavery-today/modern-slavery/Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "8Son of the South1\nA useful site with lots of enslavement related images and resources.\n", "page_label": "8", "file_name": "slavery.pdf", "doc_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb", "node_type": "4", "metadata": {"page_label": "8", "file_name": "slavery.pdf", "doc_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb"}, "hash": "d0844cb03d654f72009a5fffea5cb78b8e27bdc71d759cb8424bc8c68f4562ce", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6a803b57-49fc-48ca-9393-972328ee4732", "node_type": "1", "metadata": {"window": "8Son of the South1\nA useful site with lots of enslavement related images and resources.\n International Slavery Museum2\nInternational slavery museum collections at Liverpool Museum\nOlaudah Equiano3\nThe life of the 18th century writer and abolitionist Olaudah Equiano, with the Equiano \nSociety and Birmingham Museum and Art Gallery\nWhat is modern slavery?4\nWhat is modern slavery today?External links\n1 https://www.sonofthesouth.net/slavery/index.html\n2 https://www.liverpoolmuseums.org.uk/international-slavery-museum\n3 https://equiano.uk/\n4 https://www.antislavery.org/slavery-today/modern-slavery/Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "International Slavery Museum2\nInternational slavery museum collections at Liverpool Museum\nOlaudah Equiano3\nThe life of the 18th century writer and abolitionist Olaudah Equiano, with the Equiano \nSociety and Birmingham Museum and Art Gallery\nWhat is modern slavery?4\nWhat is modern slavery today?External links\n1 https://www.sonofthesouth.net/slavery/index.html\n2 https://www.liverpoolmuseums.org.uk/international-slavery-museum\n3 https://equiano.uk/\n4 https://www.antislavery.org/slavery-today/modern-slavery/Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "28ac4a6de129cef5b355ffb751ca6d838e99afbd94464ae660bbcadb78024169", "class_name": "RelatedNodeInfo"}}, "text": "8Son of the South1\nA useful site with lots of enslavement related images and resources.\n", "start_char_idx": 0, "end_char_idx": 88, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6a803b57-49fc-48ca-9393-972328ee4732": {"__data__": {"id_": "6a803b57-49fc-48ca-9393-972328ee4732", "embedding": null, "metadata": {"window": "8Son of the South1\nA useful site with lots of enslavement related images and resources.\n International Slavery Museum2\nInternational slavery museum collections at Liverpool Museum\nOlaudah Equiano3\nThe life of the 18th century writer and abolitionist Olaudah Equiano, with the Equiano \nSociety and Birmingham Museum and Art Gallery\nWhat is modern slavery?4\nWhat is modern slavery today?External links\n1 https://www.sonofthesouth.net/slavery/index.html\n2 https://www.liverpoolmuseums.org.uk/international-slavery-museum\n3 https://equiano.uk/\n4 https://www.antislavery.org/slavery-today/modern-slavery/Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "International Slavery Museum2\nInternational slavery museum collections at Liverpool Museum\nOlaudah Equiano3\nThe life of the 18th century writer and abolitionist Olaudah Equiano, with the Equiano \nSociety and Birmingham Museum and Art Gallery\nWhat is modern slavery?4\nWhat is modern slavery today?External links\n1 https://www.sonofthesouth.net/slavery/index.html\n2 https://www.liverpoolmuseums.org.uk/international-slavery-museum\n3 https://equiano.uk/\n4 https://www.antislavery.org/slavery-today/modern-slavery/Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "8", "file_name": "slavery.pdf", "doc_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb", "node_type": "4", "metadata": {"page_label": "8", "file_name": "slavery.pdf", "doc_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb"}, "hash": "d0844cb03d654f72009a5fffea5cb78b8e27bdc71d759cb8424bc8c68f4562ce", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a56e9c7d-5513-45d6-a642-be7af0c2e85c", "node_type": "1", "metadata": {"window": "8Son of the South1\nA useful site with lots of enslavement related images and resources.\n International Slavery Museum2\nInternational slavery museum collections at Liverpool Museum\nOlaudah Equiano3\nThe life of the 18th century writer and abolitionist Olaudah Equiano, with the Equiano \nSociety and Birmingham Museum and Art Gallery\nWhat is modern slavery?4\nWhat is modern slavery today?External links\n1 https://www.sonofthesouth.net/slavery/index.html\n2 https://www.liverpoolmuseums.org.uk/international-slavery-museum\n3 https://equiano.uk/\n4 https://www.antislavery.org/slavery-today/modern-slavery/Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "8Son of the South1\nA useful site with lots of enslavement related images and resources.\n", "page_label": "8", "file_name": "slavery.pdf", "doc_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb"}, "hash": "0449b10d916f727f89549b3208a5ca5858887a37433cfaea06766f435ada902d", "class_name": "RelatedNodeInfo"}}, "text": "International Slavery Museum2\nInternational slavery museum collections at Liverpool Museum\nOlaudah Equiano3\nThe life of the 18th century writer and abolitionist Olaudah Equiano, with the Equiano \nSociety and Birmingham Museum and Art Gallery\nWhat is modern slavery?4\nWhat is modern slavery today?External links\n1 https://www.sonofthesouth.net/slavery/index.html\n2 https://www.liverpoolmuseums.org.uk/international-slavery-museum\n3 https://equiano.uk/\n4 https://www.antislavery.org/slavery-today/modern-slavery/Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 88, "end_char_idx": 673, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "02ca96c4-6d09-4dc8-92cc-b544eedf62f1": {"__data__": {"id_": "02ca96c4-6d09-4dc8-92cc-b544eedf62f1", "embedding": null, "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. ", "original_text": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ed46bb94-ddc0-496e-b660-7dc1414efb5a", "node_type": "1", "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? ", "original_text": "Read Source 1. "}, "hash": "54947449227b4f193eb91919c7be32ff1a3193c2db3837c260f99194b9a5eb7b", "class_name": "RelatedNodeInfo"}}, "text": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. ", "start_char_idx": 0, "end_char_idx": 71, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ed46bb94-ddc0-496e-b660-7dc1414efb5a": {"__data__": {"id_": "ed46bb94-ddc0-496e-b660-7dc1414efb5a", "embedding": null, "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? ", "original_text": "Read Source 1. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "02ca96c4-6d09-4dc8-92cc-b544eedf62f1", "node_type": "1", "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. ", "original_text": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "f48ee1f06dc0463c9c65f856b468b4d54f1ba6ecc5b5bab8d22ab1152a9a830d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2bad9597-31ad-4288-9dce-b385ed1aac1a", "node_type": "1", "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n", "original_text": "Look at the names on the document.\n"}, "hash": "0a1879b7955d65f8155af9a8c119dfffaff6d882ccab7a83b9ec91754d80a67c", "class_name": "RelatedNodeInfo"}}, "text": "Read Source 1. ", "start_char_idx": 71, "end_char_idx": 86, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2bad9597-31ad-4288-9dce-b385ed1aac1a": {"__data__": {"id_": "2bad9597-31ad-4288-9dce-b385ed1aac1a", "embedding": null, "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n", "original_text": "Look at the names on the document.\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ed46bb94-ddc0-496e-b660-7dc1414efb5a", "node_type": "1", "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? ", "original_text": "Read Source 1. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "3520005de673b8a96171d610cc9fa9c0751a273987e53743fa8e790d419bcdae", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8ded3bcf-f8a8-461b-a4b9-9a85d82797f3", "node_type": "1", "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? ", "original_text": "\u2022 These enslaved people originated in Africa. "}, "hash": "ed567a8ef49560ec90e1b04aedc53cf547d6d10ce64b1ed89248c28785aee46b", "class_name": "RelatedNodeInfo"}}, "text": "Look at the names on the document.\n", "start_char_idx": 86, "end_char_idx": 121, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8ded3bcf-f8a8-461b-a4b9-9a85d82797f3": {"__data__": {"id_": "8ded3bcf-f8a8-461b-a4b9-9a85d82797f3", "embedding": null, "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? ", "original_text": "\u2022 These enslaved people originated in Africa. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2bad9597-31ad-4288-9dce-b385ed1aac1a", "node_type": "1", "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n", "original_text": "Look at the names on the document.\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "587bf1634e63f7fc3d5eb814d57d5d2708cdea7ebcd7c95f7dc5251d7b701533", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3b9a25ca-ad51-446a-b03e-3ebd0d40242d", "node_type": "1", "metadata": {"window": "Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n", "original_text": "Are these African names? "}, "hash": "ca6dc04462b8f8c1dbed8fa36dcfeb8d50fd0bd1f83b5c9b25d647a16390b334", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 These enslaved people originated in Africa. ", "start_char_idx": 121, "end_char_idx": 167, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3b9a25ca-ad51-446a-b03e-3ebd0d40242d": {"__data__": {"id_": "3b9a25ca-ad51-446a-b03e-3ebd0d40242d", "embedding": null, "metadata": {"window": "Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n", "original_text": "Are these African names? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8ded3bcf-f8a8-461b-a4b9-9a85d82797f3", "node_type": "1", "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? ", "original_text": "\u2022 These enslaved people originated in Africa. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "2337fa9be7ee516f901f606a1cc988606b85ebf1fa57313e157d657d328b3ca9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "58185f9d-bf2a-443c-bc76-f5bfe06ec79a", "node_type": "1", "metadata": {"window": "Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? ", "original_text": "Who named them?\n"}, "hash": "02444316966a6f04fee342c0e4fed13d7f72c54ddce8557109dc7277d4803eb8", "class_name": "RelatedNodeInfo"}}, "text": "Are these African names? ", "start_char_idx": 167, "end_char_idx": 192, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "58185f9d-bf2a-443c-bc76-f5bfe06ec79a": {"__data__": {"id_": "58185f9d-bf2a-443c-bc76-f5bfe06ec79a", "embedding": null, "metadata": {"window": "Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? ", "original_text": "Who named them?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "3b9a25ca-ad51-446a-b03e-3ebd0d40242d", "node_type": "1", "metadata": {"window": "Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n", "original_text": "Are these African names? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "e72e40696abefb5cc68236adabd3262125fd8b061b71af4687addf9100b1a024", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e2622ce4-abb8-4d42-86d9-966ce0b9ca15", "node_type": "1", "metadata": {"window": "\u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n", "original_text": "\u2022 How many names do the enslaved Africans have? "}, "hash": "ca0eb6150eb0f43e03e9d927137cab6f50aa1a75fcdf16ded2383eb1215c77c2", "class_name": "RelatedNodeInfo"}}, "text": "Who named them?\n", "start_char_idx": 192, "end_char_idx": 208, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e2622ce4-abb8-4d42-86d9-966ce0b9ca15": {"__data__": {"id_": "e2622ce4-abb8-4d42-86d9-966ce0b9ca15", "embedding": null, "metadata": {"window": "\u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n", "original_text": "\u2022 How many names do the enslaved Africans have? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "58185f9d-bf2a-443c-bc76-f5bfe06ec79a", "node_type": "1", "metadata": {"window": "Look at the names on the document.\n \u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? ", "original_text": "Who named them?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "c72327d1a9f48578cbae4496b100e1c93dbe352871149ad35dd81d560ac6cfca", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9949ac58-0bff-4791-bb37-9b42df6977db", "node_type": "1", "metadata": {"window": "Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. ", "original_text": "Why weren\u2019t they given surnames?\n"}, "hash": "968c3bd424a2b2e36845370a86ee2fc2eb58b889ccc3b7f7fd09383e000c0804", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 How many names do the enslaved Africans have? ", "start_char_idx": 208, "end_char_idx": 256, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9949ac58-0bff-4791-bb37-9b42df6977db": {"__data__": {"id_": "9949ac58-0bff-4791-bb37-9b42df6977db", "embedding": null, "metadata": {"window": "Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. ", "original_text": "Why weren\u2019t they given surnames?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e2622ce4-abb8-4d42-86d9-966ce0b9ca15", "node_type": "1", "metadata": {"window": "\u2022 These enslaved people originated in Africa. Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n", "original_text": "\u2022 How many names do the enslaved Africans have? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "f151f798f494ffbb686539bd9c445289f2cde00f2408abe5d4ec94f6f9ceebe9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5214c1b3-9682-48b2-a25e-f4d5879a1a65", "node_type": "1", "metadata": {"window": "Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n", "original_text": "\u2022 Which enslaved people are male and which are female? "}, "hash": "3303c0b1df8245470724d26f903b56a3b137cd9426f5128c45835e90d13a5b07", "class_name": "RelatedNodeInfo"}}, "text": "Why weren\u2019t they given surnames?\n", "start_char_idx": 256, "end_char_idx": 289, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5214c1b3-9682-48b2-a25e-f4d5879a1a65": {"__data__": {"id_": "5214c1b3-9682-48b2-a25e-f4d5879a1a65", "embedding": null, "metadata": {"window": "Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n", "original_text": "\u2022 Which enslaved people are male and which are female? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9949ac58-0bff-4791-bb37-9b42df6977db", "node_type": "1", "metadata": {"window": "Are these African names? Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. ", "original_text": "Why weren\u2019t they given surnames?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "02b8310f1f20399b3e821b62dff80bd67b175b2f2460f7546f1d92a83c9e072e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9e2d2d43-625d-4106-8d00-c47da6bd20c3", "node_type": "1", "metadata": {"window": "\u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. ", "original_text": "Does their gender make any \ndifference to how they were treated by the court?\n"}, "hash": "1ddf4c94b0d0321094c862e3e2d4f81e4ad43d48d4b964eb8019a8a59b7231ed", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 Which enslaved people are male and which are female? ", "start_char_idx": 289, "end_char_idx": 344, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9e2d2d43-625d-4106-8d00-c47da6bd20c3": {"__data__": {"id_": "9e2d2d43-625d-4106-8d00-c47da6bd20c3", "embedding": null, "metadata": {"window": "\u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. ", "original_text": "Does their gender make any \ndifference to how they were treated by the court?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5214c1b3-9682-48b2-a25e-f4d5879a1a65", "node_type": "1", "metadata": {"window": "Who named them?\n \u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n", "original_text": "\u2022 Which enslaved people are male and which are female? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "1142ad5166987611f8e1fa281cadea4000ebc933dcb16da176301902cc77039c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d6b690e6-46f0-492f-8f4b-3a7a80d07138", "node_type": "1", "metadata": {"window": "Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n", "original_text": "\u2022 Dominica had been a French possession until 1763. "}, "hash": "170d45fa8b57ba5a5f8f3f050611ecf897cf5c0b647a2e57d2912937866a8106", "class_name": "RelatedNodeInfo"}}, "text": "Does their gender make any \ndifference to how they were treated by the court?\n", "start_char_idx": 344, "end_char_idx": 422, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d6b690e6-46f0-492f-8f4b-3a7a80d07138": {"__data__": {"id_": "d6b690e6-46f0-492f-8f4b-3a7a80d07138", "embedding": null, "metadata": {"window": "Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n", "original_text": "\u2022 Dominica had been a French possession until 1763. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9e2d2d43-625d-4106-8d00-c47da6bd20c3", "node_type": "1", "metadata": {"window": "\u2022 How many names do the enslaved Africans have? Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. ", "original_text": "Does their gender make any \ndifference to how they were treated by the court?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "aaad65272a514d7bff22172d73445a982ae0ad9864ab2679ef90f6afc9dbe831", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "df93033a-8dd3-49f7-b348-763d0b48e612", "node_type": "1", "metadata": {"window": "\u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n", "original_text": "Which of the slaves have French \nnames?\n"}, "hash": "1d54a66caae242ea75907be94d3b8d25bb58fde5b7f1ff83ec5ef01a12912461", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 Dominica had been a French possession until 1763. ", "start_char_idx": 422, "end_char_idx": 474, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "df93033a-8dd3-49f7-b348-763d0b48e612": {"__data__": {"id_": "df93033a-8dd3-49f7-b348-763d0b48e612", "embedding": null, "metadata": {"window": "\u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n", "original_text": "Which of the slaves have French \nnames?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d6b690e6-46f0-492f-8f4b-3a7a80d07138", "node_type": "1", "metadata": {"window": "Why weren\u2019t they given surnames?\n \u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n", "original_text": "\u2022 Dominica had been a French possession until 1763. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "f395a689be3e265b51743fd49d88e0c11c5350d62cd7b6900d3deaa6e2f84bc2", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5a860cda-b415-4d83-aa50-ae5b9e63b858", "node_type": "1", "metadata": {"window": "Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. ", "original_text": "2. "}, "hash": "2e040782f756028758a03461ec3b68bd1c34d72fcd47f7c0f4a1228c8c1e1746", "class_name": "RelatedNodeInfo"}}, "text": "Which of the slaves have French \nnames?\n", "start_char_idx": 474, "end_char_idx": 514, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5a860cda-b415-4d83-aa50-ae5b9e63b858": {"__data__": {"id_": "5a860cda-b415-4d83-aa50-ae5b9e63b858", "embedding": null, "metadata": {"window": "Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. ", "original_text": "2. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "df93033a-8dd3-49f7-b348-763d0b48e612", "node_type": "1", "metadata": {"window": "\u2022 Which enslaved people are male and which are female? Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n", "original_text": "Which of the slaves have French \nnames?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "5a716a42b0f76aef6a5366348e1afa19b01fa619f07de752312190d4744ee7d9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "01fe664f-3b2a-46d1-b8bb-7d45779f69f6", "node_type": "1", "metadata": {"window": "\u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. ", "original_text": "Now look at the charges against the enslaved Africans in Source 1.\n"}, "hash": "6fdaadce458b96d4b0b0bf2a0d30ebfacef4b73a7dbeeb3337992a1446a369dd", "class_name": "RelatedNodeInfo"}}, "text": "2. ", "start_char_idx": 514, "end_char_idx": 517, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "01fe664f-3b2a-46d1-b8bb-7d45779f69f6": {"__data__": {"id_": "01fe664f-3b2a-46d1-b8bb-7d45779f69f6", "embedding": null, "metadata": {"window": "\u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. ", "original_text": "Now look at the charges against the enslaved Africans in Source 1.\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5a860cda-b415-4d83-aa50-ae5b9e63b858", "node_type": "1", "metadata": {"window": "Does their gender make any \ndifference to how they were treated by the court?\n \u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. ", "original_text": "2. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "a34ef25a60305e0212ace521276ee46150747400b1d83d8ceacbd81c7a51864b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "bcdc7243-9dd5-445b-b2b7-358c669c8893", "node_type": "1", "metadata": {"window": "Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n", "original_text": "\u2022 What have most of these enslaved people been charged with?\n"}, "hash": "7c95afd1f51611c8f1679d783ddf701f79e314cdfefb2a69e4ab8ad9bdb4e40c", "class_name": "RelatedNodeInfo"}}, "text": "Now look at the charges against the enslaved Africans in Source 1.\n", "start_char_idx": 517, "end_char_idx": 584, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "bcdc7243-9dd5-445b-b2b7-358c669c8893": {"__data__": {"id_": "bcdc7243-9dd5-445b-b2b7-358c669c8893", "embedding": null, "metadata": {"window": "Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n", "original_text": "\u2022 What have most of these enslaved people been charged with?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "01fe664f-3b2a-46d1-b8bb-7d45779f69f6", "node_type": "1", "metadata": {"window": "\u2022 Dominica had been a French possession until 1763. Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. ", "original_text": "Now look at the charges against the enslaved Africans in Source 1.\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "b0b670cecd0e66d73d1c25dd74b8a1533da4d9bfa191d8fe399d432e2ca61746", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "966263e0-1f7b-4cc1-8815-c3f548f11def", "node_type": "1", "metadata": {"window": "2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. ", "original_text": "\u2022 Dominica is quite a small island. "}, "hash": "ba22591b56c16eeccc0f7b84f9503b43f9426024f719629491b876605014853b", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 What have most of these enslaved people been charged with?\n", "start_char_idx": 584, "end_char_idx": 645, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "966263e0-1f7b-4cc1-8815-c3f548f11def": {"__data__": {"id_": "966263e0-1f7b-4cc1-8815-c3f548f11def", "embedding": null, "metadata": {"window": "2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. ", "original_text": "\u2022 Dominica is quite a small island. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "bcdc7243-9dd5-445b-b2b7-358c669c8893", "node_type": "1", "metadata": {"window": "Which of the slaves have French \nnames?\n 2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n", "original_text": "\u2022 What have most of these enslaved people been charged with?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "8027f99d45c14e41bcac62bd186097937ff411aff05c9e5a7033cfd0d58e665a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "df0da444-94fc-4ca2-99eb-20c90d355490", "node_type": "1", "metadata": {"window": "Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n", "original_text": "When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. "}, "hash": "9936f2fa602f3bd3c0df1d80082fd5cbdd3be5261ad3140e51a62987b90599f1", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 Dominica is quite a small island. ", "start_char_idx": 645, "end_char_idx": 681, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "df0da444-94fc-4ca2-99eb-20c90d355490": {"__data__": {"id_": "df0da444-94fc-4ca2-99eb-20c90d355490", "embedding": null, "metadata": {"window": "Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n", "original_text": "When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "966263e0-1f7b-4cc1-8815-c3f548f11def", "node_type": "1", "metadata": {"window": "2. Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. ", "original_text": "\u2022 Dominica is quite a small island. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "077d87a5950496446f7a3dc9e332f37951def6206cac4f5c8a6755315b4298f3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "adb544e2-adb7-4b83-a8aa-cefb1f2db533", "node_type": "1", "metadata": {"window": "\u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? ", "original_text": "What does this document tell you about \nthe scale of resistance by runaways?\n"}, "hash": "b87f0064b1940c3aff0c252ea2a88f5ff6b3bd3f2e05dc0f42f2ce16d3918019", "class_name": "RelatedNodeInfo"}}, "text": "When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. ", "start_char_idx": 681, "end_char_idx": 786, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "adb544e2-adb7-4b83-a8aa-cefb1f2db533": {"__data__": {"id_": "adb544e2-adb7-4b83-a8aa-cefb1f2db533", "embedding": null, "metadata": {"window": "\u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? ", "original_text": "What does this document tell you about \nthe scale of resistance by runaways?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "df0da444-94fc-4ca2-99eb-20c90d355490", "node_type": "1", "metadata": {"window": "Now look at the charges against the enslaved Africans in Source 1.\n \u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n", "original_text": "When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "de32de040b882f95a1f8f9bb99e567aaaaecb5dd9a4da0bd18550073635eaba8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "100c5e3f-39bf-4e91-8a77-6be51ab4a2a1", "node_type": "1", "metadata": {"window": "\u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? ", "original_text": "3. "}, "hash": "020cfdfbb27c7106fa07eac971d840d1022185c126a7c52f5aeb1fc97a3a13b7", "class_name": "RelatedNodeInfo"}}, "text": "What does this document tell you about \nthe scale of resistance by runaways?\n", "start_char_idx": 786, "end_char_idx": 863, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "100c5e3f-39bf-4e91-8a77-6be51ab4a2a1": {"__data__": {"id_": "100c5e3f-39bf-4e91-8a77-6be51ab4a2a1", "embedding": null, "metadata": {"window": "\u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? ", "original_text": "3. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "adb544e2-adb7-4b83-a8aa-cefb1f2db533", "node_type": "1", "metadata": {"window": "\u2022 What have most of these enslaved people been charged with?\n \u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? ", "original_text": "What does this document tell you about \nthe scale of resistance by runaways?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "82475dd700d83ce17f557a46295b6e56a8d852866f9f2687ec607653ad4e4a28", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5f79533d-d369-490f-9016-5149f141ebc5", "node_type": "1", "metadata": {"window": "When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n", "original_text": "There are 13 enslaved Africans listed in the document.\n"}, "hash": "7df6a39afadabdff6cd1166c8037bd522d5efad78867efca2643e3daebf6b67a", "class_name": "RelatedNodeInfo"}}, "text": "3. ", "start_char_idx": 471, "end_char_idx": 474, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5f79533d-d369-490f-9016-5149f141ebc5": {"__data__": {"id_": "5f79533d-d369-490f-9016-5149f141ebc5", "embedding": null, "metadata": {"window": "When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n", "original_text": "There are 13 enslaved Africans listed in the document.\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "100c5e3f-39bf-4e91-8a77-6be51ab4a2a1", "node_type": "1", "metadata": {"window": "\u2022 Dominica is quite a small island. When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? ", "original_text": "3. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "2dc64656476e178f7db7fa5d7e62caa387d76bcd116140c80f3a1daf43b69da4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "05c844be-7464-4e7c-913c-5ffbce72216d", "node_type": "1", "metadata": {"window": "What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n", "original_text": "\u2022 How many were hanged? "}, "hash": "bbfdc254c5fd3260b7ca63b7a68cab2fefb4a63cd0b39d42f258737d02e6bff6", "class_name": "RelatedNodeInfo"}}, "text": "There are 13 enslaved Africans listed in the document.\n", "start_char_idx": 866, "end_char_idx": 921, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "05c844be-7464-4e7c-913c-5ffbce72216d": {"__data__": {"id_": "05c844be-7464-4e7c-913c-5ffbce72216d", "embedding": null, "metadata": {"window": "What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n", "original_text": "\u2022 How many were hanged? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5f79533d-d369-490f-9016-5149f141ebc5", "node_type": "1", "metadata": {"window": "When the first census was carried out there in 1834 the \npopulation (whites and blacks) was only 14,000. What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n", "original_text": "There are 13 enslaved Africans listed in the document.\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "1181596d1f4d2057b795f0ec44d98eaa634d13620a497314e4ffd154b42ba939", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e1e2da1d-700d-405d-8f91-cf85a3d0298c", "node_type": "1", "metadata": {"window": "3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n", "original_text": "How many whipped? "}, "hash": "160a0ddb35b86c0a4db3de5aaf9c0d23ad28f2c56d48c7cda7cf41bb256b2662", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 How many were hanged? ", "start_char_idx": 921, "end_char_idx": 945, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e1e2da1d-700d-405d-8f91-cf85a3d0298c": {"__data__": {"id_": "e1e2da1d-700d-405d-8f91-cf85a3d0298c", "embedding": null, "metadata": {"window": "3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n", "original_text": "How many whipped? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "05c844be-7464-4e7c-913c-5ffbce72216d", "node_type": "1", "metadata": {"window": "What does this document tell you about \nthe scale of resistance by runaways?\n 3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n", "original_text": "\u2022 How many were hanged? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "886fb8bb1a8eecd36bedc19933c8a6199d723a1e7ca9ee455a8b873faccd4db1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "77272b59-5423-4d64-9966-838372f1baf0", "node_type": "1", "metadata": {"window": "There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n", "original_text": "How many discharged?\n"}, "hash": "cba7e6e025db5422886ea0037987140ce8ebb02b9054d7e0df558ebd97cf548f", "class_name": "RelatedNodeInfo"}}, "text": "How many whipped? ", "start_char_idx": 945, "end_char_idx": 963, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "77272b59-5423-4d64-9966-838372f1baf0": {"__data__": {"id_": "77272b59-5423-4d64-9966-838372f1baf0", "embedding": null, "metadata": {"window": "There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n", "original_text": "How many discharged?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e1e2da1d-700d-405d-8f91-cf85a3d0298c", "node_type": "1", "metadata": {"window": "3. There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n", "original_text": "How many whipped? ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "ee68b11193f2f7434a0697437596d4dbec51e39fba4353b677a1f8bbc24f0c38", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2e3ae5c2-1359-477f-8d03-f94011102462", "node_type": "1", "metadata": {"window": "\u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n", "original_text": "\u2022 What happened to Pierre (28 January)?\n"}, "hash": "b07e9ad2323c39397a85edbcd08d9892a47f1c9e176a589b4134229f12bb18f5", "class_name": "RelatedNodeInfo"}}, "text": "How many discharged?\n", "start_char_idx": 963, "end_char_idx": 984, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2e3ae5c2-1359-477f-8d03-f94011102462": {"__data__": {"id_": "2e3ae5c2-1359-477f-8d03-f94011102462", "embedding": null, "metadata": {"window": "\u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n", "original_text": "\u2022 What happened to Pierre (28 January)?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "77272b59-5423-4d64-9966-838372f1baf0", "node_type": "1", "metadata": {"window": "There are 13 enslaved Africans listed in the document.\n \u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n", "original_text": "How many discharged?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "108abe8e63ef8c042b1b536c75df39ad10edbebed6313672560b4e19d62b9948", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e2638c82-3b0f-4b13-bb08-7dda091f3742", "node_type": "1", "metadata": {"window": "How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. ", "original_text": "\u2022 Why do you think the sentences handed out were so ferocious?\n"}, "hash": "16a10faba9aa1ec69c1d1144676f00a651f89c606227b0de1b2831bc2b700941", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 What happened to Pierre (28 January)?\n", "start_char_idx": 984, "end_char_idx": 1024, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e2638c82-3b0f-4b13-bb08-7dda091f3742": {"__data__": {"id_": "e2638c82-3b0f-4b13-bb08-7dda091f3742", "embedding": null, "metadata": {"window": "How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. ", "original_text": "\u2022 Why do you think the sentences handed out were so ferocious?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2e3ae5c2-1359-477f-8d03-f94011102462", "node_type": "1", "metadata": {"window": "\u2022 How many were hanged? How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n", "original_text": "\u2022 What happened to Pierre (28 January)?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "b822c488070552c772382202f987220386bc64b80f1310291b30dfb9302c0394", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "490925cf-dc04-479d-9867-e2198bb474a1", "node_type": "1", "metadata": {"window": "How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "\u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n"}, "hash": "8982c922402c0c29def8fc22515e2ad5bc39599cafcb1ada97cb285ba0276747", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 Why do you think the sentences handed out were so ferocious?\n", "start_char_idx": 1024, "end_char_idx": 1087, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "490925cf-dc04-479d-9867-e2198bb474a1": {"__data__": {"id_": "490925cf-dc04-479d-9867-e2198bb474a1", "embedding": null, "metadata": {"window": "How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "\u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e2638c82-3b0f-4b13-bb08-7dda091f3742", "node_type": "1", "metadata": {"window": "How many whipped? How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. ", "original_text": "\u2022 Why do you think the sentences handed out were so ferocious?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "2cc36db796a77fc17e6d3365a82a138f007432d538b3ad309a823def57fe4556", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b33fb72e-9070-4eae-a7b0-c567c9f6ea22", "node_type": "1", "metadata": {"window": "\u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "\u2022 What would you say about it if you were a defender of slavery?\n"}, "hash": "3d4de57c4d55110abc637bfd393ae865ac82045f485c728bf799d9e71c5639f1", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n", "start_char_idx": 1087, "end_char_idx": 1208, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b33fb72e-9070-4eae-a7b0-c567c9f6ea22": {"__data__": {"id_": "b33fb72e-9070-4eae-a7b0-c567c9f6ea22", "embedding": null, "metadata": {"window": "\u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "\u2022 What would you say about it if you were a defender of slavery?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "490925cf-dc04-479d-9867-e2198bb474a1", "node_type": "1", "metadata": {"window": "How many discharged?\n \u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "\u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "7c60974c896afbed455d40151375b873520ee1577b9e2a9e9d56773e941c8f82", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "49b8caf2-6a12-493b-ad4c-0f93bcd226dd", "node_type": "1", "metadata": {"window": "\u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "4. "}, "hash": "a77c25274dbf263f845bdda761d30a9a68cab7dff05646ae02ad6897306c377c", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 What would you say about it if you were a defender of slavery?\n", "start_char_idx": 1208, "end_char_idx": 1273, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "49b8caf2-6a12-493b-ad4c-0f93bcd226dd": {"__data__": {"id_": "49b8caf2-6a12-493b-ad4c-0f93bcd226dd", "embedding": null, "metadata": {"window": "\u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "4. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b33fb72e-9070-4eae-a7b0-c567c9f6ea22", "node_type": "1", "metadata": {"window": "\u2022 What happened to Pierre (28 January)?\n \u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "\u2022 What would you say about it if you were a defender of slavery?\n", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "329562f538de533ac04930a0491a1141cbe7f9c0f8b9c6be2fe3b9eebefb67ae", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "95c6c4a4-fa11-42d8-9f26-8a79039a5c52", "node_type": "1", "metadata": {"window": "\u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "1096b4d01be951ef46592c703b15c34bf3c3ff03b11b14cafaa9463df31d9794", "class_name": "RelatedNodeInfo"}}, "text": "4. ", "start_char_idx": 1273, "end_char_idx": 1276, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "95c6c4a4-fa11-42d8-9f26-8a79039a5c52": {"__data__": {"id_": "95c6c4a4-fa11-42d8-9f26-8a79039a5c52", "embedding": null, "metadata": {"window": "\u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1", "node_type": "4", "metadata": {"page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "49b8caf2-6a12-493b-ad4c-0f93bcd226dd", "node_type": "1", "metadata": {"window": "\u2022 Why do you think the sentences handed out were so ferocious?\n \u2022 What would you say about this document if you were a British abolitionist working for \nthe total abolition of slavery?\n \u2022 What would you say about it if you were a defender of slavery?\n 4. Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "4. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "hash": "a08acd50b4a9337bf0ce4e1c3967ceff910e773626c4c5321f5514d57ba48476", "class_name": "RelatedNodeInfo"}}, "text": "Look at Source 2a, b and c.Tasks\n1 https://www.youtube.com/watch?v=UzZb5rMvy4QSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 1276, "end_char_idx": 1429, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7bd2d852-2912-49ec-a0a2-20b8af746cd7": {"__data__": {"id_": "7bd2d852-2912-49ec-a0a2-20b8af746cd7", "embedding": null, "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n", "original_text": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ce14dbf8-5e64-4a1c-ab0c-fd33f4c88197", "node_type": "1", "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. ", "original_text": "These \nphotographs were taken about 1868, off the east coast of Africa. "}, "hash": "afab1e21efa4f8be6d2e92883584fba7165c0bd29d8d24b1c6ad761892fa5c1c", "class_name": "RelatedNodeInfo"}}, "text": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. ", "start_char_idx": 0, "end_char_idx": 165, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ce14dbf8-5e64-4a1c-ab0c-fd33f4c88197": {"__data__": {"id_": "ce14dbf8-5e64-4a1c-ab0c-fd33f4c88197", "embedding": null, "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. ", "original_text": "These \nphotographs were taken about 1868, off the east coast of Africa. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7bd2d852-2912-49ec-a0a2-20b8af746cd7", "node_type": "1", "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n", "original_text": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "18e8e98407c8f16e6aaa334e101951163ad97d3efe49b41269a3b78b2e61809f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "611a01a0-1846-4956-afa8-1721c7e159c6", "node_type": "1", "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. ", "original_text": "They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. "}, "hash": "5fa70f93ca02c5d5bd609a1a76847b68e9b0cdf6edd573a07f6119987b100d59", "class_name": "RelatedNodeInfo"}}, "text": "These \nphotographs were taken about 1868, off the east coast of Africa. ", "start_char_idx": 165, "end_char_idx": 237, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "611a01a0-1846-4956-afa8-1721c7e159c6": {"__data__": {"id_": "611a01a0-1846-4956-afa8-1721c7e159c6", "embedding": null, "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. ", "original_text": "They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ce14dbf8-5e64-4a1c-ab0c-fd33f4c88197", "node_type": "1", "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. ", "original_text": "These \nphotographs were taken about 1868, off the east coast of Africa. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "3eb3ef05a00318bb96c797a29ac09dc016034ae41349931ff24dbd7066420b02", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "dc6ba06b-d8da-41cc-9bfe-2278eea4e56a", "node_type": "1", "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n", "original_text": "Zanzibar did not abolish slavery until 1897.\n"}, "hash": "a19c4697f94cfda3b957f11f86109203d2a826a9a6bc0d42e9ac3bd74ecfcb89", "class_name": "RelatedNodeInfo"}}, "text": "They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. ", "start_char_idx": 237, "end_char_idx": 368, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "dc6ba06b-d8da-41cc-9bfe-2278eea4e56a": {"__data__": {"id_": "dc6ba06b-d8da-41cc-9bfe-2278eea4e56a", "embedding": null, "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n", "original_text": "Zanzibar did not abolish slavery until 1897.\n", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "611a01a0-1846-4956-afa8-1721c7e159c6", "node_type": "1", "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. ", "original_text": "They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "3716061964c4b5f6af512bd66715130734b2396248b8651e1cb04606f4748c3e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "93c1fbbd-2699-4ae1-9962-68a0659657e4", "node_type": "1", "metadata": {"window": "These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. ", "original_text": "\u2022 We know very little about these pictures. "}, "hash": "040b8c151e3a3382093b52b7557966fc9a5de352727833911f492980d2f0a99b", "class_name": "RelatedNodeInfo"}}, "text": "Zanzibar did not abolish slavery until 1897.\n", "start_char_idx": 368, "end_char_idx": 413, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "93c1fbbd-2699-4ae1-9962-68a0659657e4": {"__data__": {"id_": "93c1fbbd-2699-4ae1-9962-68a0659657e4", "embedding": null, "metadata": {"window": "These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. ", "original_text": "\u2022 We know very little about these pictures. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "dc6ba06b-d8da-41cc-9bfe-2278eea4e56a", "node_type": "1", "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n", "original_text": "Zanzibar did not abolish slavery until 1897.\n", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "90a008adf8ae22855df3d111b060d60a7b802980d1a64da565e094abb21450dd", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8f813959-7893-486a-8d03-714339c68ce4", "node_type": "1", "metadata": {"window": "They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n", "original_text": "Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. "}, "hash": "5df6fe30b1ec912449c52adf17fc574491ca51990da717d010ccffb030d2c781", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 We know very little about these pictures. ", "start_char_idx": 413, "end_char_idx": 457, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8f813959-7893-486a-8d03-714339c68ce4": {"__data__": {"id_": "8f813959-7893-486a-8d03-714339c68ce4", "embedding": null, "metadata": {"window": "They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n", "original_text": "Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "93c1fbbd-2699-4ae1-9962-68a0659657e4", "node_type": "1", "metadata": {"window": "These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. ", "original_text": "\u2022 We know very little about these pictures. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "f8d6db3e149d187053ef4c249d7effa4514429101a242c6c0546e19bd2132d5d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f05a433d-ed66-4ed2-833c-2883a8db685a", "node_type": "1", "metadata": {"window": "Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807.", "original_text": "How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n"}, "hash": "3a211439c53ccd9f12c812bf05b778184a60b2eaf9157d32e76bfdcc49b2a0c4", "class_name": "RelatedNodeInfo"}}, "text": "Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. ", "start_char_idx": 457, "end_char_idx": 704, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f05a433d-ed66-4ed2-833c-2883a8db685a": {"__data__": {"id_": "f05a433d-ed66-4ed2-833c-2883a8db685a", "embedding": null, "metadata": {"window": "Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807.", "original_text": "How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8f813959-7893-486a-8d03-714339c68ce4", "node_type": "1", "metadata": {"window": "They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n", "original_text": "Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "cd0dcaacfb6502f4490696b7bcc7cebf7d856fddd51c76212bf4aff0acab93c6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "28408e6d-fbfd-45e2-bc90-cb420df61123", "node_type": "1", "metadata": {"window": "\u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "\u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. "}, "hash": "24bf8a25099617942ff7e28b17e707cde18c5d8113492577f9c807c8fbdf1921", "class_name": "RelatedNodeInfo"}}, "text": "How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n", "start_char_idx": 704, "end_char_idx": 795, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "28408e6d-fbfd-45e2-bc90-cb420df61123": {"__data__": {"id_": "28408e6d-fbfd-45e2-bc90-cb420df61123", "embedding": null, "metadata": {"window": "\u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "\u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f05a433d-ed66-4ed2-833c-2883a8db685a", "node_type": "1", "metadata": {"window": "Zanzibar did not abolish slavery until 1897.\n \u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807.", "original_text": "How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "56323480fe768b48f8e0f6fe8720bde1a532252f3ca12cbc774e82e20afb0c1d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6a5bd365-07fd-49c3-bbee-d97f50e051da", "node_type": "1", "metadata": {"window": "Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n"}, "hash": "6d849da921008cf1bfc85672a69eab8ddac755b7b8832085d57ef3a9334e0e9f", "class_name": "RelatedNodeInfo"}}, "text": "\u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. ", "start_char_idx": 795, "end_char_idx": 941, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6a5bd365-07fd-49c3-bbee-d97f50e051da": {"__data__": {"id_": "6a5bd365-07fd-49c3-bbee-d97f50e051da", "embedding": null, "metadata": {"window": "Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "28408e6d-fbfd-45e2-bc90-cb420df61123", "node_type": "1", "metadata": {"window": "\u2022 We know very little about these pictures. Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "\u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "3c4824b6be9190343060bdf4cbe8935d5ef78e25cd677cd2963766916009b551", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2ab9e166-9379-493f-928b-d89ae364ae9b", "node_type": "1", "metadata": {"window": "How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "(Remember that Britain had been a large slave trading nation until 1807."}, "hash": "fb7389142eb22768b9ecac44f21c955010d7e50ab4713af0c5cee17fe2776521", "class_name": "RelatedNodeInfo"}}, "text": "Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n", "start_char_idx": 941, "end_char_idx": 1055, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2ab9e166-9379-493f-928b-d89ae364ae9b": {"__data__": {"id_": "2ab9e166-9379-493f-928b-d89ae364ae9b", "embedding": null, "metadata": {"window": "How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "(Remember that Britain had been a large slave trading nation until 1807.", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6a5bd365-07fd-49c3-bbee-d97f50e051da", "node_type": "1", "metadata": {"window": "Use the clues you can pick out from the \nphotographs to suggest what they actually show\n\u2022 Write a brief description of the enslaved people \u2013 age, numbers, clothing, other \nconditions\n\u2022 These photographs were taken about 1869, in the Indian Ocean. How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "373877023361fa1a68eb158e38361a5eb899cec02948dcbe57e6d55baf9dde7b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3a4ba3e0-e605-466a-9393-c37ae9f6f854", "node_type": "1", "metadata": {"window": "\u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": ")TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "1698e5d658bde8b627945def663a87901001d01b4c65c419002f0142e4026834", "class_name": "RelatedNodeInfo"}}, "text": "(Remember that Britain had been a large slave trading nation until 1807.", "start_char_idx": 1055, "end_char_idx": 1127, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3a4ba3e0-e605-466a-9393-c37ae9f6f854": {"__data__": {"id_": "3a4ba3e0-e605-466a-9393-c37ae9f6f854", "embedding": null, "metadata": {"window": "\u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": ")TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61", "node_type": "4", "metadata": {"page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2ab9e166-9379-493f-928b-d89ae364ae9b", "node_type": "1", "metadata": {"window": "How useful are they as \nevidence of the Atlantic slave trade before its abolition in 1807?\n \u2022 The ship on which these photographs were taken was the HMS Daphne, a British naval \nship used to prevent the transportation of enslaved people. Do you think Britain had \nthe right to act as the world\u2019s police, stopping and searching ships of other nations? \n (Remember that Britain had been a large slave trading nation until 1807. )TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "(Remember that Britain had been a large slave trading nation until 1807.", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "hash": "4838b459deaa668d1395f3e2e6e98f2e692193816551bad6618107c6bc92b9f8", "class_name": "RelatedNodeInfo"}}, "text": ")TasksSlavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 1127, "end_char_idx": 1208, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "58bd1a0c-4caf-4aab-97b9-d69cdaf9170e": {"__data__": {"id_": "58bd1a0c-4caf-4aab-97b9-d69cdaf9170e", "embedding": null, "metadata": {"window": "Source 1: Court records from Dominica, a British colony in the \nLeeward Islands, January 1814 . Catalogue Ref: CO 71/51Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 1: Court records from Dominica, a British colony in the \nLeeward Islands, January 1814 . ", "page_label": "11", "file_name": "slavery.pdf", "doc_id": "30351e02-9445-431c-938b-2b002ed4735e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "30351e02-9445-431c-938b-2b002ed4735e", "node_type": "4", "metadata": {"page_label": "11", "file_name": "slavery.pdf", "doc_id": "30351e02-9445-431c-938b-2b002ed4735e"}, "hash": "b8b7aa9c0fbf91ab00ed4690f69b63edb7f0ccf393bec1a7fffd927911eb2ba2", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "1af5f605-ca46-404d-8dc5-fc1b82de88e6", "node_type": "1", "metadata": {"window": "Source 1: Court records from Dominica, a British colony in the \nLeeward Islands, January 1814 . Catalogue Ref: CO 71/51Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Catalogue Ref: CO 71/51Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "45e0ae72f5f7e997378a082375531d58cc796545e04eb5c47b2b105a42e462dc", "class_name": "RelatedNodeInfo"}}, "text": "Source 1: Court records from Dominica, a British colony in the \nLeeward Islands, January 1814 . ", "start_char_idx": 0, "end_char_idx": 96, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "1af5f605-ca46-404d-8dc5-fc1b82de88e6": {"__data__": {"id_": "1af5f605-ca46-404d-8dc5-fc1b82de88e6", "embedding": null, "metadata": {"window": "Source 1: Court records from Dominica, a British colony in the \nLeeward Islands, January 1814 . Catalogue Ref: CO 71/51Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Catalogue Ref: CO 71/51Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "11", "file_name": "slavery.pdf", "doc_id": "30351e02-9445-431c-938b-2b002ed4735e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "30351e02-9445-431c-938b-2b002ed4735e", "node_type": "4", "metadata": {"page_label": "11", "file_name": "slavery.pdf", "doc_id": "30351e02-9445-431c-938b-2b002ed4735e"}, "hash": "b8b7aa9c0fbf91ab00ed4690f69b63edb7f0ccf393bec1a7fffd927911eb2ba2", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "58bd1a0c-4caf-4aab-97b9-d69cdaf9170e", "node_type": "1", "metadata": {"window": "Source 1: Court records from Dominica, a British colony in the \nLeeward Islands, January 1814 . Catalogue Ref: CO 71/51Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 1: Court records from Dominica, a British colony in the \nLeeward Islands, January 1814 . ", "page_label": "11", "file_name": "slavery.pdf", "doc_id": "30351e02-9445-431c-938b-2b002ed4735e"}, "hash": "bede8fa97a27cb58b76c32a02798b983401f65b7bec838eb6ce31c46c1d3f018", "class_name": "RelatedNodeInfo"}}, "text": "Catalogue Ref: CO 71/51Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 96, "end_char_idx": 194, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0d9629cf-7213-4062-b3e8-7dbdfc05c1e6": {"__data__": {"id_": "0d9629cf-7213-4062-b3e8-7dbdfc05c1e6", "embedding": null, "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. ", "page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d", "node_type": "4", "metadata": {"page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "hash": "7abd0d51200b4a7168f72d83c8d6e0d2247155bc8081de0a70a34553db59b004", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7d80ba2f-ba44-49e2-97c8-68cea22d2916", "node_type": "1", "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. "}, "hash": "14cc18c237f4db71ca8fd9c7730c1613bc784c0260d4360a541f5dc8901d36ac", "class_name": "RelatedNodeInfo"}}, "text": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. ", "start_char_idx": 0, "end_char_idx": 235, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7d80ba2f-ba44-49e2-97c8-68cea22d2916": {"__data__": {"id_": "7d80ba2f-ba44-49e2-97c8-68cea22d2916", "embedding": null, "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. ", "page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d", "node_type": "4", "metadata": {"page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "hash": "7abd0d51200b4a7168f72d83c8d6e0d2247155bc8081de0a70a34553db59b004", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0d9629cf-7213-4062-b3e8-7dbdfc05c1e6", "node_type": "1", "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. ", "page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "hash": "2e48ca1910eac25076ebe549102bc0ab1e4d3fd528f1b28f41841725f3941b01", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "bd2cf428-3bc4-4670-a299-bf780c72bea3", "node_type": "1", "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Head cut off & put \non a pole. "}, "hash": "7994e18554af439150c7407de55389b12905986f69dc8387356e87a3b60cf22b", "class_name": "RelatedNodeInfo"}}, "text": "Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. ", "start_char_idx": 235, "end_char_idx": 438, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "bd2cf428-3bc4-4670-a299-bf780c72bea3": {"__data__": {"id_": "bd2cf428-3bc4-4670-a299-bf780c72bea3", "embedding": null, "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Head cut off & put \non a pole. ", "page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d", "node_type": "4", "metadata": {"page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "hash": "7abd0d51200b4a7168f72d83c8d6e0d2247155bc8081de0a70a34553db59b004", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7d80ba2f-ba44-49e2-97c8-68cea22d2916", "node_type": "1", "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. ", "page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "hash": "b063a541759d5814ab052fe3d20969fa26a2e0f3797a5c91a6e2170ea5be5e63", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8b20bc6c-3dfb-4ebc-94c8-25ae7b3267f6", "node_type": "1", "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "dd5cb8f35e07886e9b14c4994d1b448234a1817a6508f9308347d797a2507cc8", "class_name": "RelatedNodeInfo"}}, "text": "Head cut off & put \non a pole. ", "start_char_idx": 438, "end_char_idx": 469, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8b20bc6c-3dfb-4ebc-94c8-25ae7b3267f6": {"__data__": {"id_": "8b20bc6c-3dfb-4ebc-94c8-25ae7b3267f6", "embedding": null, "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d", "node_type": "4", "metadata": {"page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "hash": "7abd0d51200b4a7168f72d83c8d6e0d2247155bc8081de0a70a34553db59b004", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "bd2cf428-3bc4-4670-a299-bf780c72bea3", "node_type": "1", "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Head cut off & put \non a pole. ", "page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "hash": "b05ca88a4aee4b0340c53c2b304232f6244b4f676dd65f1c7a7503739dd1dffd", "class_name": "RelatedNodeInfo"}}, "text": "Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 469, "end_char_idx": 1568, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e3c390e3-85d3-4c69-9c96-066b77f5a79a": {"__data__": {"id_": "e3c390e3-85d3-4c69-9c96-066b77f5a79a", "embedding": null, "metadata": {"window": "Source 2a: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 2a: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "page_label": "13", "file_name": "slavery.pdf", "doc_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944", "node_type": "4", "metadata": {"page_label": "13", "file_name": "slavery.pdf", "doc_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944"}, "hash": "1057bb7f603993abad2c2ca50b2dcb3cbedd3f28dd8fce9b60855db1359afdee", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "332a3a26-4225-4fc5-a916-757c9d09546c", "node_type": "1", "metadata": {"window": "Source 2a: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "858754e65b6b0cf0b8429654f7ced2467ff6d5033ab62ef440272a7fc625e08f", "class_name": "RelatedNodeInfo"}}, "text": "Source 2a: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "start_char_idx": 0, "end_char_idx": 95, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "332a3a26-4225-4fc5-a916-757c9d09546c": {"__data__": {"id_": "332a3a26-4225-4fc5-a916-757c9d09546c", "embedding": null, "metadata": {"window": "Source 2a: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "13", "file_name": "slavery.pdf", "doc_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944", "node_type": "4", "metadata": {"page_label": "13", "file_name": "slavery.pdf", "doc_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944"}, "hash": "1057bb7f603993abad2c2ca50b2dcb3cbedd3f28dd8fce9b60855db1359afdee", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e3c390e3-85d3-4c69-9c96-066b77f5a79a", "node_type": "1", "metadata": {"window": "Source 2a: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 2a: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "page_label": "13", "file_name": "slavery.pdf", "doc_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944"}, "hash": "adb4cc5a403ae850ee709487ec7720ed0be9a4effd8de2d3930dc39af3a7398c", "class_name": "RelatedNodeInfo"}}, "text": "Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 95, "end_char_idx": 195, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e42821bf-4fee-435b-a441-6e711f93afa8": {"__data__": {"id_": "e42821bf-4fee-435b-a441-6e711f93afa8", "embedding": null, "metadata": {"window": "Source 2b: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 2b: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "page_label": "14", "file_name": "slavery.pdf", "doc_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53", "node_type": "4", "metadata": {"page_label": "14", "file_name": "slavery.pdf", "doc_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53"}, "hash": "4218310832865c7d1b174248f3c837481c38fff12ae64704852ec919001c1290", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "fba66f0c-582c-4727-a940-6fe6b399d0e8", "node_type": "1", "metadata": {"window": "Source 2b: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "1f1db6b8bff469d835609bb659aa0ab9d3ac3b53eb7bf0abc01a761775345224", "class_name": "RelatedNodeInfo"}}, "text": "Source 2b: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "start_char_idx": 0, "end_char_idx": 95, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "fba66f0c-582c-4727-a940-6fe6b399d0e8": {"__data__": {"id_": "fba66f0c-582c-4727-a940-6fe6b399d0e8", "embedding": null, "metadata": {"window": "Source 2b: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "14", "file_name": "slavery.pdf", "doc_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53", "node_type": "4", "metadata": {"page_label": "14", "file_name": "slavery.pdf", "doc_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53"}, "hash": "4218310832865c7d1b174248f3c837481c38fff12ae64704852ec919001c1290", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e42821bf-4fee-435b-a441-6e711f93afa8", "node_type": "1", "metadata": {"window": "Source 2b: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 2b: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "page_label": "14", "file_name": "slavery.pdf", "doc_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53"}, "hash": "c9af18f24be5da74ac0cb5c291849f213838498a0aad0312be784771ccea5dad", "class_name": "RelatedNodeInfo"}}, "text": "Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 95, "end_char_idx": 195, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0cb107c3-ba56-4017-bc47-5a0b3b692df2": {"__data__": {"id_": "0cb107c3-ba56-4017-bc47-5a0b3b692df2", "embedding": null, "metadata": {"window": "Source 2c: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 2c: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "page_label": "15", "file_name": "slavery.pdf", "doc_id": "d8135eba-3ae8-414d-b04b-af55d8891a72"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d8135eba-3ae8-414d-b04b-af55d8891a72", "node_type": "4", "metadata": {"page_label": "15", "file_name": "slavery.pdf", "doc_id": "d8135eba-3ae8-414d-b04b-af55d8891a72"}, "hash": "322f1544a732019b830961650203185d6414ab73018226a6bbbac06398a32ca8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3b079652-a22e-4cea-aa9a-5405b1f81807", "node_type": "1", "metadata": {"window": "Source 2c: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?"}, "hash": "2b62082007667634eb7e6171dd7cf17bc76cfd36d3beec4be46a47ab02744fd6", "class_name": "RelatedNodeInfo"}}, "text": "Source 2c: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "start_char_idx": 0, "end_char_idx": 95, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3b079652-a22e-4cea-aa9a-5405b1f81807": {"__data__": {"id_": "3b079652-a22e-4cea-aa9a-5405b1f81807", "embedding": null, "metadata": {"window": "Source 2c: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "15", "file_name": "slavery.pdf", "doc_id": "d8135eba-3ae8-414d-b04b-af55d8891a72"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d8135eba-3ae8-414d-b04b-af55d8891a72", "node_type": "4", "metadata": {"page_label": "15", "file_name": "slavery.pdf", "doc_id": "d8135eba-3ae8-414d-b04b-af55d8891a72"}, "hash": "322f1544a732019b830961650203185d6414ab73018226a6bbbac06398a32ca8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0cb107c3-ba56-4017-bc47-5a0b3b692df2", "node_type": "1", "metadata": {"window": "Source 2c: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 2c: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "page_label": "15", "file_name": "slavery.pdf", "doc_id": "d8135eba-3ae8-414d-b04b-af55d8891a72"}, "hash": "8d10ec8404907747b8cddb19e8e960fbf7b3ce2b5c5ace69e4a9a5757c28d675", "class_name": "RelatedNodeInfo"}}, "text": "Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "start_char_idx": 95, "end_char_idx": 195, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ffada7bd-ed77-47e1-b51b-b578bcbabf71": {"__data__": {"id_": "ffada7bd-ed77-47e1-b51b-b578bcbabf71", "embedding": null, "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n", "original_text": "Why do our hyperlinks come with footnotes?\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e2f56072-fc39-4e1a-bee3-73eede268aa6", "node_type": "1", "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n", "original_text": "Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. "}, "hash": "a8be495a5aaf8c201809364e742af8f913d73bdd51a586d703580f79fd138ac0", "class_name": "RelatedNodeInfo"}}, "text": "Why do our hyperlinks come with footnotes?\n", "start_char_idx": 0, "end_char_idx": 43, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e2f56072-fc39-4e1a-bee3-73eede268aa6": {"__data__": {"id_": "e2f56072-fc39-4e1a-bee3-73eede268aa6", "embedding": null, "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n", "original_text": "Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. ", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ffada7bd-ed77-47e1-b51b-b578bcbabf71", "node_type": "1", "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n", "original_text": "Why do our hyperlinks come with footnotes?\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "54bed24c53d9a67368bc888e05e62163b274acbf7afaeaddb94567e637458844", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9d56e7de-e17b-4ada-a431-edb219071f49", "node_type": "1", "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n", "original_text": "We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n"}, "hash": "cec5ea359c934a2b66b63de3ef6eb741eb6f0fedb67379fdfd2da1949f10413a", "class_name": "RelatedNodeInfo"}}, "text": "Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. ", "start_char_idx": 43, "end_char_idx": 168, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9d56e7de-e17b-4ada-a431-edb219071f49": {"__data__": {"id_": "9d56e7de-e17b-4ada-a431-edb219071f49", "embedding": null, "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n", "original_text": "We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e2f56072-fc39-4e1a-bee3-73eede268aa6", "node_type": "1", "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n", "original_text": "Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. ", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "57e9c2165fbad25a93b8636f794faa2828413d582be651379daaa9cea98c0523", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "43a19927-4a33-4a89-83fd-ad58d585938e", "node_type": "1", "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n", "original_text": "Did you know? \n"}, "hash": "3f66af40b7883f9cb389eb0a60072bb1341ab4bb5e5e0c667501e3f420cdcb49", "class_name": "RelatedNodeInfo"}}, "text": "We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n", "start_char_idx": 168, "end_char_idx": 320, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "43a19927-4a33-4a89-83fd-ad58d585938e": {"__data__": {"id_": "43a19927-4a33-4a89-83fd-ad58d585938e", "embedding": null, "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n", "original_text": "Did you know? \n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9d56e7de-e17b-4ada-a431-edb219071f49", "node_type": "1", "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n", "original_text": "We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "fb9f1f2ec4d473a6ae2542d9f586015ad26e1372410f6d23247e1f7238457e84", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "200e4c3e-0cfb-43a0-809f-1ce8197f0fec", "node_type": "1", "metadata": {"window": "Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. ", "original_text": "The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n"}, "hash": "db326fc0a2e137dfca8bb7f0e84811a63df200633fdd0343193b1bb5d0832ded", "class_name": "RelatedNodeInfo"}}, "text": "Did you know? \n", "start_char_idx": 320, "end_char_idx": 335, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "200e4c3e-0cfb-43a0-809f-1ce8197f0fec": {"__data__": {"id_": "200e4c3e-0cfb-43a0-809f-1ce8197f0fec", "embedding": null, "metadata": {"window": "Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. ", "original_text": "The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "43a19927-4a33-4a89-83fd-ad58d585938e", "node_type": "1", "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n", "original_text": "Did you know? \n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "b73c0d9e507f3b7bb72cb3af1e508ee32e9c37b1be2f996478ddc19faaec9c59", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4e9eb35d-1e39-4c53-839f-52bec0f97536", "node_type": "1", "metadata": {"window": "We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. ", "original_text": "Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n"}, "hash": "856659a713272cc8bb246a96f14514a6284cc885a1b3840b76dfe78bbc58bc7b", "class_name": "RelatedNodeInfo"}}, "text": "The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n", "start_char_idx": 335, "end_char_idx": 447, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4e9eb35d-1e39-4c53-839f-52bec0f97536": {"__data__": {"id_": "4e9eb35d-1e39-4c53-839f-52bec0f97536", "embedding": null, "metadata": {"window": "We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. ", "original_text": "Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "200e4c3e-0cfb-43a0-809f-1ce8197f0fec", "node_type": "1", "metadata": {"window": "Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. ", "original_text": "The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "037ff7139eb83a25ffa00848f6bf3f6696e81647094fe5384af70ed99deb6ab7", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "979b9255-62a1-439e-98c6-433a4c37af0e", "node_type": "1", "metadata": {"window": "Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n", "original_text": "From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n"}, "hash": "a9e9076c3724a2b27bb6bafd52f630931d52d581ad9d3e639ec713a3c47deb0b", "class_name": "RelatedNodeInfo"}}, "text": "Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n", "start_char_idx": 447, "end_char_idx": 623, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "979b9255-62a1-439e-98c6-433a4c37af0e": {"__data__": {"id_": "979b9255-62a1-439e-98c6-433a4c37af0e", "embedding": null, "metadata": {"window": "Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n", "original_text": "From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4e9eb35d-1e39-4c53-839f-52bec0f97536", "node_type": "1", "metadata": {"window": "We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. ", "original_text": "Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "e97c763ec8984b3d555018c65cab0e747b9da6052ebd6ec661f74f6fc82e870b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b7b4ff76-7b67-4fb9-8dca-dbd2ecf26c4d", "node_type": "1", "metadata": {"window": "The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. "}, "hash": "e388204ea5e737c3336325ffd093833d2e3c9cceaacb5209cea73796f7043efd", "class_name": "RelatedNodeInfo"}}, "text": "From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n", "start_char_idx": 623, "end_char_idx": 787, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b7b4ff76-7b67-4fb9-8dca-dbd2ecf26c4d": {"__data__": {"id_": "b7b4ff76-7b67-4fb9-8dca-dbd2ecf26c4d", "embedding": null, "metadata": {"window": "The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. ", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "979b9255-62a1-439e-98c6-433a4c37af0e", "node_type": "1", "metadata": {"window": "Did you know? \n The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n", "original_text": "From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "e601390cdbbb2ab1fa260f3d517ff4a464bcb5d71f134fa14a5fe51a9ed17bc4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e209f9bf-dda9-43e3-8c64-38517c43c14f", "node_type": "1", "metadata": {"window": "Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "All \nyou need is a computer with a projector, webcam and microphone. "}, "hash": "e8345a6419cb7b85cc0b9f3cf036c363b8a91bf08ee82f9a8031a6fdf5f03e83", "class_name": "RelatedNodeInfo"}}, "text": "Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. ", "start_char_idx": 787, "end_char_idx": 965, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e209f9bf-dda9-43e3-8c64-38517c43c14f": {"__data__": {"id_": "e209f9bf-dda9-43e3-8c64-38517c43c14f", "embedding": null, "metadata": {"window": "Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "All \nyou need is a computer with a projector, webcam and microphone. ", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b7b4ff76-7b67-4fb9-8dca-dbd2ecf26c4d", "node_type": "1", "metadata": {"window": "The National Archives Education Service also offers free workshops onsite in Kew and online \nin your classroom.\n Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. ", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "52ab30146a4f78bf10ee650723bdb4f22aafec24801264eb9f2e125a18a7bc91", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "68602cb0-6f9d-4eec-b4dc-af904ddf9455", "node_type": "1", "metadata": {"window": "From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n"}, "hash": "d2d82babd0e706775ff969732ff1be26a1b11c4d3803d4fd284b5d292c4ba430", "class_name": "RelatedNodeInfo"}}, "text": "All \nyou need is a computer with a projector, webcam and microphone. ", "start_char_idx": 965, "end_char_idx": 1034, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "68602cb0-6f9d-4eec-b4dc-af904ddf9455": {"__data__": {"id_": "68602cb0-6f9d-4eec-b4dc-af904ddf9455", "embedding": null, "metadata": {"window": "From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e209f9bf-dda9-43e3-8c64-38517c43c14f", "node_type": "1", "metadata": {"window": "Our Onsite Workshops are available for free here at The National Archives and allow \nstudents to experience genuine original documents reflecting over 1000 years of history. \n From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "All \nyou need is a computer with a projector, webcam and microphone. ", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "95dbfa940c2b4f1b8b19d57c947746cf8eb194d6367e09ba4dccd5f881938a08", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9203e64d-436e-40d3-864d-bc7a6970b421", "node_type": "1", "metadata": {"window": "Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu"}, "hash": "9d8281a9718e62907db95ab1bc628c1d0a9b994fc98fb9a5e7e4c72d9e5bbc93", "class_name": "RelatedNodeInfo"}}, "text": "We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n", "start_char_idx": 1034, "end_char_idx": 1111, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9203e64d-436e-40d3-864d-bc7a6970b421": {"__data__": {"id_": "9203e64d-436e-40d3-864d-bc7a6970b421", "embedding": null, "metadata": {"window": "Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b0199728-e735-498f-806f-7bd8330355e0", "node_type": "4", "metadata": {"page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "68602cb0-6f9d-4eec-b4dc-af904ddf9455", "node_type": "1", "metadata": {"window": "From Elizabeth I\u2019s signature to the telegrams of the sinking Titanic, students love the wow-\nfactor of being able to see real history on the desk in front of them.\n Our Online Workshops allow our Education Officers to teach through your projector, leading \ndiscussions and guiding students through activities based around original documents. All \nyou need is a computer with a projector, webcam and microphone. We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "original_text": "We\u2019ll arrange a test call \nbefore your session to check the tech is working.\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "hash": "fc30c6523ed44314ecbba64b0862f7d1590b18c11b6b4f2d788d56dc4f908a83", "class_name": "RelatedNodeInfo"}}, "text": "Find out more:\n\uf0fcnationalarchives.gov.uk/education\n\uf09b education@nationalarchives.gov.uk\nfacebook.com/TheNationalArchivesEducationService\ntwitter.com/UKNatArcEdu", "start_char_idx": 1111, "end_char_idx": 1269, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a39ac088-9722-442e-9d9b-c0e55fc17801": {"__data__": {"id_": "a39ac088-9722-442e-9d9b-c0e55fc17801", "embedding": null, "metadata": {"window": " \n \n \n \n \n \n Anti-Money Laundering / \nCounter Financing of Terrorism \nPolicy \n(AML / CFT POLICY) \n \n \n \n \n \n \n \n \n \n \nRevised: January 2023 \n \nAPPROVED BY 416TH BOD MEETING DATED 4TH JAN 2023 \n \n \n \n", "original_text": " \n \n \n \n \n \n Anti-Money Laundering / \nCounter Financing of Terrorism \nPolicy \n(AML / CFT POLICY) \n \n \n \n \n \n \n \n \n \n \nRevised: January 2023 \n \nAPPROVED BY 416TH BOD MEETING DATED 4TH JAN 2023 \n \n \n \n", "page_label": "1", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "f6041522-e8d0-4707-9e2e-ce505314b1b8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "f6041522-e8d0-4707-9e2e-ce505314b1b8", "node_type": "4", "metadata": {"page_label": "1", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "f6041522-e8d0-4707-9e2e-ce505314b1b8"}, "hash": "632eeea7345a9fd1ae830f38ab1a259add1eb91b0a43caa5c19d1e3f74a48fae", "class_name": "RelatedNodeInfo"}}, "text": " \n \n \n \n \n \n Anti-Money Laundering / \nCounter Financing of Terrorism \nPolicy \n(AML / CFT POLICY) \n \n \n \n \n \n \n \n \n \n \nRevised: January 2023 \n \nAPPROVED BY 416TH BOD MEETING DATED 4TH JAN 2023 \n \n \n \n", "start_char_idx": 0, "end_char_idx": 203, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "eca70f18-6c77-4e89-a476-fd5a9e713826": {"__data__": {"id_": "eca70f18-6c77-4e89-a476-fd5a9e713826", "embedding": null, "metadata": {"window": "i Contents \n \nVERSION CONTROL iii \nABBREVIATIONS iv \nCHAPTER 1: INTRODUCTION 1 \n1.1 Background 1 \n1.2 Definitions of key terms 1 \n1.2.1 Money Laundering 1 \n1.2.2 Financing of Terrorism 2 \n1.2.3 Proliferation Financing 2 \n1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) 2 \n1.2.5 Trade based money laundering 2 \n1.2.6 Customers 2 \n1.2.7 Shell bank and shell entity 2 \n1.2.8 Beneficial owner 3 \n1.2.9 Tipping Off 3 \n1.3 Objective 3 \n1.4 Governance Structure 3 \n1.4.1 Board of Dire ctors 3 \n1.4.2 Senior management 4 \n1.4.3 AML/CFT Unit 4 \n1.4.4 Asset (Mo ney) Laundering Prevention Committee 4 \n1.4.5 AML/CFT Committee 4 \n1.4.6 Three -line-of-defense 5 \nCHAPTER 2: CUSTOMER IDENTIFICATION AND DUE DILIGENCE 8 \n2.1 Know Your Customer 8 \n2.2 KYC Elements 8 \n2.2.1 Customer Identification Procedures 8 \n2.2.2 Risk Management 9 \n2.2.3 Customer Acceptance Policy 10 \n2.2.4 Monitoring of Transactions 12 \n2.3 Customer Due Diligence 12 \n2.3.1 Types of CDD based on customer risk rating 13 \nCHAPTER 3: MONITORING AND REPORTING 14 \n3.1 Transaction monitoring 14 ", "original_text": "i Contents \n \nVERSION CONTROL iii \nABBREVIATIONS iv \nCHAPTER 1: INTRODUCTION 1 \n1.1 Background 1 \n1.2 Definitions of key terms 1 \n1.2.1 Money Laundering 1 \n1.2.2 Financing of Terrorism 2 \n1.2.3 Proliferation Financing 2 \n1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) 2 \n1.2.5 Trade based money laundering 2 \n1.2.6 Customers 2 \n1.2.7 Shell bank and shell entity 2 \n1.2.8 Beneficial owner 3 \n1.2.9 Tipping Off 3 \n1.3 Objective 3 \n1.4 Governance Structure 3 \n1.4.1 Board of Dire ctors 3 \n1.4.2 Senior management 4 \n1.4.3 AML/CFT Unit 4 \n1.4.4 Asset (Mo ney) Laundering Prevention Committee 4 \n1.4.5 AML/CFT Committee 4 \n1.4.6 Three -line-of-defense 5 \nCHAPTER 2: CUSTOMER IDENTIFICATION AND DUE DILIGENCE 8 \n2.1 Know Your Customer 8 \n2.2 KYC Elements 8 \n2.2.1 Customer Identification Procedures 8 \n2.2.2 Risk Management 9 \n2.2.3 Customer Acceptance Policy 10 \n2.2.4 Monitoring of Transactions 12 \n2.3 Customer Due Diligence 12 \n2.3.1 Types of CDD based on customer risk rating 13 \nCHAPTER 3: MONITORING AND REPORTING 14 \n3.1 Transaction monitoring 14 ", "page_label": "2", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "ec393c1b-18d0-4461-9c32-b75b3d9ea676"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ec393c1b-18d0-4461-9c32-b75b3d9ea676", "node_type": "4", "metadata": {"page_label": "2", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "ec393c1b-18d0-4461-9c32-b75b3d9ea676"}, "hash": "6f74ab47b81f333223d16660687746278e691bf5e0e7f7c0b8d7e3a331bed1ee", "class_name": "RelatedNodeInfo"}}, "text": "i Contents \n \nVERSION CONTROL iii \nABBREVIATIONS iv \nCHAPTER 1: INTRODUCTION 1 \n1.1 Background 1 \n1.2 Definitions of key terms 1 \n1.2.1 Money Laundering 1 \n1.2.2 Financing of Terrorism 2 \n1.2.3 Proliferation Financing 2 \n1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) 2 \n1.2.5 Trade based money laundering 2 \n1.2.6 Customers 2 \n1.2.7 Shell bank and shell entity 2 \n1.2.8 Beneficial owner 3 \n1.2.9 Tipping Off 3 \n1.3 Objective 3 \n1.4 Governance Structure 3 \n1.4.1 Board of Dire ctors 3 \n1.4.2 Senior management 4 \n1.4.3 AML/CFT Unit 4 \n1.4.4 Asset (Mo ney) Laundering Prevention Committee 4 \n1.4.5 AML/CFT Committee 4 \n1.4.6 Three -line-of-defense 5 \nCHAPTER 2: CUSTOMER IDENTIFICATION AND DUE DILIGENCE 8 \n2.1 Know Your Customer 8 \n2.2 KYC Elements 8 \n2.2.1 Customer Identification Procedures 8 \n2.2.2 Risk Management 9 \n2.2.3 Customer Acceptance Policy 10 \n2.2.4 Monitoring of Transactions 12 \n2.3 Customer Due Diligence 12 \n2.3.1 Types of CDD based on customer risk rating 13 \nCHAPTER 3: MONITORING AND REPORTING 14 \n3.1 Transaction monitoring 14 ", "start_char_idx": 0, "end_char_idx": 1127, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "36ebb5b6-c2e0-4dfe-a3dd-d3dfa9c22499": {"__data__": {"id_": "36ebb5b6-c2e0-4dfe-a3dd-d3dfa9c22499", "embedding": null, "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. ", "original_text": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ce1cb2b5-b7f8-4dd1-a7d8-e5085cedcf6e", "node_type": "1", "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. ", "original_text": "Training 17 \n4.2. "}, "hash": "99f86fecf32118b47ff20720c670d5d5b2f8276622c437ac16a60013c9248de8", "class_name": "RelatedNodeInfo"}}, "text": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. ", "start_char_idx": 0, "end_char_idx": 266, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ce1cb2b5-b7f8-4dd1-a7d8-e5085cedcf6e": {"__data__": {"id_": "ce1cb2b5-b7f8-4dd1-a7d8-e5085cedcf6e", "embedding": null, "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. ", "original_text": "Training 17 \n4.2. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "36ebb5b6-c2e0-4dfe-a3dd-d3dfa9c22499", "node_type": "1", "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. ", "original_text": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "ccb796d70f7eba75fe7ca3b28a31be9a426039ab1642fe97c36b1b5c09458d02", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "77051c31-f841-4e14-894e-1f862021b3dd", "node_type": "1", "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. ", "original_text": "Confidentiality and Tipping off 17 \n4.3. "}, "hash": "deb3b3ae0fe292a55697bcd912c5be1d37c7c08005538aa1dfc3ebfc79ef939a", "class_name": "RelatedNodeInfo"}}, "text": "Training 17 \n4.2. ", "start_char_idx": 266, "end_char_idx": 285, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "77051c31-f841-4e14-894e-1f862021b3dd": {"__data__": {"id_": "77051c31-f841-4e14-894e-1f862021b3dd", "embedding": null, "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. ", "original_text": "Confidentiality and Tipping off 17 \n4.3. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ce1cb2b5-b7f8-4dd1-a7d8-e5085cedcf6e", "node_type": "1", "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. ", "original_text": "Training 17 \n4.2. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "5324e723627f5aa2d4d9cfb8b7d9ebb405aee39de9ad2066dbcd2fc79116feb3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "595b345e-ee63-409c-9292-68359467be4f", "node_type": "1", "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. ", "original_text": "Non-Compliance 17 \n4.4. "}, "hash": "caf9c80f2e56229294af96fb0a0d341c02ed24a35eedb74052f4b0976f85547a", "class_name": "RelatedNodeInfo"}}, "text": "Confidentiality and Tipping off 17 \n4.3. ", "start_char_idx": 285, "end_char_idx": 327, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "595b345e-ee63-409c-9292-68359467be4f": {"__data__": {"id_": "595b345e-ee63-409c-9292-68359467be4f", "embedding": null, "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. ", "original_text": "Non-Compliance 17 \n4.4. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "77051c31-f841-4e14-894e-1f862021b3dd", "node_type": "1", "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. ", "original_text": "Confidentiality and Tipping off 17 \n4.3. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "3e64a5ee829a171038e7a28522b21fa8c056432a6fb8310b4cbf5855e984bf4e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "57f9f691-887d-4f71-a458-7373c780e219", "node_type": "1", "metadata": {"window": "Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. ", "original_text": "Not to be Liable for Providing Information 17 \n4.5. "}, "hash": "0b9f43e26c79feb9ab8bdbc16a69252082c88d629cb5d7929170b86ab7261951", "class_name": "RelatedNodeInfo"}}, "text": "Non-Compliance 17 \n4.4. ", "start_char_idx": 327, "end_char_idx": 352, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "57f9f691-887d-4f71-a458-7373c780e219": {"__data__": {"id_": "57f9f691-887d-4f71-a458-7373c780e219", "embedding": null, "metadata": {"window": "Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. ", "original_text": "Not to be Liable for Providing Information 17 \n4.5. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "595b345e-ee63-409c-9292-68359467be4f", "node_type": "1", "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. ", "original_text": "Non-Compliance 17 \n4.4. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "ae1bcc921bf4c3444c99b21143e96ad93a8c559aea618e369ab1936f088edfa5", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e5a1e03f-b0a0-4d55-9200-b54d3c152d3e", "node_type": "1", "metadata": {"window": "Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. ", "original_text": "Importance of Know Your Employee (KYE) 17 \n4.6. "}, "hash": "4f9f2142b360e60719501d6807be8eadffbb6b8119916fd83f789dd8c461365d", "class_name": "RelatedNodeInfo"}}, "text": "Not to be Liable for Providing Information 17 \n4.5. ", "start_char_idx": 352, "end_char_idx": 405, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e5a1e03f-b0a0-4d55-9200-b54d3c152d3e": {"__data__": {"id_": "e5a1e03f-b0a0-4d55-9200-b54d3c152d3e", "embedding": null, "metadata": {"window": "Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. ", "original_text": "Importance of Know Your Employee (KYE) 17 \n4.6. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "57f9f691-887d-4f71-a458-7373c780e219", "node_type": "1", "metadata": {"window": "Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. ", "original_text": "Not to be Liable for Providing Information 17 \n4.5. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "d16be90a03628e027bff26de5f3e7251000505d68032e54ce62eaaf6d2ec242f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3acecbd4-1867-4451-b65a-5dbf975bb532", "node_type": "1", "metadata": {"window": "Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. ", "original_text": "Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. "}, "hash": "3e9e0f4acaa29b29415dfdf0661dc942eb61c889b0ab7fd08b21a81e6ca89606", "class_name": "RelatedNodeInfo"}}, "text": "Importance of Know Your Employee (KYE) 17 \n4.6. ", "start_char_idx": 405, "end_char_idx": 454, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3acecbd4-1867-4451-b65a-5dbf975bb532": {"__data__": {"id_": "3acecbd4-1867-4451-b65a-5dbf975bb532", "embedding": null, "metadata": {"window": "Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. ", "original_text": "Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e5a1e03f-b0a0-4d55-9200-b54d3c152d3e", "node_type": "1", "metadata": {"window": "Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. ", "original_text": "Importance of Know Your Employee (KYE) 17 \n4.6. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "7b675d6d2b8705d600dff29a116f438cd1b5bbf3de556f8b643cf670d07c6fdc", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0957ead3-48dd-4dba-8d5d-231ad4bf4079", "node_type": "1", "metadata": {"window": "Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. ", "original_text": "AML/CFT Guidelines 19 \n5.2. "}, "hash": "101507ac6fae2c405d05d38e92e1fd1b17df54f5d72614a20623ccfaa8ad3246", "class_name": "RelatedNodeInfo"}}, "text": "Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. ", "start_char_idx": 454, "end_char_idx": 512, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0957ead3-48dd-4dba-8d5d-231ad4bf4079": {"__data__": {"id_": "0957ead3-48dd-4dba-8d5d-231ad4bf4079", "embedding": null, "metadata": {"window": "Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. ", "original_text": "AML/CFT Guidelines 19 \n5.2. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "3acecbd4-1867-4451-b65a-5dbf975bb532", "node_type": "1", "metadata": {"window": "Non-Compliance 17 \n4.4. Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. ", "original_text": "Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "b609ac6689f1aea30b6207b3e771ca35e9c130ec10a42cb8a83792cb83ba8c47", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e8285ac4-67c6-465e-bb2e-bb4d232ee8b9", "node_type": "1", "metadata": {"window": "Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Others 19 \n5.3. "}, "hash": "dacba2f5a7d531059aba3cc7b1491f2c6522df1c7ecafd54c2cc39c44bd1f3cd", "class_name": "RelatedNodeInfo"}}, "text": "AML/CFT Guidelines 19 \n5.2. ", "start_char_idx": 512, "end_char_idx": 541, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e8285ac4-67c6-465e-bb2e-bb4d232ee8b9": {"__data__": {"id_": "e8285ac4-67c6-465e-bb2e-bb4d232ee8b9", "embedding": null, "metadata": {"window": "Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Others 19 \n5.3. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0957ead3-48dd-4dba-8d5d-231ad4bf4079", "node_type": "1", "metadata": {"window": "Not to be Liable for Providing Information 17 \n4.5. Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. ", "original_text": "AML/CFT Guidelines 19 \n5.2. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "750d43580fed789a33194ce414eb228f5f7ff322e5cda1146cfbcaf44a6a549e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f6df0908-4d14-4b3f-89c7-0d0db1a18073", "node_type": "1", "metadata": {"window": "Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Maintenance and Update 19 \n5.4. "}, "hash": "48e4023918828c8ae691724d22bfe05bf41fe542f7525b4951b49d7ef1865a15", "class_name": "RelatedNodeInfo"}}, "text": "Others 19 \n5.3. ", "start_char_idx": 541, "end_char_idx": 558, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f6df0908-4d14-4b3f-89c7-0d0db1a18073": {"__data__": {"id_": "f6df0908-4d14-4b3f-89c7-0d0db1a18073", "embedding": null, "metadata": {"window": "Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Maintenance and Update 19 \n5.4. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e8285ac4-67c6-465e-bb2e-bb4d232ee8b9", "node_type": "1", "metadata": {"window": "Importance of Know Your Employee (KYE) 17 \n4.6. Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Others 19 \n5.3. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "d4dada52f8640a4272ecbc9a0216aff8fc10800d82841c20e5091cd29e0863f1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "403213cd-056c-4dd4-9f30-6c196e4b843a", "node_type": "1", "metadata": {"window": "AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Repeal and Savings 19 \n5.5. "}, "hash": "77ac09bdd6451fed5a15625dc2394f77b29206506d1684c1e791802adbccddda", "class_name": "RelatedNodeInfo"}}, "text": "Maintenance and Update 19 \n5.4. ", "start_char_idx": 558, "end_char_idx": 591, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "403213cd-056c-4dd4-9f30-6c196e4b843a": {"__data__": {"id_": "403213cd-056c-4dd4-9f30-6c196e4b843a", "embedding": null, "metadata": {"window": "AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Repeal and Savings 19 \n5.5. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f6df0908-4d14-4b3f-89c7-0d0db1a18073", "node_type": "1", "metadata": {"window": "Code -of-conduct 18 \nCHAPTER 5: MISCELLANEOUS 19 \n5.1. AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Maintenance and Update 19 \n5.4. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "f1865de388634766f17a55d964aa00de9ed02abfb94a8e2dde44eb80e2de5f93", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "763de8e3-b292-4b0f-a23d-352999b8dac3", "node_type": "1", "metadata": {"window": "Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Effective Date 19 \n \n "}, "hash": "fdb6ea28a75ebd889f231a0ca16f9466f6a6415f70d9e14a958f15ed211f05bf", "class_name": "RelatedNodeInfo"}}, "text": "Repeal and Savings 19 \n5.5. ", "start_char_idx": 591, "end_char_idx": 620, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "763de8e3-b292-4b0f-a23d-352999b8dac3": {"__data__": {"id_": "763de8e3-b292-4b0f-a23d-352999b8dac3", "embedding": null, "metadata": {"window": "Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Effective Date 19 \n \n ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e", "node_type": "4", "metadata": {"page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "403213cd-056c-4dd4-9f30-6c196e4b843a", "node_type": "1", "metadata": {"window": "AML/CFT Guidelines 19 \n5.2. Others 19 \n5.3. Maintenance and Update 19 \n5.4. Repeal and Savings 19 \n5.5. Effective Date 19 \n \n ", "original_text": "Repeal and Savings 19 \n5.5. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "hash": "1eb3d06b0318ad82ba27bf5f659b682d0762e252589bfd7539e14841704b1862", "class_name": "RelatedNodeInfo"}}, "text": "Effective Date 19 \n \n ", "start_char_idx": 620, "end_char_idx": 644, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0029fe70-8458-48fe-9867-052638f3e121": {"__data__": {"id_": "0029fe70-8458-48fe-9867-052638f3e121", "embedding": null, "metadata": {"window": "iii VERSION CONTROL \nVersion Control No. Date Remarks \nVersion 1 July 2012 \nVersion 2 August 2015 Revised \nVersion 3 December 2017 Revised \nVersion 4 December 2018 Revised \nVersion 5 February 2020 Revised \nVersion 6 January 2023 Revised \n ", "original_text": "iii VERSION CONTROL \nVersion Control No. ", "page_label": "4", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e"}, "hash": "75b608b98e13777552562a8927bb2b92c622279cf1a743d873252f2b9db02d48", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "49061286-377d-4bd2-868f-9af96241cc3f", "node_type": "1", "metadata": {"window": "iii VERSION CONTROL \nVersion Control No. Date Remarks \nVersion 1 July 2012 \nVersion 2 August 2015 Revised \nVersion 3 December 2017 Revised \nVersion 4 December 2018 Revised \nVersion 5 February 2020 Revised \nVersion 6 January 2023 Revised \n ", "original_text": "Date Remarks \nVersion 1 July 2012 \nVersion 2 August 2015 Revised \nVersion 3 December 2017 Revised \nVersion 4 December 2018 Revised \nVersion 5 February 2020 Revised \nVersion 6 January 2023 Revised \n "}, "hash": "31ef26199013a054f80735698380ccff14f2f970f3e2b97b01cf7618e0aebec7", "class_name": "RelatedNodeInfo"}}, "text": "iii VERSION CONTROL \nVersion Control No. ", "start_char_idx": 0, "end_char_idx": 43, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "49061286-377d-4bd2-868f-9af96241cc3f": {"__data__": {"id_": "49061286-377d-4bd2-868f-9af96241cc3f", "embedding": null, "metadata": {"window": "iii VERSION CONTROL \nVersion Control No. Date Remarks \nVersion 1 July 2012 \nVersion 2 August 2015 Revised \nVersion 3 December 2017 Revised \nVersion 4 December 2018 Revised \nVersion 5 February 2020 Revised \nVersion 6 January 2023 Revised \n ", "original_text": "Date Remarks \nVersion 1 July 2012 \nVersion 2 August 2015 Revised \nVersion 3 December 2017 Revised \nVersion 4 December 2018 Revised \nVersion 5 February 2020 Revised \nVersion 6 January 2023 Revised \n ", "page_label": "4", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e"}, "hash": "75b608b98e13777552562a8927bb2b92c622279cf1a743d873252f2b9db02d48", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0029fe70-8458-48fe-9867-052638f3e121", "node_type": "1", "metadata": {"window": "iii VERSION CONTROL \nVersion Control No. Date Remarks \nVersion 1 July 2012 \nVersion 2 August 2015 Revised \nVersion 3 December 2017 Revised \nVersion 4 December 2018 Revised \nVersion 5 February 2020 Revised \nVersion 6 January 2023 Revised \n ", "original_text": "iii VERSION CONTROL \nVersion Control No. ", "page_label": "4", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e"}, "hash": "ee14e7bd8caf31fe4377a8bec7c46b295500553936311f75e5e2d1e18063e027", "class_name": "RelatedNodeInfo"}}, "text": "Date Remarks \nVersion 1 July 2012 \nVersion 2 August 2015 Revised \nVersion 3 December 2017 Revised \nVersion 4 December 2018 Revised \nVersion 5 February 2020 Revised \nVersion 6 January 2023 Revised \n ", "start_char_idx": 43, "end_char_idx": 261, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4e9bcbd6-b2f0-4e98-b621-37cd6e2bab33": {"__data__": {"id_": "4e9bcbd6-b2f0-4e98-b621-37cd6e2bab33", "embedding": null, "metadata": {"window": "iv \nABBREVIATIONS \n \nAML Anti-Money Laundering \nALPA Asset (Money) Laundering Prevention Act, 2064 \nAPG Asia/Pacific Group on Money Laundering \nBOD Board of Directors \nCDD Customer Due Diligence \nCCO Chief Compliance Officer \nCOCO Chief of Country Operations \nCEO Chief Executive Officer \nCOO Chief Operating Officer \nCFT Counter -Financing of Terrorism \nECDD Enhanced Customer Due Diligence \nEU European Union \nFATF Financial Action Task Force \nFIU Financial Intelligence Unit \nHMT Her Majesty\u2019s Treasury, United Kingdom \nHRD Human Resource Department \nKYC Know Your Customer \nKYE Know Your Employee \nML Money Laundering \nMLRO Money Laundering Reporting Officer \nML/TF Money Laundering and/or Terrorist Financing \nNRB Nepal Rastra Bank \nOFAC Office of Foreign Assets Control \nPEP Politically Exposed Person \nRules Asset (Money) Laundering Prevention Rules 2073 \nSTR Suspicious Transaction Report \nTBML Trade Based Money Laundering \nTF Terrorist Financing \nThe Policy Anti-Money Laundering / Counter Financing of Terrorism Policy of the Bank \nTTR Threshold Transaction Report \nUN United Nations ", "original_text": "iv \nABBREVIATIONS \n \nAML Anti-Money Laundering \nALPA Asset (Money) Laundering Prevention Act, 2064 \nAPG Asia/Pacific Group on Money Laundering \nBOD Board of Directors \nCDD Customer Due Diligence \nCCO Chief Compliance Officer \nCOCO Chief of Country Operations \nCEO Chief Executive Officer \nCOO Chief Operating Officer \nCFT Counter -Financing of Terrorism \nECDD Enhanced Customer Due Diligence \nEU European Union \nFATF Financial Action Task Force \nFIU Financial Intelligence Unit \nHMT Her Majesty\u2019s Treasury, United Kingdom \nHRD Human Resource Department \nKYC Know Your Customer \nKYE Know Your Employee \nML Money Laundering \nMLRO Money Laundering Reporting Officer \nML/TF Money Laundering and/or Terrorist Financing \nNRB Nepal Rastra Bank \nOFAC Office of Foreign Assets Control \nPEP Politically Exposed Person \nRules Asset (Money) Laundering Prevention Rules 2073 \nSTR Suspicious Transaction Report \nTBML Trade Based Money Laundering \nTF Terrorist Financing \nThe Policy Anti-Money Laundering / Counter Financing of Terrorism Policy of the Bank \nTTR Threshold Transaction Report \nUN United Nations ", "page_label": "5", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b1ef24fa-97f3-42e0-961d-291e54170218"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b1ef24fa-97f3-42e0-961d-291e54170218", "node_type": "4", "metadata": {"page_label": "5", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b1ef24fa-97f3-42e0-961d-291e54170218"}, "hash": "782cfe9f2095292a9e843683c7526c27bdff41e0416c860ee7a6ea58f72d8fc6", "class_name": "RelatedNodeInfo"}}, "text": "iv \nABBREVIATIONS \n \nAML Anti-Money Laundering \nALPA Asset (Money) Laundering Prevention Act, 2064 \nAPG Asia/Pacific Group on Money Laundering \nBOD Board of Directors \nCDD Customer Due Diligence \nCCO Chief Compliance Officer \nCOCO Chief of Country Operations \nCEO Chief Executive Officer \nCOO Chief Operating Officer \nCFT Counter -Financing of Terrorism \nECDD Enhanced Customer Due Diligence \nEU European Union \nFATF Financial Action Task Force \nFIU Financial Intelligence Unit \nHMT Her Majesty\u2019s Treasury, United Kingdom \nHRD Human Resource Department \nKYC Know Your Customer \nKYE Know Your Employee \nML Money Laundering \nMLRO Money Laundering Reporting Officer \nML/TF Money Laundering and/or Terrorist Financing \nNRB Nepal Rastra Bank \nOFAC Office of Foreign Assets Control \nPEP Politically Exposed Person \nRules Asset (Money) Laundering Prevention Rules 2073 \nSTR Suspicious Transaction Report \nTBML Trade Based Money Laundering \nTF Terrorist Financing \nThe Policy Anti-Money Laundering / Counter Financing of Terrorism Policy of the Bank \nTTR Threshold Transaction Report \nUN United Nations ", "start_char_idx": 0, "end_char_idx": 1149, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "bfd83eea-695c-4156-b9e0-ed51488f50cd": {"__data__": {"id_": "bfd83eea-695c-4156-b9e0-ed51488f50cd", "embedding": null, "metadata": {"window": "v WMD Weapons of Mass Destruction ", "original_text": "v WMD Weapons of Mass Destruction ", "page_label": "6", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "69dfe709-e348-45f2-98f4-f093395080a7"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "69dfe709-e348-45f2-98f4-f093395080a7", "node_type": "4", "metadata": {"page_label": "6", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "69dfe709-e348-45f2-98f4-f093395080a7"}, "hash": "402ebd4e6354aed5a4aa39c11d781e9178f2907cd130a677a80c1ee1c9cfa188", "class_name": "RelatedNodeInfo"}}, "text": "v WMD Weapons of Mass Destruction ", "start_char_idx": 0, "end_char_idx": 36, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c52e477a-e629-4d8d-ae02-3acec463f0e5": {"__data__": {"id_": "c52e477a-e629-4d8d-ae02-3acec463f0e5", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). ", "original_text": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "528d270b-d6b7-458c-aa0c-17cfb1b7493b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. ", "original_text": "The Bank is committed towards providing entire \ncommercial banking products and services. "}, "hash": "4ea0102843c9e280564c5065777acc546e1e60df3dde06cd665dc01c913dd52a", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. ", "start_char_idx": 0, "end_char_idx": 223, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "528d270b-d6b7-458c-aa0c-17cfb1b7493b": {"__data__": {"id_": "528d270b-d6b7-458c-aa0c-17cfb1b7493b", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. ", "original_text": "The Bank is committed towards providing entire \ncommercial banking products and services. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c52e477a-e629-4d8d-ae02-3acec463f0e5", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). ", "original_text": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "02f78260afa820cc0ade3d22c74fce9256a0e1f4c0036f8c3a4a03960e063957", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "38c05c5c-78a9-41fd-b8c8-cc911b44b392", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n", "original_text": "The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n"}, "hash": "bb65b7f4102f1750de68f8c514e0c60e0cacf14fe76d2c141c75b1f7b5b71e62", "class_name": "RelatedNodeInfo"}}, "text": "The Bank is committed towards providing entire \ncommercial banking products and services. ", "start_char_idx": 223, "end_char_idx": 313, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "38c05c5c-78a9-41fd-b8c8-cc911b44b392": {"__data__": {"id_": "38c05c5c-78a9-41fd-b8c8-cc911b44b392", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n", "original_text": "The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "528d270b-d6b7-458c-aa0c-17cfb1b7493b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. ", "original_text": "The Bank is committed towards providing entire \ncommercial banking products and services. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "0a0a9eb63ebdff10c0ec3824a2cb3413d8263841ba6ba0374b2ca4d2bcf0a453", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3766a672-229d-481b-8e77-f63d9edfe42d", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. ", "original_text": "The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). "}, "hash": "d486108a4591ebc225b1e2e83f5888f6391da957dcf9af7fe9d6adfb489a1482", "class_name": "RelatedNodeInfo"}}, "text": "The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n", "start_char_idx": 313, "end_char_idx": 383, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3766a672-229d-481b-8e77-f63d9edfe42d": {"__data__": {"id_": "3766a672-229d-481b-8e77-f63d9edfe42d", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. ", "original_text": "The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "38c05c5c-78a9-41fd-b8c8-cc911b44b392", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n", "original_text": "The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "489d01a731ac7dfc0add8da219278d231759d4376ad21137bc199d1a591fe904", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "88caea78-3b8c-4c50-8e40-be33f06d0a84", "node_type": "1", "metadata": {"window": "The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n", "original_text": "The \nBank is subject to applicable legislation designed to prevent ML/TF. "}, "hash": "a337ec3170eb6269eefeb68ae29fbcb21d185a8aad0324e7454375ceb152fd4d", "class_name": "RelatedNodeInfo"}}, "text": "The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). ", "start_char_idx": 383, "end_char_idx": 639, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "88caea78-3b8c-4c50-8e40-be33f06d0a84": {"__data__": {"id_": "88caea78-3b8c-4c50-8e40-be33f06d0a84", "embedding": null, "metadata": {"window": "The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n", "original_text": "The \nBank is subject to applicable legislation designed to prevent ML/TF. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "3766a672-229d-481b-8e77-f63d9edfe42d", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. ", "original_text": "The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "31407b73a6bfe3a0b4021f6a6f425d95319c7974564b6d9c1174cd32824280af", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "79661545-c9b8-410c-a23c-7b75c28e1847", "node_type": "1", "metadata": {"window": "The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n", "original_text": "This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n"}, "hash": "deb148fbe08437aab982fb938b84b2a9ef62a4f79f8fc75230f7712650dcba78", "class_name": "RelatedNodeInfo"}}, "text": "The \nBank is subject to applicable legislation designed to prevent ML/TF. ", "start_char_idx": 639, "end_char_idx": 713, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "79661545-c9b8-410c-a23c-7b75c28e1847": {"__data__": {"id_": "79661545-c9b8-410c-a23c-7b75c28e1847", "embedding": null, "metadata": {"window": "The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n", "original_text": "This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "88caea78-3b8c-4c50-8e40-be33f06d0a84", "node_type": "1", "metadata": {"window": "The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n", "original_text": "The \nBank is subject to applicable legislation designed to prevent ML/TF. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "89a2e04180d5376b926a8bc7780e70253037dc787981923378172f8d4e6baf47", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4118448b-bb8b-4fd6-9f1b-e10f8247536f", "node_type": "1", "metadata": {"window": "The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n", "original_text": "Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. "}, "hash": "9d1d75d603f25df4a6c1948c3530570ecbaed2f430b5da98bf8392ded881dfed", "class_name": "RelatedNodeInfo"}}, "text": "This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n", "start_char_idx": 713, "end_char_idx": 918, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4118448b-bb8b-4fd6-9f1b-e10f8247536f": {"__data__": {"id_": "4118448b-bb8b-4fd6-9f1b-e10f8247536f", "embedding": null, "metadata": {"window": "The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n", "original_text": "Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "79661545-c9b8-410c-a23c-7b75c28e1847", "node_type": "1", "metadata": {"window": "The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n", "original_text": "This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "b396656973c473fa895b968833a2d04ea1fb753fe480ddf0b3fb212655f423eb", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f157ec57-6d4d-4539-a463-eaef48d39eaa", "node_type": "1", "metadata": {"window": "The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . ", "original_text": "The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n"}, "hash": "e90f00d8f55cece8be784e19f0172087731082992df36e5b0abb6c3fdea2360f", "class_name": "RelatedNodeInfo"}}, "text": "Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. ", "start_char_idx": 918, "end_char_idx": 1172, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f157ec57-6d4d-4539-a463-eaef48d39eaa": {"__data__": {"id_": "f157ec57-6d4d-4539-a463-eaef48d39eaa", "embedding": null, "metadata": {"window": "The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . ", "original_text": "The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4118448b-bb8b-4fd6-9f1b-e10f8247536f", "node_type": "1", "metadata": {"window": "The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n", "original_text": "Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "65905eb3aad57b805a38908b09374a94576166b143bdd122d31c73aec4615a8e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "024fedaa-e2e4-4733-80db-1770ee4be916", "node_type": "1", "metadata": {"window": "This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. ", "original_text": "Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n"}, "hash": "3c59a209198ed6c00b2e6c2b05018152ae00266913a4e57719fe36ac0fe54ecc", "class_name": "RelatedNodeInfo"}}, "text": "The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n", "start_char_idx": 1172, "end_char_idx": 1420, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "024fedaa-e2e4-4733-80db-1770ee4be916": {"__data__": {"id_": "024fedaa-e2e4-4733-80db-1770ee4be916", "embedding": null, "metadata": {"window": "This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. ", "original_text": "Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f157ec57-6d4d-4539-a463-eaef48d39eaa", "node_type": "1", "metadata": {"window": "The \nBank is subject to applicable legislation designed to prevent ML/TF. This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . ", "original_text": "The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "a6496350e6dff9f6fd7a3079c3a69842cb190034b2948e9fc015ccdfb636f224", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "852347b8-c229-42b8-9261-bc9c6037ad24", "node_type": "1", "metadata": {"window": "Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n", "original_text": "In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n"}, "hash": "f4847315e93835dc7a92210d2c9a9a1c0ad0e18f0aaa1423de6fb7f5dbd6ff1d", "class_name": "RelatedNodeInfo"}}, "text": "Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n", "start_char_idx": 1420, "end_char_idx": 1785, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "852347b8-c229-42b8-9261-bc9c6037ad24": {"__data__": {"id_": "852347b8-c229-42b8-9261-bc9c6037ad24", "embedding": null, "metadata": {"window": "Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n", "original_text": "In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "024fedaa-e2e4-4733-80db-1770ee4be916", "node_type": "1", "metadata": {"window": "This legislation \nincludes Asset (Money) Laundering Prevention Act 2064, Asset (Money) Laundering \nPrevention Rules 2073, and NRB directives/circulars and amendments thereof issued from \ntime t o time. \n Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. ", "original_text": "Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "3a34b1b7989b884420ff919388778673cd90e923371a50c686c6a9ef9870dce9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7a64fd7d-9b41-4740-a3de-2b277f852653", "node_type": "1", "metadata": {"window": "The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. ", "original_text": "This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . "}, "hash": "15f468fc8b91ac9c52e6c87ea4bd14cc5a42cf00499289c710cf9e0b07a09cdd", "class_name": "RelatedNodeInfo"}}, "text": "In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n", "start_char_idx": 1785, "end_char_idx": 1977, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7a64fd7d-9b41-4740-a3de-2b277f852653": {"__data__": {"id_": "7a64fd7d-9b41-4740-a3de-2b277f852653", "embedding": null, "metadata": {"window": "The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. ", "original_text": "This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "852347b8-c229-42b8-9261-bc9c6037ad24", "node_type": "1", "metadata": {"window": "Further, the Bank acknowledges the FATF recommendations against criminal activities \nrelated to money laundering/terrorist financing and adopts appropriate mechanism to \naddress those recommendations to prevent the Bank being used for ML/TF activit ies. The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n", "original_text": "In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "c032192dafd05dcbf0df051650ff1996e1de9fef55bfa9fc502b182c4b0c29c2", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a390b91f-efb8-4f77-9649-77a25276cf6b", "node_type": "1", "metadata": {"window": "Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. ", "original_text": "BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. "}, "hash": "a51c61ebafec15e7c7248d8fd638293752b5cbe3f9d5b9f3c02bffdd6041e28e", "class_name": "RelatedNodeInfo"}}, "text": "This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . ", "start_char_idx": 1977, "end_char_idx": 2085, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a390b91f-efb8-4f77-9649-77a25276cf6b": {"__data__": {"id_": "a390b91f-efb8-4f77-9649-77a25276cf6b", "embedding": null, "metadata": {"window": "Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. ", "original_text": "BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7a64fd7d-9b41-4740-a3de-2b277f852653", "node_type": "1", "metadata": {"window": "The \nBank is also committed to continually fulfill its anti -money laundering obligations to its \nforeign correspondent banks, which may also require bank to conduct due diligence on \nthem to ensure that they comply with the FATF recommendation. \n Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. ", "original_text": "This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "842fab7c54101550930584379f36124aabd6a735f732fd11d7ff2741c8983aa6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "48499d08-c18e-4ae7-a08e-14c6a8ce5534", "node_type": "1", "metadata": {"window": "In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . ", "original_text": "This is a revised Policy compatible with loca l and \ninternational regulations. \n"}, "hash": "26eb4f767cc7b7bd1be1340db765429243fc0f58af657650b29867b64bb3350c", "class_name": "RelatedNodeInfo"}}, "text": "BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. ", "start_char_idx": 2085, "end_char_idx": 2187, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "48499d08-c18e-4ae7-a08e-14c6a8ce5534": {"__data__": {"id_": "48499d08-c18e-4ae7-a08e-14c6a8ce5534", "embedding": null, "metadata": {"window": "In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . ", "original_text": "This is a revised Policy compatible with loca l and \ninternational regulations. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a390b91f-efb8-4f77-9649-77a25276cf6b", "node_type": "1", "metadata": {"window": "Hence, the Bank\u2019s policy on anti -money laundering, and counter financing of terrorism \n(hereinafter referred to as \u201cThe Policy\u201d), outlines the minimum general unified standards of \ninternal AML/CFT program which should be strictly adhered to by the Bank in o rder to \nmitigate the legal, regulatory, reputational, and subsequent operational and financial risks. \n In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. ", "original_text": "BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "fdce5f93d66991d1331fb7ac119be54b8fca513f30975e6b4edeb906bf415d4c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "120557fb-efb3-4afd-a575-fb950b4dde3e", "node_type": "1", "metadata": {"window": "This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n", "original_text": "1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. "}, "hash": "0823d7d2b48cd92483b4366f00f410fc0b5249172b8bc086625a929b42a21b9a", "class_name": "RelatedNodeInfo"}}, "text": "This is a revised Policy compatible with loca l and \ninternational regulations. \n", "start_char_idx": 2187, "end_char_idx": 2270, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "120557fb-efb3-4afd-a575-fb950b4dde3e": {"__data__": {"id_": "120557fb-efb3-4afd-a575-fb950b4dde3e", "embedding": null, "metadata": {"window": "This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n", "original_text": "1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "48499d08-c18e-4ae7-a08e-14c6a8ce5534", "node_type": "1", "metadata": {"window": "In order to mitigate the ML/TF risks, the Bank shall formulate guideline , controls and \nprocedures as deemed necessary to effectively manage such risks bas ed on principles of \nthe Policy. \n This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . ", "original_text": "This is a revised Policy compatible with loca l and \ninternational regulations. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "a53004908de17deaf99ca233c6d890a15c60253957db101a3dbab9ee6e923b97", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5d85bafc-9d1d-41e2-895a-d18e73e172ae", "node_type": "1", "metadata": {"window": "BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n", "original_text": "In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. "}, "hash": "aa0fcfeff4c51f7acabec2ca957efe5df4fcbf32ab4aa58d1a9c58d307b6722f", "class_name": "RelatedNodeInfo"}}, "text": "1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. ", "start_char_idx": 2270, "end_char_idx": 2420, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5d85bafc-9d1d-41e2-895a-d18e73e172ae": {"__data__": {"id_": "5d85bafc-9d1d-41e2-895a-d18e73e172ae", "embedding": null, "metadata": {"window": "BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n", "original_text": "In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "120557fb-efb3-4afd-a575-fb950b4dde3e", "node_type": "1", "metadata": {"window": "This Policy establishes standards which every employee and business partner of the Bank \nshould adhere to . BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n", "original_text": "1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "44f541cf7ae635983e318bd1cfef4730b64fc01647ec62455d3a07e020227b82", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2e61ba59-a7aa-4b65-926a-687ae86861e3", "node_type": "1", "metadata": {"window": "This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. ", "original_text": "Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . "}, "hash": "f1f35211c7585b6a381d7952447c10cb35e272104c4ceb9bef47cd0fa91a2f9f", "class_name": "RelatedNodeInfo"}}, "text": "In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. ", "start_char_idx": 2420, "end_char_idx": 2540, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2e61ba59-a7aa-4b65-926a-687ae86861e3": {"__data__": {"id_": "2e61ba59-a7aa-4b65-926a-687ae86861e3", "embedding": null, "metadata": {"window": "This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. ", "original_text": "Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5d85bafc-9d1d-41e2-895a-d18e73e172ae", "node_type": "1", "metadata": {"window": "BOD and all employees are under an obligation to implement the \nprovisions laid down in this Policy. This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n", "original_text": "In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4a2db50f98380e4456c0c4b2427729944cbc9d4b837ccaf6058d356856e29b22", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ca8ed9ab-36c3-4cc9-9200-a44281095748", "node_type": "1", "metadata": {"window": "1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n"}, "hash": "62b4276482b0eb1663c7c98ee9c375ac8f8644ca93581ef6179b0dbb65cc9565", "class_name": "RelatedNodeInfo"}}, "text": "Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . ", "start_char_idx": 2540, "end_char_idx": 2634, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ca8ed9ab-36c3-4cc9-9200-a44281095748": {"__data__": {"id_": "ca8ed9ab-36c3-4cc9-9200-a44281095748", "embedding": null, "metadata": {"window": "1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2e61ba59-a7aa-4b65-926a-687ae86861e3", "node_type": "1", "metadata": {"window": "This is a revised Policy compatible with loca l and \ninternational regulations. \n 1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. ", "original_text": "Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "d652295f9ca48154047baea3cb473524d3858f2bf2a457d1baaebe349ae2e08a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "83f784f8-1769-4a12-a9fc-e66d75ebd146", "node_type": "1", "metadata": {"window": "In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n"}, "hash": "a3fc794f90bce3f76722d698323b62f19990405a01135b272df85ac718981234", "class_name": "RelatedNodeInfo"}}, "text": "There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n", "start_char_idx": 2634, "end_char_idx": 2818, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "83f784f8-1769-4a12-a9fc-e66d75ebd146": {"__data__": {"id_": "83f784f8-1769-4a12-a9fc-e66d75ebd146", "embedding": null, "metadata": {"window": "In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ca8ed9ab-36c3-4cc9-9200-a44281095748", "node_type": "1", "metadata": {"window": "1.2 Definitions of key terms \n1.2.1 Money Laundering \nMoney laundering is the process by which criminals disguise the illegal origin of \nthe funds. In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "d6161eda480eb02564074d70154f6c50fe2444661f04342dfbd1cd50e838cfe7", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d358ea6f-d726-4852-b959-6b6f02b7f626", "node_type": "1", "metadata": {"window": "Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "c) Integration: It is the third stage of money laundering. "}, "hash": "054665b13c9818d29302448a33a0b5cae70ad44a9ed6352ef82d8f2ec077c0f1", "class_name": "RelatedNodeInfo"}}, "text": "b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n", "start_char_idx": 2818, "end_char_idx": 2990, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d358ea6f-d726-4852-b959-6b6f02b7f626": {"__data__": {"id_": "d358ea6f-d726-4852-b959-6b6f02b7f626", "embedding": null, "metadata": {"window": "Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "c) Integration: It is the third stage of money laundering. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "83f784f8-1769-4a12-a9fc-e66d75ebd146", "node_type": "1", "metadata": {"window": "In simple words, it is the process of laundering black money for the \npurpose of converting the same into clean money. Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "fea781077ff161d4453d4d217465258a9ed38af5934cd6c6857d0e43bfa66705", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "77027437-a678-41be-b475-fb1d8b50057e", "node_type": "1", "metadata": {"window": "There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. "}, "hash": "d03f6efd352877e8a95eac1dc684537db3f277edac9142db9060d3ffdd76938a", "class_name": "RelatedNodeInfo"}}, "text": "c) Integration: It is the third stage of money laundering. ", "start_char_idx": 2990, "end_char_idx": 3049, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "77027437-a678-41be-b475-fb1d8b50057e": {"__data__": {"id_": "77027437-a678-41be-b475-fb1d8b50057e", "embedding": null, "metadata": {"window": "There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "00a8ff61-766b-425a-aa31-182b8d2366e6", "node_type": "4", "metadata": {"page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d358ea6f-d726-4852-b959-6b6f02b7f626", "node_type": "1", "metadata": {"window": "Money laundering is done by \nlaunderers worldwide to conceal funds from criminal activities . There are three \nstages of Money Laundering: \na) Placement: It is the first stage in money laundering where the cash proceeds \nof criminal activity enter into the financial system. \n b) Layering: It is the second stage in money laundering where attempts are \nmade to distance the money from its illegal source through layers of financial \ntransactions. \n c) Integration: It is the third stage of money laundering. This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "original_text": "c) Integration: It is the third stage of money laundering. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "hash": "ea2c43ba546aa06b6c0ed00b9e9dc7b6044ee74cfd4f73f9ea1faf6639f7c012", "class_name": "RelatedNodeInfo"}}, "text": "This stage involves the \nre-introduction of the illegal proceeds into legitimate commerce by providing \na legitimate -appearing explanation for the funds. ", "start_char_idx": 3049, "end_char_idx": 3205, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "fa1fcd89-0316-4277-a96a-908337af1bcb": {"__data__": {"id_": "fa1fcd89-0316-4277-a96a-908337af1bcb", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . ", "original_text": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "54e47b1b-5be0-423e-8358-83c8c815d142", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n", "original_text": "Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. "}, "hash": "7d24338ba4a32936b117ee5b966a441d91409c5b5f076f6092d2693d939182a3", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. ", "start_char_idx": 0, "end_char_idx": 207, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "54e47b1b-5be0-423e-8358-83c8c815d142": {"__data__": {"id_": "54e47b1b-5be0-423e-8358-83c8c815d142", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n", "original_text": "Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "fa1fcd89-0316-4277-a96a-908337af1bcb", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . ", "original_text": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "76c3e44af27c645360888412a9e174e9705a284ddcbfb71b2104f94328a887b6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "795741ac-cedf-4428-8f5e-165bd45b1a62", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. ", "original_text": "Funds may stem from both licit and \nillicit sources. "}, "hash": "7e36bd08c0d495e05120dc08b1bddc19dd19b62fd27e7d5458972cddf1e149d9", "class_name": "RelatedNodeInfo"}}, "text": "Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. ", "start_char_idx": 207, "end_char_idx": 379, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "795741ac-cedf-4428-8f5e-165bd45b1a62": {"__data__": {"id_": "795741ac-cedf-4428-8f5e-165bd45b1a62", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. ", "original_text": "Funds may stem from both licit and \nillicit sources. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "54e47b1b-5be0-423e-8358-83c8c815d142", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n", "original_text": "Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "30f57c382cad2bc138825f88dffb71cd480cfba3f82209337aa6bac57b95f9f0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "83547562-e8ba-4313-93f1-fc33fd2e0cd7", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n", "original_text": "More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . "}, "hash": "f7bb83a5ec4869debed2a309a5cb13f7d8045e48f3e97e1762bc663fa60636d5", "class_name": "RelatedNodeInfo"}}, "text": "Funds may stem from both licit and \nillicit sources. ", "start_char_idx": 379, "end_char_idx": 433, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "83547562-e8ba-4313-93f1-fc33fd2e0cd7": {"__data__": {"id_": "83547562-e8ba-4313-93f1-fc33fd2e0cd7", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n", "original_text": "More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "795741ac-cedf-4428-8f5e-165bd45b1a62", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. ", "original_text": "Funds may stem from both licit and \nillicit sources. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "7376fde9ea755e50ac8c2d8eeaefdb1bf6ef14633362afa6f88d47ab427f34ab", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a8fddcc6-b502-48a5-957e-099fdc6d5fdc", "node_type": "1", "metadata": {"window": "Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. ", "original_text": "The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n"}, "hash": "39a50e8a3599b447673a2f55a3aab76ffb9b0355a74d9d1b92cd04045dac918d", "class_name": "RelatedNodeInfo"}}, "text": "More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . ", "start_char_idx": 433, "end_char_idx": 888, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a8fddcc6-b502-48a5-957e-099fdc6d5fdc": {"__data__": {"id_": "a8fddcc6-b502-48a5-957e-099fdc6d5fdc", "embedding": null, "metadata": {"window": "Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. ", "original_text": "The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "83547562-e8ba-4313-93f1-fc33fd2e0cd7", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n", "original_text": "More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "10e4d9667ad200af1261002f26463b676bcff7148eb4d0e37435e32c782b233b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d158c94d-fd03-4607-b7b2-b817dc6750ac", "node_type": "1", "metadata": {"window": "Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n", "original_text": "1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. "}, "hash": "57ebee141067cca236deeb73e8546550ebe7f071e5e6077d40fa04aaf011c617", "class_name": "RelatedNodeInfo"}}, "text": "The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n", "start_char_idx": 888, "end_char_idx": 1116, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d158c94d-fd03-4607-b7b2-b817dc6750ac": {"__data__": {"id_": "d158c94d-fd03-4607-b7b2-b817dc6750ac", "embedding": null, "metadata": {"window": "Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n", "original_text": "1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a8fddcc6-b502-48a5-957e-099fdc6d5fdc", "node_type": "1", "metadata": {"window": "Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. ", "original_text": "The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "62acfd6a7dbc3fe5b27dae2529ade5846ba60bdb0b7379da3f6ffb753234116c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "89375532-71c7-4ba7-a392-f09aaf08f2be", "node_type": "1", "metadata": {"window": "More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n", "original_text": "Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n"}, "hash": "277d5877fad0812fa65f8c39e26ae56f21b58e74eb9774ac0a512ed3aa9545ea", "class_name": "RelatedNodeInfo"}}, "text": "1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. ", "start_char_idx": 1116, "end_char_idx": 1750, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "89375532-71c7-4ba7-a392-f09aaf08f2be": {"__data__": {"id_": "89375532-71c7-4ba7-a392-f09aaf08f2be", "embedding": null, "metadata": {"window": "More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n", "original_text": "Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d158c94d-fd03-4607-b7b2-b817dc6750ac", "node_type": "1", "metadata": {"window": "Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n", "original_text": "1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "800e5e4928a9cd38a77b1a58441e7af7d978e9634bcf2d0550545c18e7f232c0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9b5e83f4-4d7e-48f3-b44c-e6d3b4a33367", "node_type": "1", "metadata": {"window": "The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n", "original_text": "1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. "}, "hash": "03e3d7ddb2adc6b62e674a9581cc92052d4e137a301aeefd8f1274dd8d0abebe", "class_name": "RelatedNodeInfo"}}, "text": "Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n", "start_char_idx": 1750, "end_char_idx": 1934, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9b5e83f4-4d7e-48f3-b44c-e6d3b4a33367": {"__data__": {"id_": "9b5e83f4-4d7e-48f3-b44c-e6d3b4a33367", "embedding": null, "metadata": {"window": "The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n", "original_text": "1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "89375532-71c7-4ba7-a392-f09aaf08f2be", "node_type": "1", "metadata": {"window": "More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n", "original_text": "Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "53852fcbc114d0a6fd2ebc5e1001ff35697b71ec2d4fc92e2f3206f8ce1161d4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "835d2923-71e0-4163-893a-caabe716e546", "node_type": "1", "metadata": {"window": "1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n", "original_text": "The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n"}, "hash": "782fce8d69b704878c689f2769e4179bd054cbf489fbf86d6d9d3ec7eaf614ef", "class_name": "RelatedNodeInfo"}}, "text": "1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. ", "start_char_idx": 1934, "end_char_idx": 2199, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "835d2923-71e0-4163-893a-caabe716e546": {"__data__": {"id_": "835d2923-71e0-4163-893a-caabe716e546", "embedding": null, "metadata": {"window": "1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n", "original_text": "The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9b5e83f4-4d7e-48f3-b44c-e6d3b4a33367", "node_type": "1", "metadata": {"window": "The primary goal of individuals or \nentities involved in the financing of terrorism is therefore not necessarily to conceal \nthe sources of the money but to conceal both the financing and the nature of the \nfinanced activity. \n 1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n", "original_text": "1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "34033baae21bc9529481f3f098f59bbb4a3dcc28c3912476234614f1c0552cc1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ca32725c-6115-49db-913c-df3b07fa6beb", "node_type": "1", "metadata": {"window": "Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n", "original_text": "1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n"}, "hash": "62f3f33c329980218c9236a306ef00b7f52bc8a780cad80efe2d19b6979ed0bb", "class_name": "RelatedNodeInfo"}}, "text": "The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n", "start_char_idx": 2199, "end_char_idx": 2309, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ca32725c-6115-49db-913c-df3b07fa6beb": {"__data__": {"id_": "ca32725c-6115-49db-913c-df3b07fa6beb", "embedding": null, "metadata": {"window": "Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n", "original_text": "1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "835d2923-71e0-4163-893a-caabe716e546", "node_type": "1", "metadata": {"window": "1.2.3 Proliferation Financing \nProlife ration Financing refers to the act of providing funds or financial services \nwhich are used, in whole or in part, for the manufacture, acquisition, possession, \ndevelopment, export, trans -shipment, brokering, transport, transfer, stockpiling or \nuse of nuclea r, chemical or biological weapons and their means of delivery and \nrelated materials that would contribute to the Weapons of Mass Destruction (WMD) \nproliferation (including both technologies and dual use goods used for non -\nlegitimate purposes), in contraven tion of national laws or, where applicable, \ninternational obligations. Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n", "original_text": "The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "1fdaf633ea2c02ad419e2d2aa991ddd25cf20fdf5c25b464a403d5cdb692a612", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "578241bd-9f23-4439-a655-d30648805018", "node_type": "1", "metadata": {"window": "1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n", "original_text": "1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n"}, "hash": "9b78afc804b0c4e8dd5e334fceb2dbc98c0b07144b6b110b81ab022195972a01", "class_name": "RelatedNodeInfo"}}, "text": "1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n", "start_char_idx": 2309, "end_char_idx": 2536, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "578241bd-9f23-4439-a655-d30648805018": {"__data__": {"id_": "578241bd-9f23-4439-a655-d30648805018", "embedding": null, "metadata": {"window": "1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n", "original_text": "1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ca32725c-6115-49db-913c-df3b07fa6beb", "node_type": "1", "metadata": {"window": "Bank shall work towards raising awareness and be \nwatchful to providing funds or financial services which are not intended towards \nproliferation and proliferation financing of WMD. \n 1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n", "original_text": "1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "e3950ba71d7da21ec97906895af109df83a7e2e9c4d6680af8e4ed585deb5a92", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e14f6cb9-9e6c-4472-abf0-450c9619ec9f", "node_type": "1", "metadata": {"window": "The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "b) A person on behalf of whom an account is maintained (beneficial owner ). \n"}, "hash": "a417c3014418dca6eff77921f657ac6949dd81ef75ac64af5d58645d2e1678ba", "class_name": "RelatedNodeInfo"}}, "text": "1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n", "start_char_idx": 2536, "end_char_idx": 2728, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e14f6cb9-9e6c-4472-abf0-450c9619ec9f": {"__data__": {"id_": "e14f6cb9-9e6c-4472-abf0-450c9619ec9f", "embedding": null, "metadata": {"window": "The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "b) A person on behalf of whom an account is maintained (beneficial owner ). \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "578241bd-9f23-4439-a655-d30648805018", "node_type": "1", "metadata": {"window": "1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) \nAML/CFT is a term used in the industr y to describe the legal controls that require \nthe financial institutions and other regulated entities to prevent, detect, and report \nML/TF activities. The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n", "original_text": "1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "ebfb4da69be4cd34fd7e4498bec3d9be3284796e050a42b02f8d9d4a88105f3a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "914aa8b2-ee23-4ca1-9e6e-5654c2fb7b10", "node_type": "1", "metadata": {"window": "1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n"}, "hash": "d8c9ece7eeefd8493eb2f7395042c0edefda64060a04cbb1e084faccaea1effd", "class_name": "RelatedNodeInfo"}}, "text": "b) A person on behalf of whom an account is maintained (beneficial owner ). \n", "start_char_idx": 2728, "end_char_idx": 2806, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "914aa8b2-ee23-4ca1-9e6e-5654c2fb7b10": {"__data__": {"id_": "914aa8b2-ee23-4ca1-9e6e-5654c2fb7b10", "embedding": null, "metadata": {"window": "1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e14f6cb9-9e6c-4472-abf0-450c9619ec9f", "node_type": "1", "metadata": {"window": "The Bank has implemented standard KYC norms to prevent, \ndetect and report of ML/TF activities to the FIU. \n 1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "b) A person on behalf of whom an account is maintained (beneficial owner ). \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "a49111566613ceccc038a55e516f3fd8769cedbfbd16076352eccd0bc3cdd1c5", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2bd791d3-6858-47f9-865f-388dac32fac6", "node_type": "1", "metadata": {"window": "1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n"}, "hash": "65e4099dded9c9055e52e6639eefd9767d9d1dac1a3149caeafb5a4203729a91", "class_name": "RelatedNodeInfo"}}, "text": "c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n", "start_char_idx": 2806, "end_char_idx": 2943, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2bd791d3-6858-47f9-865f-388dac32fac6": {"__data__": {"id_": "2bd791d3-6858-47f9-865f-388dac32fac6", "embedding": null, "metadata": {"window": "1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "914aa8b2-ee23-4ca1-9e6e-5654c2fb7b10", "node_type": "1", "metadata": {"window": "1.2.5 Trade based money laundering \nTrade based money laundering is the process of disguising the proceeds of crime and \nmoving value through the use of trade transactions in an attempt to legitimize their \nillegal origins. \n 1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "978abf2736fa531618e5a983cb21e4b69a602ac75d0cbc0b688ed5860b29549b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c8e5d8f0-61e2-4054-9cc6-1d6bb01946ef", "node_type": "1", "metadata": {"window": "b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "Appointment of local agent or presence of its staff(s) does not constitute physical "}, "hash": "c786b8ce0dabf99fdd4ca78a1aee1183188a3944a4626ddee5bb78f79e13d39a", "class_name": "RelatedNodeInfo"}}, "text": "1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n", "start_char_idx": 2943, "end_char_idx": 3228, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c8e5d8f0-61e2-4054-9cc6-1d6bb01946ef": {"__data__": {"id_": "c8e5d8f0-61e2-4054-9cc6-1d6bb01946ef", "embedding": null, "metadata": {"window": "b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "Appointment of local agent or presence of its staff(s) does not constitute physical ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8", "node_type": "4", "metadata": {"page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2bd791d3-6858-47f9-865f-388dac32fac6", "node_type": "1", "metadata": {"window": "1.2.6 Customers \nCustomers of the bank shall denote any of the followings: \na) A person or entity that maintains an account with the Bank and/or has \nbusiness relationship with the Bank. \n b) A person on behalf of whom an account is maintained (beneficial owner ). \n c) Any person or entity connected with the financial transaction that may impose \nsignificant reputational or other risks to the Bank. \n 1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n Appointment of local agent or presence of its staff(s) does not constitute physical ", "original_text": "1.2.7 Shell bank and shell entity \nA shell bank means a financial institution that has no physical presence in the \ncountry in which it is incorporated and licensed and which is unaffiliated with a \nregula ted financial group that is subject to effective consolidated supervision. \n", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "hash": "54e4f25a6f715035eefce13c06889f311e743d0a2daeace7e8bf3154803f9ce3", "class_name": "RelatedNodeInfo"}}, "text": "Appointment of local agent or presence of its staff(s) does not constitute physical ", "start_char_idx": 3228, "end_char_idx": 3312, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "101abeec-50d2-415c-bd60-6b01f5634c97": {"__data__": {"id_": "101abeec-50d2-415c-bd60-6b01f5634c97", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe", "node_type": "4", "metadata": {"page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a8b43d44-7ec4-40ac-a16a-3befd53e8c65", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . ", "original_text": "1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. "}, "hash": "48935bcfb0fa1f8fe8e5d7dc8894eff1e7478de14e7cd564f475192871a2fd48", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n", "start_char_idx": 0, "end_char_idx": 151, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a8b43d44-7ec4-40ac-a16a-3befd53e8c65": {"__data__": {"id_": "a8b43d44-7ec4-40ac-a16a-3befd53e8c65", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . ", "original_text": "1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. ", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe", "node_type": "4", "metadata": {"page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "101abeec-50d2-415c-bd60-6b01f5634c97", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "7411edc15bd0d8d570f7cd497c424ba8f2c96e468695ccfd3e6815cf1b2bd081", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8273a425-c99f-49b4-9db3-121013f2933d", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n", "original_text": "Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n"}, "hash": "c100ab80ab041a64636935c91dc4ffa62a7b846b19049ffce5e8e9f6a0e66872", "class_name": "RelatedNodeInfo"}}, "text": "1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. ", "start_char_idx": 151, "end_char_idx": 358, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8273a425-c99f-49b4-9db3-121013f2933d": {"__data__": {"id_": "8273a425-c99f-49b4-9db3-121013f2933d", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n", "original_text": "Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe", "node_type": "4", "metadata": {"page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a8b43d44-7ec4-40ac-a16a-3befd53e8c65", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . ", "original_text": "1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. ", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "8d25860137579e8f3a57709e42f42ec0f05c05b6124ed958aa2ef1aac155d9e0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b88f77c1-2044-4a9f-b790-573fc3c5c12b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. ", "original_text": "1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n"}, "hash": "aee9f6c9020efa0df2d6b792076e96382e673c92eb1c7c18aa64983dda1a1ff5", "class_name": "RelatedNodeInfo"}}, "text": "Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n", "start_char_idx": 358, "end_char_idx": 514, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b88f77c1-2044-4a9f-b790-573fc3c5c12b": {"__data__": {"id_": "b88f77c1-2044-4a9f-b790-573fc3c5c12b", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. ", "original_text": "1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe", "node_type": "4", "metadata": {"page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8273a425-c99f-49b4-9db3-121013f2933d", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n", "original_text": "Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "86c42231e1fc55d8d27c4ff71b47f9803f4076b9e528bda8f19ce6240dc83dea", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "87039a66-6d37-483a-bff7-4432cc531908", "node_type": "1", "metadata": {"window": "1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n", "original_text": "1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . "}, "hash": "a47f2a22235d6b0dbf29d86578dbbd67a01887c6168a1cb5602c27e64e30af37", "class_name": "RelatedNodeInfo"}}, "text": "1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n", "start_char_idx": 514, "end_char_idx": 962, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "87039a66-6d37-483a-bff7-4432cc531908": {"__data__": {"id_": "87039a66-6d37-483a-bff7-4432cc531908", "embedding": null, "metadata": {"window": "1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n", "original_text": "1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . ", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe", "node_type": "4", "metadata": {"page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b88f77c1-2044-4a9f-b790-573fc3c5c12b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. ", "original_text": "1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "3f298ff3eee7f7e9927ac6636348dafbe777250a6fbf277ef901a8d84698308e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d2e036ec-ad7f-4f9c-919f-08e95b238f42", "node_type": "1", "metadata": {"window": "Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n"}, "hash": "9a548468b7f1c1faa5fe22bc8df4200078b7d349207c77fce608e6230deefe2f", "class_name": "RelatedNodeInfo"}}, "text": "1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . ", "start_char_idx": 962, "end_char_idx": 1139, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d2e036ec-ad7f-4f9c-919f-08e95b238f42": {"__data__": {"id_": "d2e036ec-ad7f-4f9c-919f-08e95b238f42", "embedding": null, "metadata": {"window": "Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe", "node_type": "4", "metadata": {"page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "87039a66-6d37-483a-bff7-4432cc531908", "node_type": "1", "metadata": {"window": "1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n", "original_text": "1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . ", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "125c6770e23bca4377cb3dac926b02ed708aa3537f079fe36accb16dbd3d746e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "476681b8-7b69-4a34-a6d2-809fc653b8bf", "node_type": "1", "metadata": {"window": "1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. "}, "hash": "79c7f6f677d11a16c2bd2451fe42f9aa9852aecf6310417670f5b3ac07ec416b", "class_name": "RelatedNodeInfo"}}, "text": "The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n", "start_char_idx": 1139, "end_char_idx": 1359, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "476681b8-7b69-4a34-a6d2-809fc653b8bf": {"__data__": {"id_": "476681b8-7b69-4a34-a6d2-809fc653b8bf", "embedding": null, "metadata": {"window": "1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. ", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe", "node_type": "4", "metadata": {"page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d2e036ec-ad7f-4f9c-919f-08e95b238f42", "node_type": "1", "metadata": {"window": "Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "5fed1539d01375ac7bd74057b3587020464206c8a0f55183d2a064c899b4d0fe", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b6bac391-46af-49b8-ac76-55b9ea0a3f10", "node_type": "1", "metadata": {"window": "1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n"}, "hash": "09ee7c93115153f4237037b4be3baac23f5a225e1a00966da88d7e95552e13d0", "class_name": "RelatedNodeInfo"}}, "text": "1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. ", "start_char_idx": 1359, "end_char_idx": 1725, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b6bac391-46af-49b8-ac76-55b9ea0a3f10": {"__data__": {"id_": "b6bac391-46af-49b8-ac76-55b9ea0a3f10", "embedding": null, "metadata": {"window": "1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe", "node_type": "4", "metadata": {"page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "476681b8-7b69-4a34-a6d2-809fc653b8bf", "node_type": "1", "metadata": {"window": "1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n 1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. ", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "85afad0428a2c2b9be5d3c71ee8fa159ed67a3470d803ee1853995f307b4c157", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4e342ed1-90d4-4470-95d3-1ca6c00677d9", "node_type": "1", "metadata": {"window": "The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office "}, "hash": "341bfdf831c82f6f43f037ba704b461038352a9422ed5f52782098a2957797a0", "class_name": "RelatedNodeInfo"}}, "text": "The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n", "start_char_idx": 1725, "end_char_idx": 1882, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4e342ed1-90d4-4470-95d3-1ca6c00677d9": {"__data__": {"id_": "4e342ed1-90d4-4470-95d3-1ca6c00677d9", "embedding": null, "metadata": {"window": "The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe", "node_type": "4", "metadata": {"page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b6bac391-46af-49b8-ac76-55b9ea0a3f10", "node_type": "1", "metadata": {"window": "1.3 Objective \nThe objective of this Policy is to prevent the Bank from being used for ML/TF activities by \nestablishing a sound risk management policy framework of the Bank . The policy framework \nshall encompass the mechanisms for identifying ML/TF risks faced by the Bank, NRB \nguidance, requirements of law, including international AML/CFT standards and as guided \nby FATF recommendations. \n 1.4 Governance Structure \nFor effective implementation of The Policy, a governance stru cture including Board of \nDirectors (BOD) , and Senior M anagement has been designed as under: \n \n1.4.1 Board of Directors \nAML/CFT risk management is an important aspect of overall risk management of \nthe Bank and BOD are an integral part of AML/CFT governance structure. The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n 1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "original_text": "The \nBOD is responsible for policy formation as well as ensuring effective \nimplementation of such policies and procedures by the management of the Bank. \n \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "hash": "58c352aaecb8073dbe9bb55d4104f698f7ca5f435a357b398aec10eccec4b58c", "class_name": "RelatedNodeInfo"}}, "text": "1 ALPA \u2013 Chapter 1, Clause (2)(LA) \n2 ALPA \u2013 Chapter 8, Clause (44 KA) \nBoard of Directors \nChief Executive Officer \nChief Risk and Compliance Officer \nMLRO \n(AML / CFT Unit) \nBranch /Department AML Officer \nAsset (Money) Laundering \nPrevention Committee \nAML/CFT Committee \nHead - Provincial Office ", "start_char_idx": 1882, "end_char_idx": 2195, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "71c4a3bc-6635-44e1-80a1-0e8deef0d767": {"__data__": {"id_": "71c4a3bc-6635-44e1-80a1-0e8deef0d767", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . ", "original_text": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2db9c2b8-f85c-463d-9f24-ebd8e9727fd5", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n", "original_text": "1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. "}, "hash": "dd694a38ab081e2188509692b26a6649e616f0f35122cd7c1001b26593e5a9b8", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n", "start_char_idx": 0, "end_char_idx": 178, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2db9c2b8-f85c-463d-9f24-ebd8e9727fd5": {"__data__": {"id_": "2db9c2b8-f85c-463d-9f24-ebd8e9727fd5", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n", "original_text": "1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "71c4a3bc-6635-44e1-80a1-0e8deef0d767", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . ", "original_text": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2f968529fdcb37420f9551c0099ea3621990ee4e40e4a3a98b2cf18139dd7b94", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9c6d0c05-1650-4b0e-9a43-a2e793804053", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n", "original_text": "Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n"}, "hash": "ff7542698a8239f76bffca381798f241c113e77fa6875c99f3fec813df4d6fe7", "class_name": "RelatedNodeInfo"}}, "text": "1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. ", "start_char_idx": 178, "end_char_idx": 395, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9c6d0c05-1650-4b0e-9a43-a2e793804053": {"__data__": {"id_": "9c6d0c05-1650-4b0e-9a43-a2e793804053", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n", "original_text": "Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2db9c2b8-f85c-463d-9f24-ebd8e9727fd5", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n", "original_text": "1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "6e5368dfd9b620422f9a2bcf41a29f612800b468d60542dc035700c1f9d08dcd", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "74d6bdca-a349-435b-9efe-0beaeed635a1", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . ", "original_text": "1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . "}, "hash": "043dd169c28ac1ad5f826a3dfb510c6b2a335ef8f583ba7e64e53f87ed9837ef", "class_name": "RelatedNodeInfo"}}, "text": "Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n", "start_char_idx": 395, "end_char_idx": 624, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "74d6bdca-a349-435b-9efe-0beaeed635a1": {"__data__": {"id_": "74d6bdca-a349-435b-9efe-0beaeed635a1", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . ", "original_text": "1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9c6d0c05-1650-4b0e-9a43-a2e793804053", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n", "original_text": "Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "f8dcd5f11640c304fd56e68506f31f865353382097bd2f3d7c2e0474cea740ad", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a3298b90-49cf-4b41-a0d9-17cc2a67baca", "node_type": "1", "metadata": {"window": "1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . ", "original_text": "The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n"}, "hash": "90a4d8bf4ea208511e3f7988afef2e154df8bb2dbc9825780750569bf05ac8e0", "class_name": "RelatedNodeInfo"}}, "text": "1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . ", "start_char_idx": 624, "end_char_idx": 791, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a3298b90-49cf-4b41-a0d9-17cc2a67baca": {"__data__": {"id_": "a3298b90-49cf-4b41-a0d9-17cc2a67baca", "embedding": null, "metadata": {"window": "1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . ", "original_text": "The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "74d6bdca-a349-435b-9efe-0beaeed635a1", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . ", "original_text": "1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "c976e29d6c2aacedf8446254f7739a7b1ca8ad9bb9d87982c92a074ca2a1c596", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "1e4b3a13-4e82-4e88-8799-8d02597cd960", "node_type": "1", "metadata": {"window": "Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n", "original_text": "1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n"}, "hash": "e8e80a5bf21251f9f7d953ab36c4c5c9a3c9257bd0562b3710ddbc0379efc0b0", "class_name": "RelatedNodeInfo"}}, "text": "The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n", "start_char_idx": 791, "end_char_idx": 1061, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "1e4b3a13-4e82-4e88-8799-8d02597cd960": {"__data__": {"id_": "1e4b3a13-4e82-4e88-8799-8d02597cd960", "embedding": null, "metadata": {"window": "Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n", "original_text": "1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a3298b90-49cf-4b41-a0d9-17cc2a67baca", "node_type": "1", "metadata": {"window": "1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . ", "original_text": "The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "f8e14e50853f143e3bd783c500cbd11010b7c017c10fbe2743c8549c86d5032f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d72266a3-fc2b-4dc5-9db2-4f7278b30167", "node_type": "1", "metadata": {"window": "1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. ", "original_text": "The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . "}, "hash": "bf4a787f8df427e1219735eab4b91e3802a1684b9fbe8590c1266ef81dc2f5a1", "class_name": "RelatedNodeInfo"}}, "text": "1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n", "start_char_idx": 1061, "end_char_idx": 1254, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d72266a3-fc2b-4dc5-9db2-4f7278b30167": {"__data__": {"id_": "d72266a3-fc2b-4dc5-9db2-4f7278b30167", "embedding": null, "metadata": {"window": "1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. ", "original_text": "The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "1e4b3a13-4e82-4e88-8799-8d02597cd960", "node_type": "1", "metadata": {"window": "Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n", "original_text": "1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "bcba13aa178d4fcc83d61f8217f39c0532a28391f45f812bfb53613c46968949", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "797816ac-6fc2-4453-b294-c5da10cbf4ab", "node_type": "1", "metadata": {"window": "The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. ", "original_text": "The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . "}, "hash": "2dfb51c89e64da52c6824f1eb094ec01110dde6b757621da8e7585f489c17511", "class_name": "RelatedNodeInfo"}}, "text": "The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . ", "start_char_idx": 1254, "end_char_idx": 1403, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "797816ac-6fc2-4453-b294-c5da10cbf4ab": {"__data__": {"id_": "797816ac-6fc2-4453-b294-c5da10cbf4ab", "embedding": null, "metadata": {"window": "The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. ", "original_text": "The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d72266a3-fc2b-4dc5-9db2-4f7278b30167", "node_type": "1", "metadata": {"window": "1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. ", "original_text": "The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "ffe53fdd9b58c9b6142ccfc4d85c5ac719fd1e4b84432f1d1964ba78b8b5e363", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "bca215d8-8f5d-4550-bee2-ca746b34b1c7", "node_type": "1", "metadata": {"window": "1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. ", "original_text": "The meeting shall be held at least once in every 3 month s or as required. \n"}, "hash": "d866c48bb92af2a2f3b9bcf02ad9768c1698921a598919558fae5f1617a5f012", "class_name": "RelatedNodeInfo"}}, "text": "The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . ", "start_char_idx": 1403, "end_char_idx": 1491, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "bca215d8-8f5d-4550-bee2-ca746b34b1c7": {"__data__": {"id_": "bca215d8-8f5d-4550-bee2-ca746b34b1c7", "embedding": null, "metadata": {"window": "1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. ", "original_text": "The meeting shall be held at least once in every 3 month s or as required. \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "797816ac-6fc2-4453-b294-c5da10cbf4ab", "node_type": "1", "metadata": {"window": "The \nManager AML/CFT shall be called as Money Laundering Reporting Officer (MLRO) \nand shall be responsible for evaluating a nd strengthening the effectiveness of set \ncontrols and internal systems of the Bank to help identify , monitor and report ML/TF \nactivities . \n 1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. ", "original_text": "The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "7c1b6f06d8cb03688a451e248ec49223d570d9250f18c4b070125dfcdf484133", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2af8640e-5a53-47c2-a938-9f9695cd7c76", "node_type": "1", "metadata": {"window": "The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n", "original_text": "A board member shall be the coordinator of this committee. "}, "hash": "e564300b00f585fd90488253c302bc871e64d50fc6830937b79ceabb8bfd4d8d", "class_name": "RelatedNodeInfo"}}, "text": "The meeting shall be held at least once in every 3 month s or as required. \n", "start_char_idx": 1491, "end_char_idx": 1568, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2af8640e-5a53-47c2-a938-9f9695cd7c76": {"__data__": {"id_": "2af8640e-5a53-47c2-a938-9f9695cd7c76", "embedding": null, "metadata": {"window": "The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n", "original_text": "A board member shall be the coordinator of this committee. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "bca215d8-8f5d-4550-bee2-ca746b34b1c7", "node_type": "1", "metadata": {"window": "1.4.4 Asset (Money) Laundering Prevention Committee \nThe Bank shall have a Board level Asset (Money) L aundering Prevention \nCommittee which is constituted in line with the NRB Directives. \n The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. ", "original_text": "The meeting shall be held at least once in every 3 month s or as required. \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "af10caa4fdb999bb5d46b65fd41f4c185bb91876415c675b49ec0b7aae8c253c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f8bf4db5-78de-4d72-a5e3-33c83fc8c734", "node_type": "1", "metadata": {"window": "The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. ", "original_text": "In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. "}, "hash": "89c270fe2a57d8bfe4495212b5ccfe4c68c2a65ea8a63fd07693b24ebbd95252", "class_name": "RelatedNodeInfo"}}, "text": "A board member shall be the coordinator of this committee. ", "start_char_idx": 1568, "end_char_idx": 1628, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f8bf4db5-78de-4d72-a5e3-33c83fc8c734": {"__data__": {"id_": "f8bf4db5-78de-4d72-a5e3-33c83fc8c734", "embedding": null, "metadata": {"window": "The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. ", "original_text": "In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2af8640e-5a53-47c2-a938-9f9695cd7c76", "node_type": "1", "metadata": {"window": "The Committee highlights on risk governance and identifies the need for a strong \nand well-defined ML/TF risk management framework and mechanisms . The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n", "original_text": "A board member shall be the coordinator of this committee. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "84b178423fe2e79bb17c61155c8efafd19b7f014256d421cd1d3b36ffb954717", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "44888967-ba3f-442c-9d7b-802d7ca43e44", "node_type": "1", "metadata": {"window": "The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. ", "original_text": "The quorum necessitates a simple majo rity of the total members of the \ncommittee. "}, "hash": "acf0d99501f1c8172bc543b61cc32b70cac53158313eca6903b607c02fe9dcf0", "class_name": "RelatedNodeInfo"}}, "text": "In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. ", "start_char_idx": 1628, "end_char_idx": 1806, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "44888967-ba3f-442c-9d7b-802d7ca43e44": {"__data__": {"id_": "44888967-ba3f-442c-9d7b-802d7ca43e44", "embedding": null, "metadata": {"window": "The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. ", "original_text": "The quorum necessitates a simple majo rity of the total members of the \ncommittee. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f8bf4db5-78de-4d72-a5e3-33c83fc8c734", "node_type": "1", "metadata": {"window": "The \nCommittee shall review the AML/CFT Policy and recommend for approval to the \nBOD . The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. ", "original_text": "In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "675fd6e0df11d0090e466910c8f3cdbfa423bf9db2b25bf306b4ce27bcc1c8d9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "dc28745b-ce90-456e-83b0-3718ac471b7f", "node_type": "1", "metadata": {"window": "A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n"}, "hash": "bffa5689d0f9d232425bbe2b494e57518cceb4b4af5ae495440d97b87e453cf0", "class_name": "RelatedNodeInfo"}}, "text": "The quorum necessitates a simple majo rity of the total members of the \ncommittee. ", "start_char_idx": 1806, "end_char_idx": 1889, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "dc28745b-ce90-456e-83b0-3718ac471b7f": {"__data__": {"id_": "dc28745b-ce90-456e-83b0-3718ac471b7f", "embedding": null, "metadata": {"window": "A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "44888967-ba3f-442c-9d7b-802d7ca43e44", "node_type": "1", "metadata": {"window": "The meeting shall be held at least once in every 3 month s or as required. \n A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. ", "original_text": "The quorum necessitates a simple majo rity of the total members of the \ncommittee. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "82fbc8778bb9a0e62e77a24980e6b542d881f8fb0b09149395bc55a95e1515e1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "14eda487-be69-46a6-8dd9-740d35cc7fe3", "node_type": "1", "metadata": {"window": "In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. "}, "hash": "032f318cfcc0f96f342a9ba1ee56baaea8435664d880af2c0ddadbc85b8f4fb3", "class_name": "RelatedNodeInfo"}}, "text": "The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n", "start_char_idx": 1889, "end_char_idx": 2235, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "14eda487-be69-46a6-8dd9-740d35cc7fe3": {"__data__": {"id_": "14eda487-be69-46a6-8dd9-740d35cc7fe3", "embedding": null, "metadata": {"window": "In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "dc28745b-ce90-456e-83b0-3718ac471b7f", "node_type": "1", "metadata": {"window": "A board member shall be the coordinator of this committee. In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "b5af45e9e2b595762af85b7de78f1529be531ff2f494b79765076f35eec98cf6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6e741f83-1a55-4964-a39a-1735a998cd6d", "node_type": "1", "metadata": {"window": "The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. "}, "hash": "21dcbd1c0fa81ccba193b772ccfcbda087745660b2a9881e89f59524049b876b", "class_name": "RelatedNodeInfo"}}, "text": "1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. ", "start_char_idx": 2235, "end_char_idx": 2320, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6e741f83-1a55-4964-a39a-1735a998cd6d": {"__data__": {"id_": "6e741f83-1a55-4964-a39a-1735a998cd6d", "embedding": null, "metadata": {"window": "The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "14eda487-be69-46a6-8dd9-740d35cc7fe3", "node_type": "1", "metadata": {"window": "In absence of the \ncoordinator , the remaining board member shall conduct the meeting as \nCoordinator and in the absence of Member Secretary, CCO shall act as Member \nSecretary. The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "7a74df17335c95b8b050cc326e430199370275d363727ed1ec235f3a4c3bac48", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "40a841c0-27b9-4105-8dc6-3454da3e3bd8", "node_type": "1", "metadata": {"window": "The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "6/078, Clause (7) (5) "}, "hash": "65fa0c1c18d7ba07459bc0d29aaecba221198473a00eeeca9516c988898eb3cd", "class_name": "RelatedNodeInfo"}}, "text": "The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. ", "start_char_idx": 2320, "end_char_idx": 2636, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "40a841c0-27b9-4105-8dc6-3454da3e3bd8": {"__data__": {"id_": "40a841c0-27b9-4105-8dc6-3454da3e3bd8", "embedding": null, "metadata": {"window": "The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "6/078, Clause (7) (5) ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b", "node_type": "4", "metadata": {"page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6e741f83-1a55-4964-a39a-1735a998cd6d", "node_type": "1", "metadata": {"window": "The quorum necessitates a simple majo rity of the total members of the \ncommittee. The Committee comprises of the following members: \nBoard Member - Coordinator \nBoard Member - Member \nChief Risk Officer - Member \nChief Compliance Officer - Member \nMLRO - Member Secretary \nTerms of Reference (TOR) of the Committee shall be as per Unified Directive \nissued by NRB regarding Corporate Governance4. \n 1.4.5 AML/CFT Committee \nThe Bank shall have a management level AML/CFT Committee. The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. 6/078, Clause (7) (5) ", "original_text": "The purpose of \nthe committee shall be \na. To assess, review , and monitor the status of the Bank\u2019s standing on \ncomplying with KYC principle, \nb. To ensure effective implementation of The Policy through a standard \nguideline , \n \n3 ALPA \u2013 Chapter 3, Clause ( 7)(TA)(3) \n4 Unified Directive 2078, directive no. ", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "hash": "81d6f1bd8a030f73ff1b71c9fcea3025b1c1e4435a7eb51ecdf50207389f0515", "class_name": "RelatedNodeInfo"}}, "text": "6/078, Clause (7) (5) ", "start_char_idx": 2636, "end_char_idx": 2659, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0e35a31b-6d8a-4f9b-8c29-5781a42f4a6a": {"__data__": {"id_": "0e35a31b-6d8a-4f9b-8c29-5781a42f4a6a", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "e4df6583-ff3d-44e3-9497-4f8634359a67", "node_type": "4", "metadata": {"page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "b3c3f502a1764aaa712bccd4a072c71515a94b9130de5cb262e7f7883f782ed6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4ffb13a4-79e2-4307-ae24-d806775763c3", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. ", "original_text": "The meeting shall be held at least once \nin every 3 months or as required. \n"}, "hash": "5d0958e0df62693e274a228c88dbb62cd6961d894c462e82be6e2da5b1b0ad9c", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . ", "start_char_idx": 0, "end_char_idx": 320, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4ffb13a4-79e2-4307-ae24-d806775763c3": {"__data__": {"id_": "4ffb13a4-79e2-4307-ae24-d806775763c3", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. ", "original_text": "The meeting shall be held at least once \nin every 3 months or as required. \n", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "e4df6583-ff3d-44e3-9497-4f8634359a67", "node_type": "4", "metadata": {"page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "b3c3f502a1764aaa712bccd4a072c71515a94b9130de5cb262e7f7883f782ed6", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0e35a31b-6d8a-4f9b-8c29-5781a42f4a6a", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "4d8a5039f1ed6cbf8bd48baf66aca2dff60f627c657933c688d8d70cd8a0e520", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6be1f85e-83be-4483-8b86-92c8725356a9", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. ", "original_text": "Senior Deputy Chief Executive Officer shall be coordinator of the committee. "}, "hash": "98cac7f35e946d4e4646ca945ce0658383991aaa088e022cef8abf51a6aa96d5", "class_name": "RelatedNodeInfo"}}, "text": "The meeting shall be held at least once \nin every 3 months or as required. \n", "start_char_idx": 320, "end_char_idx": 397, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6be1f85e-83be-4483-8b86-92c8725356a9": {"__data__": {"id_": "6be1f85e-83be-4483-8b86-92c8725356a9", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. ", "original_text": "Senior Deputy Chief Executive Officer shall be coordinator of the committee. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "e4df6583-ff3d-44e3-9497-4f8634359a67", "node_type": "4", "metadata": {"page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "b3c3f502a1764aaa712bccd4a072c71515a94b9130de5cb262e7f7883f782ed6", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4ffb13a4-79e2-4307-ae24-d806775763c3", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. ", "original_text": "The meeting shall be held at least once \nin every 3 months or as required. \n", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "157228bcc5ad667038723a25d2c147a4471f522cd316216a66b001862c4bc675", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c271474a-b01e-4dde-806e-7f88aea2f469", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. ", "original_text": "In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. "}, "hash": "fd14d63faaf48a4af41823bcf8836fd239fafd79c692600d659d60e0982a1e09", "class_name": "RelatedNodeInfo"}}, "text": "Senior Deputy Chief Executive Officer shall be coordinator of the committee. ", "start_char_idx": 397, "end_char_idx": 474, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c271474a-b01e-4dde-806e-7f88aea2f469": {"__data__": {"id_": "c271474a-b01e-4dde-806e-7f88aea2f469", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. ", "original_text": "In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "e4df6583-ff3d-44e3-9497-4f8634359a67", "node_type": "4", "metadata": {"page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "b3c3f502a1764aaa712bccd4a072c71515a94b9130de5cb262e7f7883f782ed6", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6be1f85e-83be-4483-8b86-92c8725356a9", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. ", "original_text": "Senior Deputy Chief Executive Officer shall be coordinator of the committee. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "d839d5ddcc96d9afd03287aec826504ea81035d635828a34d0020cc294850a35", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7c252836-73d8-4243-8506-264c8086427a", "node_type": "1", "metadata": {"window": "The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "In absence of Member Secretary, \nCCO shall act as Member Secretary. "}, "hash": "987b0532965657df016211132b8dffb4d3a242a77a6610fc09c5e622efddd15a", "class_name": "RelatedNodeInfo"}}, "text": "In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. ", "start_char_idx": 474, "end_char_idx": 680, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7c252836-73d8-4243-8506-264c8086427a": {"__data__": {"id_": "7c252836-73d8-4243-8506-264c8086427a", "embedding": null, "metadata": {"window": "The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "In absence of Member Secretary, \nCCO shall act as Member Secretary. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "e4df6583-ff3d-44e3-9497-4f8634359a67", "node_type": "4", "metadata": {"page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "b3c3f502a1764aaa712bccd4a072c71515a94b9130de5cb262e7f7883f782ed6", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c271474a-b01e-4dde-806e-7f88aea2f469", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. ", "original_text": "In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "b5df174732e8838de03677d1e1ef271caba80757fe8641a8d7243d5fd71bd162", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "72335e90-0cfc-416a-bc36-58b99175d085", "node_type": "1", "metadata": {"window": "Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "The quorum necessitates a simple major ity \nof the total members of the committee. "}, "hash": "a0071b646b93af09bc7df39d6fc2b5d3f22aafb3fe76147669816451abc22cfc", "class_name": "RelatedNodeInfo"}}, "text": "In absence of Member Secretary, \nCCO shall act as Member Secretary. ", "start_char_idx": 680, "end_char_idx": 748, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "72335e90-0cfc-416a-bc36-58b99175d085": {"__data__": {"id_": "72335e90-0cfc-416a-bc36-58b99175d085", "embedding": null, "metadata": {"window": "Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "The quorum necessitates a simple major ity \nof the total members of the committee. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "e4df6583-ff3d-44e3-9497-4f8634359a67", "node_type": "4", "metadata": {"page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "b3c3f502a1764aaa712bccd4a072c71515a94b9130de5cb262e7f7883f782ed6", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7c252836-73d8-4243-8506-264c8086427a", "node_type": "1", "metadata": {"window": "The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "In absence of Member Secretary, \nCCO shall act as Member Secretary. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "15dce20f2c83b34b86114aea68bea86cb76c43e0c7e2bc2bc086f34e8250a5ce", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "09bc1af2-b295-43b7-91c8-008573646a0d", "node_type": "1", "metadata": {"window": "In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. "}, "hash": "731c1df7fd68d8654ae0d8ece0c9d20ecb3eec8e403c03851fb203b085441d84", "class_name": "RelatedNodeInfo"}}, "text": "The quorum necessitates a simple major ity \nof the total members of the committee. ", "start_char_idx": 748, "end_char_idx": 831, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "09bc1af2-b295-43b7-91c8-008573646a0d": {"__data__": {"id_": "09bc1af2-b295-43b7-91c8-008573646a0d", "embedding": null, "metadata": {"window": "In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "e4df6583-ff3d-44e3-9497-4f8634359a67", "node_type": "4", "metadata": {"page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "b3c3f502a1764aaa712bccd4a072c71515a94b9130de5cb262e7f7883f782ed6", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "72335e90-0cfc-416a-bc36-58b99175d085", "node_type": "1", "metadata": {"window": "Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "The quorum necessitates a simple major ity \nof the total members of the committee. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "6b753c1eefd1566afa98af409ae39e72fcbeeb9914e83e17c3c8b63c1672a982", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "468e2ecf-5ca8-4831-a045-858601970464", "node_type": "1", "metadata": {"window": "In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit "}, "hash": "5de7d6326de807589e46e5dfea44e82fadad51f5663f123672b3dfcc8f4a6f0f", "class_name": "RelatedNodeInfo"}}, "text": "The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. ", "start_char_idx": 831, "end_char_idx": 1540, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "468e2ecf-5ca8-4831-a045-858601970464": {"__data__": {"id_": "468e2ecf-5ca8-4831-a045-858601970464", "embedding": null, "metadata": {"window": "In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "e4df6583-ff3d-44e3-9497-4f8634359a67", "node_type": "4", "metadata": {"page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "b3c3f502a1764aaa712bccd4a072c71515a94b9130de5cb262e7f7883f782ed6", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "09bc1af2-b295-43b7-91c8-008573646a0d", "node_type": "1", "metadata": {"window": "In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. In absence of Member Secretary, \nCCO shall act as Member Secretary. The quorum necessitates a simple major ity \nof the total members of the committee. The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "original_text": "The Committee comprises of the following \nmembers: \nSenior Deputy Chief Executive Officer - Coordinator \nDeputy Chief Executive Officer - Member \nChief Operating Officer - Member \nChief Business Officer - Member \nChief Compliance Officer - Member \nChief Risk Officer - Member \nChief Information Technology Officer - Member \nChief of Country Operations - Member \nChief Marketing Officer - Member \nMLRO - Member Secretary \n1.4.6 Three -line-of-defense \nIn order to facilitate timely detection of problems that exposes the bank towards \nhigher ML/TF risks thereby limiting the damage to the Bank, an effective internal \ncontrol system shall be in place. ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "hash": "5b72baf8bcb06d24af183c70d81bc299df0b782ecf6b96eb2475ef290b69cc50", "class_name": "RelatedNodeInfo"}}, "text": "Following the best practices, the Bank shall \nimplement three lines of defense as part of the effective risk management from \nAML/CFT aspect: \n \n \n \n \n \n \n \n \n \n \n Board of Directors \nAsset (Money) Laundering Prevention Committee \nCEO and Senior Management \nAML/CFT Committee \n1st line of defense \nAccountable for \neffective ML/TF risks \nmanagement arising \nfrom the business in \nwhich they are involved 2nd line of defense \nDevelop and implement \nrisk management \nframework that includes \nidentifying, assessing, \ncontrolling, monitoring, \nand reporting 3rd line of defense \nReview effectiveness of \nrisk management \npractices, recommend \nimprovements and \nenforce corrective \nactions if necessary \nFront Line Business \nBranch Managers, \nOperations In -charge, \nDepartment Heads/Unit \nHeads, Province Heads Risk Management \nCCO, CRO, COO, CIT, \nMLRO , \nBranch /Department \nAML Officer Internal Audit \nChief -Internal Audit ", "start_char_idx": 1540, "end_char_idx": 2485, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c6e72421-0c17-4c05-85ce-2010d1df2cea": {"__data__": {"id_": "c6e72421-0c17-4c05-85ce-2010d1df2cea", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "603ea3c1-06dc-4f3b-944a-9c6cc9673b9d", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. ", "original_text": "a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n"}, "hash": "454306167ebeedf8281c039a71abc3c5b3abd1e2c8ff67d6c79d551b116ebde7", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n", "start_char_idx": 0, "end_char_idx": 365, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "603ea3c1-06dc-4f3b-944a-9c6cc9673b9d": {"__data__": {"id_": "603ea3c1-06dc-4f3b-944a-9c6cc9673b9d", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. ", "original_text": "a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c6e72421-0c17-4c05-85ce-2010d1df2cea", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "83934c98e2e0fa2df6a53e96f215621b700a92548c6c3e9bb295ec8ee4d377b0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a0fc13ea-7924-4e50-95e1-f43f0559d329", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . ", "original_text": "b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. "}, "hash": "5d02a2d1c1ba1437cd632330ac44c460fb7d6a6a7e23aa3c127691528114ec07", "class_name": "RelatedNodeInfo"}}, "text": "a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n", "start_char_idx": 365, "end_char_idx": 524, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a0fc13ea-7924-4e50-95e1-f43f0559d329": {"__data__": {"id_": "a0fc13ea-7924-4e50-95e1-f43f0559d329", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . ", "original_text": "b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "603ea3c1-06dc-4f3b-944a-9c6cc9673b9d", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. ", "original_text": "a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "961779064ad21ef3ca2fd54f3b8e9a92416649729790e7b7331bab2cfa21718d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b1f955b6-bde3-4187-b7ec-0ccca333c31b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. ", "original_text": "Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n"}, "hash": "df71ac348a133faf2722617e8a75ffc1df2c057d715358ef918bc2c42a449988", "class_name": "RelatedNodeInfo"}}, "text": "b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. ", "start_char_idx": 524, "end_char_idx": 807, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b1f955b6-bde3-4187-b7ec-0ccca333c31b": {"__data__": {"id_": "b1f955b6-bde3-4187-b7ec-0ccca333c31b", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. ", "original_text": "Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a0fc13ea-7924-4e50-95e1-f43f0559d329", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . ", "original_text": "b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "789f3223e6e46b32012ac95a1728aa2b9be79245287c9f9e5bdf01f91d51997e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5b57b692-0186-4785-9cda-71e403686f43", "node_type": "1", "metadata": {"window": "a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. ", "original_text": "1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. "}, "hash": "bc18735276cc84f0534e972efc5a856e47adb5390f0d317776d715f29e0ae75f", "class_name": "RelatedNodeInfo"}}, "text": "Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n", "start_char_idx": 807, "end_char_idx": 978, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5b57b692-0186-4785-9cda-71e403686f43": {"__data__": {"id_": "5b57b692-0186-4785-9cda-71e403686f43", "embedding": null, "metadata": {"window": "a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. ", "original_text": "1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b1f955b6-bde3-4187-b7ec-0ccca333c31b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. ", "original_text": "Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "3ea62dea37699a96956b521e05f936d8eb55395d88690eefbd178aacbdd104a6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8086fd1e-b2ec-4070-975c-c2361133f6a4", "node_type": "1", "metadata": {"window": "b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n", "original_text": "They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . "}, "hash": "dc0d59d7a3f314bbf6868b84b523e86d1358d72588db9ce23a1b4a2845aa0101", "class_name": "RelatedNodeInfo"}}, "text": "1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. ", "start_char_idx": 978, "end_char_idx": 1199, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8086fd1e-b2ec-4070-975c-c2361133f6a4": {"__data__": {"id_": "8086fd1e-b2ec-4070-975c-c2361133f6a4", "embedding": null, "metadata": {"window": "b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n", "original_text": "They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5b57b692-0186-4785-9cda-71e403686f43", "node_type": "1", "metadata": {"window": "a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. ", "original_text": "1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "869f4c33f52f0c1bb5510a8825a2487b69d4a6022105bbb2bb821ec6638b4133", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ffb9a74a-b5ef-46fe-a18b-ccc6ba7da111", "node_type": "1", "metadata": {"window": "Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. ", "original_text": "Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. "}, "hash": "78d837bc31abf3b066fdc3e8415c7e8955997da4fedb0a3cf7e11e829951b74f", "class_name": "RelatedNodeInfo"}}, "text": "They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . ", "start_char_idx": 1199, "end_char_idx": 1396, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ffb9a74a-b5ef-46fe-a18b-ccc6ba7da111": {"__data__": {"id_": "ffb9a74a-b5ef-46fe-a18b-ccc6ba7da111", "embedding": null, "metadata": {"window": "Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. ", "original_text": "Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8086fd1e-b2ec-4070-975c-c2361133f6a4", "node_type": "1", "metadata": {"window": "b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n", "original_text": "They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "e76c5d98599a023a2223a240dbd5065d0cad8dce08d9cd269a786a6800c70592", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "bc11dbf0-462f-4bef-b531-78c07e33d133", "node_type": "1", "metadata": {"window": "1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n", "original_text": "He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. "}, "hash": "affaf167b6f4c17f95eff58ffa3cdb5caa7e366a8b828f9d4c2e8b43cd862fa8", "class_name": "RelatedNodeInfo"}}, "text": "Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. ", "start_char_idx": 1396, "end_char_idx": 1765, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "bc11dbf0-462f-4bef-b531-78c07e33d133": {"__data__": {"id_": "bc11dbf0-462f-4bef-b531-78c07e33d133", "embedding": null, "metadata": {"window": "1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n", "original_text": "He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ffb9a74a-b5ef-46fe-a18b-ccc6ba7da111", "node_type": "1", "metadata": {"window": "Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n 1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. ", "original_text": "Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "3f62e18bbdcc62e790e93048b4e193537633845add096cbd39de26f611df8b26", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0c284300-d9f9-441d-b582-6e6795221c4e", "node_type": "1", "metadata": {"window": "They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n", "original_text": "CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n"}, "hash": "5a8c0c82b76e1de79b5db0dcbf37857542b76826b02aa2a0dba88b886950b3f0", "class_name": "RelatedNodeInfo"}}, "text": "He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. ", "start_char_idx": 1765, "end_char_idx": 1879, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0c284300-d9f9-441d-b582-6e6795221c4e": {"__data__": {"id_": "0c284300-d9f9-441d-b582-6e6795221c4e", "embedding": null, "metadata": {"window": "They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n", "original_text": "CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "bc11dbf0-462f-4bef-b531-78c07e33d133", "node_type": "1", "metadata": {"window": "1.4.6.2 Second line of defense : risk management and compli ance \nfunction \nThe second line of defense shall support the first line of defense and to \noversee all type of compliance and financial controlling issues. They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n", "original_text": "He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "20e2519f881d8e1064ebb32ebf87ef072d9cc5570793edf9c28e464b5e736d99", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "1e759376-2456-49fa-a154-1a5e19aad3e9", "node_type": "1", "metadata": {"window": "Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. "}, "hash": "d1f1e856d93563002e4066e39cc890138aa7f653551fb9dd5d0e9d0dd4030d60", "class_name": "RelatedNodeInfo"}}, "text": "CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n", "start_char_idx": 1879, "end_char_idx": 2014, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "1e759376-2456-49fa-a154-1a5e19aad3e9": {"__data__": {"id_": "1e759376-2456-49fa-a154-1a5e19aad3e9", "embedding": null, "metadata": {"window": "Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0c284300-d9f9-441d-b582-6e6795221c4e", "node_type": "1", "metadata": {"window": "They are \nalso involved in monitoring for suspicious activity, sanctions compliance \nscreening (batch screening), and guiding in conducting initial and \nongoing screening of customer onboarding . Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n", "original_text": "CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "d5a81e6a9fcc6767faae819c3ff3e37cd803656b300ca89157b4789a05eea627", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "cf77eaa3-eda1-41a1-84ee-75ca0759b985", "node_type": "1", "metadata": {"window": "He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n"}, "hash": "2ecdbf9a31041aea0c52de00792f17a7c8388ca5e4d86644395f85fa82af2644", "class_name": "RelatedNodeInfo"}}, "text": "b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. ", "start_char_idx": 2014, "end_char_idx": 2248, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "cf77eaa3-eda1-41a1-84ee-75ca0759b985": {"__data__": {"id_": "cf77eaa3-eda1-41a1-84ee-75ca0759b985", "embedding": null, "metadata": {"window": "He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "1e759376-2456-49fa-a154-1a5e19aad3e9", "node_type": "1", "metadata": {"window": "Are to monitor and report risk \nrelated practices and information, \nThe second line of defense , besides MLRO, shall be performed by the \nfollowing officers/authorities \na. Chief Compliance Officer shall be re sponsible to ensure that the \nBank has adequate policie s and systems to safeguard the B ank \nagainst the risk s of being used for any illicit activities. He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "76de120a5e012548d8c1fd74801e9e9caad973e57765aa5d81b6d0b522ff2ebf", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5622feb7-e8d7-436c-b3da-101d0b4f4f06", "node_type": "1", "metadata": {"window": "CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n"}, "hash": "df855f55defbcceb5c5057f9771280288135a3b210d1ec223d121bb121b09a76", "class_name": "RelatedNodeInfo"}}, "text": "The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n", "start_char_idx": 2248, "end_char_idx": 2440, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5622feb7-e8d7-436c-b3da-101d0b4f4f06": {"__data__": {"id_": "5622feb7-e8d7-436c-b3da-101d0b4f4f06", "embedding": null, "metadata": {"window": "CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "cf77eaa3-eda1-41a1-84ee-75ca0759b985", "node_type": "1", "metadata": {"window": "He/she shall \ncommunicate to the top management and the B oard level committee \ntowards managing the ML/TF ri sk. CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "4e74641a6e77a69761c54229e7b65af1a3a01a950f0511d192ce6779c2da3d63", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ff3e9c00-eb71-4900-9413-b6deada6e561", "node_type": "1", "metadata": {"window": "b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . "}, "hash": "9efd70d5bee1f5abb6cb6dbff0899553e9f39a0e34c073e0546317a1cafb4537", "class_name": "RelatedNodeInfo"}}, "text": "c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n", "start_char_idx": 2440, "end_char_idx": 2598, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ff3e9c00-eb71-4900-9413-b6deada6e561": {"__data__": {"id_": "ff3e9c00-eb71-4900-9413-b6deada6e561", "embedding": null, "metadata": {"window": "b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700", "node_type": "4", "metadata": {"page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5622feb7-e8d7-436c-b3da-101d0b4f4f06", "node_type": "1", "metadata": {"window": "CCO shall also be responsible for \neffective implementation of the policies and guidelines/manuals, in all \nareas within the Bank. \n \n b. Chief Risk Officer shall have to monitor operating effectiveness of \nmitigating controls and conduct assessment of the residual risk, \nwhich considers the effectiveness/status of the controls against the \nML/TF risks of the bank. The residual risk should be measured and \nwithin the bank\u2019s risk appetite , otherwise an action plan is to be \ndeveloped in correcting underperforming controls based on identified \ngaps. \n \n c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "original_text": "c. Chief Operating Officer shall be responsible for establishing proper \nimplementation mechanism of checks/control as per this Policy \nacross the Bank. \n \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "hash": "bdf5de8c6dfb83da44831757447429f3a9eaebfd979bc4fbe600a52be7c35e81", "class_name": "RelatedNodeInfo"}}, "text": "d. Chief -Information Technology Officer shall be responsible for \nproviding appropriate level of assurance to the Bank that the system \nproduces accurate results / reports that helps to implement AML/CFT \nprogram . ", "start_char_idx": 2598, "end_char_idx": 2817, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "32da5209-b7d2-4eb3-8d14-ef013b8d4938": {"__data__": {"id_": "32da5209-b7d2-4eb3-8d14-ef013b8d4938", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . ", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be", "node_type": "4", "metadata": {"page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "hash": "9f00ef0cd92cdc37b15d3c18b87090808cdec56e7142dfc31604b063370431ba", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f5793231-5cbd-4197-a8f7-0eeb8fb4c6c1", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "This officer shall report to the MLRO or the \nAML/CFT Unit. \n"}, "hash": "d699384f91592bde58ce6579817a6da3ede5db7755c1959de6a013c082497025", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . ", "start_char_idx": 0, "end_char_idx": 265, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f5793231-5cbd-4197-a8f7-0eeb8fb4c6c1": {"__data__": {"id_": "f5793231-5cbd-4197-a8f7-0eeb8fb4c6c1", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "This officer shall report to the MLRO or the \nAML/CFT Unit. \n", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be", "node_type": "4", "metadata": {"page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "hash": "9f00ef0cd92cdc37b15d3c18b87090808cdec56e7142dfc31604b063370431ba", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "32da5209-b7d2-4eb3-8d14-ef013b8d4938", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . ", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "hash": "7adcf5857543a7ef972bb4df8de54f47bca7c343265c37c498a861943f83c876", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8847a2eb-c347-4971-94f1-45a7f1688aac", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "1.4.6.3 Third line of defense : internal audit function. \n"}, "hash": "54f5921346d899e011cf4fef3d37ee00668cfe5e6fcd51bfe020712d5b1c8566", "class_name": "RelatedNodeInfo"}}, "text": "This officer shall report to the MLRO or the \nAML/CFT Unit. \n", "start_char_idx": 265, "end_char_idx": 329, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8847a2eb-c347-4971-94f1-45a7f1688aac": {"__data__": {"id_": "8847a2eb-c347-4971-94f1-45a7f1688aac", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "1.4.6.3 Third line of defense : internal audit function. \n", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be", "node_type": "4", "metadata": {"page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "hash": "9f00ef0cd92cdc37b15d3c18b87090808cdec56e7142dfc31604b063370431ba", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f5793231-5cbd-4197-a8f7-0eeb8fb4c6c1", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "This officer shall report to the MLRO or the \nAML/CFT Unit. \n", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "hash": "084bc82d83027f7ce83998b95b6b62fc237a7d62cc2cd1c4c5b411b417fe45fe", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9c608428-da65-4cb9-bb75-fbc5c66ccd01", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "The Third Line of Defense will be performed by internal audit. "}, "hash": "7ae98f78b937b958a5d39893facb21dc09b8817b03b77c590188e28f6d5bb375", "class_name": "RelatedNodeInfo"}}, "text": "1.4.6.3 Third line of defense : internal audit function. \n", "start_char_idx": 329, "end_char_idx": 390, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9c608428-da65-4cb9-bb75-fbc5c66ccd01": {"__data__": {"id_": "9c608428-da65-4cb9-bb75-fbc5c66ccd01", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "The Third Line of Defense will be performed by internal audit. ", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be", "node_type": "4", "metadata": {"page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "hash": "9f00ef0cd92cdc37b15d3c18b87090808cdec56e7142dfc31604b063370431ba", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8847a2eb-c347-4971-94f1-45a7f1688aac", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "1.4.6.3 Third line of defense : internal audit function. \n", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "hash": "827d83689f32c53615e4d764a5ca96d1b191397a85ad5fed5210fe5e80efa997", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e3f05e59-fcfb-46c1-8e98-1e1783599004", "node_type": "1", "metadata": {"window": "This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n "}, "hash": "94ca39bac6e31e4419d6832e205be4ff2117e9b40483d3278efbfd6f4ab77ae5", "class_name": "RelatedNodeInfo"}}, "text": "The Third Line of Defense will be performed by internal audit. ", "start_char_idx": 390, "end_char_idx": 453, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e3f05e59-fcfb-46c1-8e98-1e1783599004": {"__data__": {"id_": "e3f05e59-fcfb-46c1-8e98-1e1783599004", "embedding": null, "metadata": {"window": "This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be", "node_type": "4", "metadata": {"page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "hash": "9f00ef0cd92cdc37b15d3c18b87090808cdec56e7142dfc31604b063370431ba", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9c608428-da65-4cb9-bb75-fbc5c66ccd01", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "original_text": "The Third Line of Defense will be performed by internal audit. ", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "hash": "88634c83876f2bf004c51edabbe4d8f1e4b7cffa015e9dbdbab2351023b887b9", "class_name": "RelatedNodeInfo"}}, "text": "The Bank \u2019s \ninternal audit shall carry out AML/CFT theme -based audit, through a risk -\nbased approach, where it will review activities (effectiveness) of the first \ntwo lines of defense with the purpose to ensure to the BOD and senior \nmanagement that applicable act/ rules/ directives and internal policies / \nmanuals requ irements are being carried out effectively. \n ", "start_char_idx": 453, "end_char_idx": 829, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f24a6dc4-2427-4dd3-9bb8-61fe621a59cb": {"__data__": {"id_": "f24a6dc4-2427-4dd3-9bb8-61fe621a59cb", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "df0cb8c7-a553-454b-ba68-82ec87b30299", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n", "original_text": "The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n"}, "hash": "16df2a43dca297d8281de9293cae7f746f098d16bc6fcc25620d1c8e093e08e3", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. ", "start_char_idx": 0, "end_char_idx": 205, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "df0cb8c7-a553-454b-ba68-82ec87b30299": {"__data__": {"id_": "df0cb8c7-a553-454b-ba68-82ec87b30299", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n", "original_text": "The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f24a6dc4-2427-4dd3-9bb8-61fe621a59cb", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "299f146ae3ad1b00f87cdb9c7ed94a029d7512674f8efdd380f0fa8c7c3f3d7b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "413faf23-1ff4-4f8e-a48b-d9509c3d23ae", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. ", "original_text": "2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. "}, "hash": "a21614df9263e506eeffad1449d0c0d7fab11b8b777ec76f60a1cacd6f307e9a", "class_name": "RelatedNodeInfo"}}, "text": "The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n", "start_char_idx": 205, "end_char_idx": 376, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "413faf23-1ff4-4f8e-a48b-d9509c3d23ae": {"__data__": {"id_": "413faf23-1ff4-4f8e-a48b-d9509c3d23ae", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. ", "original_text": "2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "df0cb8c7-a553-454b-ba68-82ec87b30299", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n", "original_text": "The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "c8a6042f70c5da68ceab1fc20bce02a413f12def583ea1a591819bc216f61efb", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9e5d2a5d-d5f2-4612-a45c-8e15a890ceb2", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n", "original_text": "The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n"}, "hash": "cb2cafdb58762b15f97f82106366983025068e949e69b6036be62bf9067d9cf1", "class_name": "RelatedNodeInfo"}}, "text": "2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. ", "start_char_idx": 376, "end_char_idx": 822, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9e5d2a5d-d5f2-4612-a45c-8e15a890ceb2": {"__data__": {"id_": "9e5d2a5d-d5f2-4612-a45c-8e15a890ceb2", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n", "original_text": "The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "413faf23-1ff4-4f8e-a48b-d9509c3d23ae", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. ", "original_text": "2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "bccb94968e8dcf617476362fbaf44ce68f36bcb1131cbd764d794a0df94933f5", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b9707183-c73e-4aee-8864-fee85b148ec9", "node_type": "1", "metadata": {"window": "The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n", "original_text": "b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n"}, "hash": "928f90e2ae48bc192a2a1b4bde004d1b78da246397bf73c7587e41d10f5663af", "class_name": "RelatedNodeInfo"}}, "text": "The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n", "start_char_idx": 822, "end_char_idx": 982, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b9707183-c73e-4aee-8864-fee85b148ec9": {"__data__": {"id_": "b9707183-c73e-4aee-8864-fee85b148ec9", "embedding": null, "metadata": {"window": "The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n", "original_text": "b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9e5d2a5d-d5f2-4612-a45c-8e15a890ceb2", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n", "original_text": "The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "a702d359d36a1e5917105a9e044c88bd28520a67aeddc631cebb29bef3c1b6ca", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "90e148e7-14d9-4881-861d-0786b910c721", "node_type": "1", "metadata": {"window": "2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). ", "original_text": "c. Identify the beneficial owner. "}, "hash": "b7fbbc8d2e6a11d11ff5c3d8402d75db0044d3bacfbbcbcbfd8c26e183df1d6b", "class_name": "RelatedNodeInfo"}}, "text": "b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n", "start_char_idx": 982, "end_char_idx": 1091, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "90e148e7-14d9-4881-861d-0786b910c721": {"__data__": {"id_": "90e148e7-14d9-4881-861d-0786b910c721", "embedding": null, "metadata": {"window": "2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). ", "original_text": "c. Identify the beneficial owner. ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b9707183-c73e-4aee-8864-fee85b148ec9", "node_type": "1", "metadata": {"window": "The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n", "original_text": "b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "2b205092467c1ef9df24f984af27d297aa5ac6f8019d2c143a2f67fa7d7dffda", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c85b5a7b-c07c-456c-b67e-041c52a49a9c", "node_type": "1", "metadata": {"window": "The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n", "original_text": "This includes knowing and understanding the \nowners hip and control structure of the customer . \n"}, "hash": "e573d6c39042db4556042ad5200300cb323a8e766e0164ec080e9e072b3304fd", "class_name": "RelatedNodeInfo"}}, "text": "c. Identify the beneficial owner. ", "start_char_idx": 1091, "end_char_idx": 1125, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c85b5a7b-c07c-456c-b67e-041c52a49a9c": {"__data__": {"id_": "c85b5a7b-c07c-456c-b67e-041c52a49a9c", "embedding": null, "metadata": {"window": "The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n", "original_text": "This includes knowing and understanding the \nowners hip and control structure of the customer . \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "90e148e7-14d9-4881-861d-0786b910c721", "node_type": "1", "metadata": {"window": "2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). ", "original_text": "c. Identify the beneficial owner. ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "5dca85609cb96aed433b1b962275e03b43d4ee7583c4345b904bd649e25f8134", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8fa24c22-6fbd-4ab5-a8df-d0043157c950", "node_type": "1", "metadata": {"window": "b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n"}, "hash": "fd87ffc44d4399da9e1f529498b70d2bb52fc39da68fe6900ceb4b3aee0bba6b", "class_name": "RelatedNodeInfo"}}, "text": "This includes knowing and understanding the \nowners hip and control structure of the customer . \n", "start_char_idx": 1125, "end_char_idx": 1223, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8fa24c22-6fbd-4ab5-a8df-d0043157c950": {"__data__": {"id_": "8fa24c22-6fbd-4ab5-a8df-d0043157c950", "embedding": null, "metadata": {"window": "b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c85b5a7b-c07c-456c-b67e-041c52a49a9c", "node_type": "1", "metadata": {"window": "The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n", "original_text": "This includes knowing and understanding the \nowners hip and control structure of the customer . \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "5080ed4315173fddd9c014f727d36f766efd6b3cccfbf6fb25d0ddc89c847dcf", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d7f0868b-795a-4340-8ac3-625b21cf4b6f", "node_type": "1", "metadata": {"window": "c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). "}, "hash": "167058db05273506a756d3426a8d779e75b1b4165f550aa30e05f382b8174c6a", "class_name": "RelatedNodeInfo"}}, "text": "d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n", "start_char_idx": 1223, "end_char_idx": 1334, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d7f0868b-795a-4340-8ac3-625b21cf4b6f": {"__data__": {"id_": "d7f0868b-795a-4340-8ac3-625b21cf4b6f", "embedding": null, "metadata": {"window": "c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8fa24c22-6fbd-4ab5-a8df-d0043157c950", "node_type": "1", "metadata": {"window": "b. Verify the identity of the customer using reliable, independent source \ndocuments, data or information. \n c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "d029e425b79140f42085ebf942dabbb49db3e1ebc31aacaf69970bba9bbd39d9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7c5c4726-bc4f-48d9-9331-ad444749d3ae", "node_type": "1", "metadata": {"window": "This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n"}, "hash": "6dd021664d0c6c34da4473dfdfc0dac0966a3790af372b371f5f9cb913ae64d4", "class_name": "RelatedNodeInfo"}}, "text": "e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). ", "start_char_idx": 1334, "end_char_idx": 1433, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7c5c4726-bc4f-48d9-9331-ad444749d3ae": {"__data__": {"id_": "7c5c4726-bc4f-48d9-9331-ad444749d3ae", "embedding": null, "metadata": {"window": "This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d7f0868b-795a-4340-8ac3-625b21cf4b6f", "node_type": "1", "metadata": {"window": "c. Identify the beneficial owner. This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "ccf9f753bc3935210a66e31ebffed716844d689adc6c881d08c8473b38c3ba63", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "aec64413-f360-4c95-891e-294655fa24f5", "node_type": "1", "metadata": {"window": "d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision "}, "hash": "ec56d519b5f042f9af4295312a37bac7ea2feac9e6501ad3e469050709820640", "class_name": "RelatedNodeInfo"}}, "text": "The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n", "start_char_idx": 1433, "end_char_idx": 1550, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "aec64413-f360-4c95-891e-294655fa24f5": {"__data__": {"id_": "aec64413-f360-4c95-891e-294655fa24f5", "embedding": null, "metadata": {"window": "d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455", "node_type": "4", "metadata": {"page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7c5c4726-bc4f-48d9-9331-ad444749d3ae", "node_type": "1", "metadata": {"window": "This includes knowing and understanding the \nowners hip and control structure of the customer . \n d. Conduct periodic name screening of the customer base to identify high risk \nor any prohibited customers. \n e. Give special consideration to the treatment of PEPs (whether as customer or \nbeneficial owner). The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "original_text": "The bank shal l: \ni. Have appropriate systems to determine whether the customer or the \nbeneficial owner is a PEP. \n", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "hash": "04ae7163c72c4938ebec2c1307d6d4ab798c907d15d7f61d181a24e45702ca84", "class_name": "RelatedNodeInfo"}}, "text": "Customer \nIdentification \nProcedures \nRisk Management \nKYC \nIdentity customer \n \nIdentify purpose \n \nIdentify \nbeneficial owner \n \nVerify address \nCDD (SCDD / CDD / ECDD) \nIdentify \nML/TF risk \nAssign \nRisk \nHigh \nMedium \nLow \nName \nScreening \nSanction list \n \nPEP \n \nAdverse media \n \n \nCustomer \nAcceptance \nPolicy \nMonitoring \nPeriodic \n \nEvent driven \n \nTransaction \nmonitoring \nReview \nCustome r \nCountry \nGeography \nProducts & \nservices \nApprove and \nestablish \nrelationship or \nreject and exit \nrelationship with \ncustomer \nDecision ", "start_char_idx": 1550, "end_char_idx": 2115, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "47be1383-b4c3-4b46-b1bb-612f115cb5cd": {"__data__": {"id_": "47be1383-b4c3-4b46-b1bb-612f115cb5cd", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n9 ii. ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "46cb1d52-0f0b-4b17-8e1f-3432aae4826c", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n", "original_text": "Obtain senior management approval for establishing or continuing \nsuch relationships. \n"}, "hash": "deaa9bf07174eba1aa42f87300d970b884e366dbf37d432eefe19fabcdcded1d", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n9 ii. ", "start_char_idx": 0, "end_char_idx": 51, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "46cb1d52-0f0b-4b17-8e1f-3432aae4826c": {"__data__": {"id_": "46cb1d52-0f0b-4b17-8e1f-3432aae4826c", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n", "original_text": "Obtain senior management approval for establishing or continuing \nsuch relationships. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "47be1383-b4c3-4b46-b1bb-612f115cb5cd", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n9 ii. ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "c1f898de4d34f2aca0e856db29fc849b3df20423e5a762819f659de907913e00", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "778b8bd0-445d-4c66-8804-9c1e37888ea4", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n", "original_text": "iii. "}, "hash": "c1b4fcff71d7a82d3d6fa3e55efaec16c1b3369f7c7efc488a4af9a09eef1761", "class_name": "RelatedNodeInfo"}}, "text": "Obtain senior management approval for establishing or continuing \nsuch relationships. \n", "start_char_idx": 51, "end_char_idx": 139, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "778b8bd0-445d-4c66-8804-9c1e37888ea4": {"__data__": {"id_": "778b8bd0-445d-4c66-8804-9c1e37888ea4", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n", "original_text": "iii. ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "46cb1d52-0f0b-4b17-8e1f-3432aae4826c", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n", "original_text": "Obtain senior management approval for establishing or continuing \nsuch relationships. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "0ed019a61a969dd225a7dfc44580580ba02320bd86af4986565128c266fe4342", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8acd8464-081a-4d21-a2d8-811bc8a41922", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n", "original_text": "Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. "}, "hash": "e33f4666a4f61d66030669a2adc1b46267e6c3e4fcf0563e84148de0520bd7fd", "class_name": "RelatedNodeInfo"}}, "text": "iii. ", "start_char_idx": 139, "end_char_idx": 144, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8acd8464-081a-4d21-a2d8-811bc8a41922": {"__data__": {"id_": "8acd8464-081a-4d21-a2d8-811bc8a41922", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n", "original_text": "Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "778b8bd0-445d-4c66-8804-9c1e37888ea4", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n", "original_text": "iii. ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "fde14e3c37db5eb898835853897f71d7146ad61734dd69a4c09617883221aced", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c895e787-7815-4877-a7df-afab66f0636a", "node_type": "1", "metadata": {"window": "Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. ", "original_text": "Conduct enhanced customer due diligence. \n \n"}, "hash": "b5746a0d01def69dd08ce8a4d0738e931ca100f0663bfe84cfc098d378d33f2f", "class_name": "RelatedNodeInfo"}}, "text": "Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. ", "start_char_idx": 144, "end_char_idx": 230, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c895e787-7815-4877-a7df-afab66f0636a": {"__data__": {"id_": "c895e787-7815-4877-a7df-afab66f0636a", "embedding": null, "metadata": {"window": "Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. ", "original_text": "Conduct enhanced customer due diligence. \n \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8acd8464-081a-4d21-a2d8-811bc8a41922", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n", "original_text": "Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "b24f546ed7b09e7099f7ffc7fd312c923ba29f8bdf91c1c0e0954750714d5b0e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "296c8197-079b-4c2d-b812-f74780c73c32", "node_type": "1", "metadata": {"window": "iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n", "original_text": "f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n"}, "hash": "fa5cc1983ef3e194ed1e1d9515e54d236abb7f35d93d6017e42f5b5a01360c22", "class_name": "RelatedNodeInfo"}}, "text": "Conduct enhanced customer due diligence. \n \n", "start_char_idx": 230, "end_char_idx": 275, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "296c8197-079b-4c2d-b812-f74780c73c32": {"__data__": {"id_": "296c8197-079b-4c2d-b812-f74780c73c32", "embedding": null, "metadata": {"window": "iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n", "original_text": "f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c895e787-7815-4877-a7df-afab66f0636a", "node_type": "1", "metadata": {"window": "Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. ", "original_text": "Conduct enhanced customer due diligence. \n \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "7b7b0ad58124d3185e6b052afa7479563d0297d93785e1d40c8d3db9f6197e9b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a80953f0-5fd7-434d-8fc0-cfd43266c141", "node_type": "1", "metadata": {"window": "Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n", "original_text": "g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n"}, "hash": "48d54bbbbe1e9c194cbabd72da41452ff221aa1d884636770fb6c103a5ecfc53", "class_name": "RelatedNodeInfo"}}, "text": "f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n", "start_char_idx": 275, "end_char_idx": 598, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a80953f0-5fd7-434d-8fc0-cfd43266c141": {"__data__": {"id_": "a80953f0-5fd7-434d-8fc0-cfd43266c141", "embedding": null, "metadata": {"window": "Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n", "original_text": "g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "296c8197-079b-4c2d-b812-f74780c73c32", "node_type": "1", "metadata": {"window": "iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n", "original_text": "f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "b3431f39305ad838bf3265cce86777e4406bd3654c77037d8d1f5c185c2984d1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2a7e0776-0b2c-48ed-a2cc-258375452620", "node_type": "1", "metadata": {"window": "Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . ", "original_text": "2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. "}, "hash": "725afaa69352fcb60fd521ded2a44aec744360962d8f1d07d03a91ee7f4fd7cc", "class_name": "RelatedNodeInfo"}}, "text": "g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n", "start_char_idx": 598, "end_char_idx": 909, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2a7e0776-0b2c-48ed-a2cc-258375452620": {"__data__": {"id_": "2a7e0776-0b2c-48ed-a2cc-258375452620", "embedding": null, "metadata": {"window": "Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . ", "original_text": "2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a80953f0-5fd7-434d-8fc0-cfd43266c141", "node_type": "1", "metadata": {"window": "Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n", "original_text": "g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "423c5becb47d1b8e58be98d9873dd5f498b7c535c9c2aa46915bdd148cd2a713", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "faa27de2-ed4c-48b4-8317-fc0e869a4a36", "node_type": "1", "metadata": {"window": "f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n", "original_text": "The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n"}, "hash": "3e8f113ffa0b21c75bd7af4b0d731f9345c3ed3b5bacc6e1f780266eed6b9fd0", "class_name": "RelatedNodeInfo"}}, "text": "2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. ", "start_char_idx": 909, "end_char_idx": 1160, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "faa27de2-ed4c-48b4-8317-fc0e869a4a36": {"__data__": {"id_": "faa27de2-ed4c-48b4-8317-fc0e869a4a36", "embedding": null, "metadata": {"window": "f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n", "original_text": "The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2a7e0776-0b2c-48ed-a2cc-258375452620", "node_type": "1", "metadata": {"window": "Conduct enhanced customer due diligence. \n \n f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . ", "original_text": "2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "144fe5b59ef441c688594ee29a3ef25df0aeb10d5e0088c86626bd585809133c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "463072b0-0ada-437e-bb65-bf0976ef72b3", "node_type": "1", "metadata": {"window": "g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n"}, "hash": "36bdecf469e1cedb22983234406de6f950ee77c25d6633e42d0a3a6349615270", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n", "start_char_idx": 1160, "end_char_idx": 1511, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "463072b0-0ada-437e-bb65-bf0976ef72b3": {"__data__": {"id_": "463072b0-0ada-437e-bb65-bf0976ef72b3", "embedding": null, "metadata": {"window": "g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "faa27de2-ed4c-48b4-8317-fc0e869a4a36", "node_type": "1", "metadata": {"window": "f. Conduct ongoing due diligence on the business relationship and scrutiny of \ntransactions undertaken throughout the course of that relationship to ensure \nthat the transactions being conducted by its customers are consistent with \nthe Bank\u2019s knowledge of the customers and the customers\u2019 businesses and \nrisk profiles. \n g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n", "original_text": "The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "47f0f153b061c3e5dd36a40062e5230982b86dfdbe6c054ef7747f87b203fa64", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4e248107-2035-4199-bc08-c74b49d5fcc6", "node_type": "1", "metadata": {"window": "2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . "}, "hash": "3192ac1f24ebb42b31cc4c2c8b10211dc00a67b6d7c5c9a05993d5e4d6c901e5", "class_name": "RelatedNodeInfo"}}, "text": "2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n", "start_char_idx": 1511, "end_char_idx": 1945, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4e248107-2035-4199-bc08-c74b49d5fcc6": {"__data__": {"id_": "4e248107-2035-4199-bc08-c74b49d5fcc6", "embedding": null, "metadata": {"window": "2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "463072b0-0ada-437e-bb65-bf0976ef72b3", "node_type": "1", "metadata": {"window": "g. Customer onboarding and verification through technological applications \n(internet, telephone, fax, postal services or others) shall be base d on a risk -\nbased approach which shall be as robust as those for face - to-face customer \nverification and in adherence with the prevailing regulations and laws. \n 2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "1b0f9ac013c5921c626da62eddb015b1d59fed9d6397dfb692804f29895cf702", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "cfdfad83-3486-47fc-9d06-18e966e50b7c", "node_type": "1", "metadata": {"window": "The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n"}, "hash": "a8b22dde5348d4f9d7340cda63774d36e6371fe82fb75fd544c25f56a29de7a5", "class_name": "RelatedNodeInfo"}}, "text": "b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . ", "start_char_idx": 1945, "end_char_idx": 2309, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "cfdfad83-3486-47fc-9d06-18e966e50b7c": {"__data__": {"id_": "cfdfad83-3486-47fc-9d06-18e966e50b7c", "embedding": null, "metadata": {"window": "The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4e248107-2035-4199-bc08-c74b49d5fcc6", "node_type": "1", "metadata": {"window": "2.2.2 Risk Management \nThe Bank shall establish system of risk grading of each customer based on their \nrisk profile by evaluating the impact of transactions to the Bank and as guided by \nAsset (Money) Laundering Prevention Act and NRB Directive. The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "b2e87703a576cb5025c86c021e61bc3ac39df29a311a53f52fe8ddf0003ef12b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "50e9c42c-bb86-4291-a2a7-bd60a71a466e", "node_type": "1", "metadata": {"window": "2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n "}, "hash": "26d38b462e4623b43bc6a9e4aee884c805be84fcda43a7082d88e700236949a1", "class_name": "RelatedNodeInfo"}}, "text": "In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n", "start_char_idx": 2309, "end_char_idx": 2436, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "50e9c42c-bb86-4291-a2a7-bd60a71a466e": {"__data__": {"id_": "50e9c42c-bb86-4291-a2a7-bd60a71a466e", "embedding": null, "metadata": {"window": "2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "b85e2633-a0dd-4abd-8398-c44410232847", "node_type": "4", "metadata": {"page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "cfdfad83-3486-47fc-9d06-18e966e50b7c", "node_type": "1", "metadata": {"window": "The Bank shall \nconsider other influencing factors such as geography or country , customers \n(including occupation, profession, and type), product or service availed, nature of \nthe transaction, and delivery channels used in categorizing customers as per the \nrisks associated with them into \u201cLow Risk\u201d, \u201cMedium Risk\u201d, and \u201cHigh Risk\u201d \ncategories. \n 2.2.2.1 Identification of inherent ML/TF risk \nTo assess the inherent ML/TF risks faced by the Bank, Bank shall include \nthe following risk categories in its risk assessment process: \na. Customer \nThe Bank shall determine the potential ML and TF risks posed by a \ncustomer, or category of customers, based on occupation, profession, \nand transaction , which shall be in line with the recommendation of \nFATF and the Regulator. \n b. Country \nThe Bank shall introduce mechanism / system to identify high risk \njurisdiction/ sanctions countries known to be supporting international \nterrorism, and those with deficiencies in combatting money laundering \nand terrorist financing before establishing relationship and carrying out \nthe transaction on behalf of a customer thus requiring ECDD . In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "original_text": "In doing \nso the bank shall include countries identified by FATF as lacking \nadequate money laundering laws and regulations . \n", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "hash": "739aa80fbb3f30c8a3f26c7d953eea945383b13d8bdbe6e3f2f913d565777f2f", "class_name": "RelatedNodeInfo"}}, "text": "c. Geography \nThe Bank shall assess the risk of its customers or transactions \nconducted in geographical areas within the country where illegal \nactivities are high. \n \n ", "start_char_idx": 2436, "end_char_idx": 2610, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5fb9c9ec-1b0e-4967-aceb-2b86d57f22fd": {"__data__": {"id_": "5fb9c9ec-1b0e-4967-aceb-2b86d57f22fd", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ff25c099-aa59-464c-a08c-fdb3791ab5dd", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n", "original_text": "The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n"}, "hash": "4befaa4807acc27845d7283adeef370dc9a72cc2f29ddcaf62f09c23bf04a1ae", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. ", "start_char_idx": 0, "end_char_idx": 215, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ff25c099-aa59-464c-a08c-fdb3791ab5dd": {"__data__": {"id_": "ff25c099-aa59-464c-a08c-fdb3791ab5dd", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n", "original_text": "The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5fb9c9ec-1b0e-4967-aceb-2b86d57f22fd", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "f58b80df674ffadaeedc902ee5e325938b656cff18f5c66ad4da4011f1e2d34a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ea4724d4-0293-4e1e-a176-0bea52a3e5f3", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n", "original_text": "2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. "}, "hash": "f22c4e8b6728a05da71f0816d8d95c590bd9c86f376ef3f67140c07fc55399fe", "class_name": "RelatedNodeInfo"}}, "text": "The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n", "start_char_idx": 215, "end_char_idx": 323, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ea4724d4-0293-4e1e-a176-0bea52a3e5f3": {"__data__": {"id_": "ea4724d4-0293-4e1e-a176-0bea52a3e5f3", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n", "original_text": "2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ff25c099-aa59-464c-a08c-fdb3791ab5dd", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n", "original_text": "The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "bc817c10f349d28c6967092ea63de75380786f59f481feef4f2ef326c8d63b8a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f9cc2420-88fe-404c-b7dc-a64dc68fa7ec", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n", "original_text": "For this, the Bank shall rely on internal \naudit and internal compliance testing. "}, "hash": "98e1ef199cbb7d9c3e303c301ad11f7486c6a09bc60557a34764a5c4c3740c42", "class_name": "RelatedNodeInfo"}}, "text": "2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. ", "start_char_idx": 323, "end_char_idx": 472, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f9cc2420-88fe-404c-b7dc-a64dc68fa7ec": {"__data__": {"id_": "f9cc2420-88fe-404c-b7dc-a64dc68fa7ec", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n", "original_text": "For this, the Bank shall rely on internal \naudit and internal compliance testing. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ea4724d4-0293-4e1e-a176-0bea52a3e5f3", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n", "original_text": "2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "7434b46d6f4f0b6e5140c0bae14452c940d48937055a6b05faac156db4d8be11", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "860c4228-3dfe-4204-8555-d3f93f30e982", "node_type": "1", "metadata": {"window": "The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n", "original_text": "The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n"}, "hash": "4396130f247d951f30291cb4ba374222c3481cdfdceba5786358c29504598b36", "class_name": "RelatedNodeInfo"}}, "text": "For this, the Bank shall rely on internal \naudit and internal compliance testing. ", "start_char_idx": 472, "end_char_idx": 556, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "860c4228-3dfe-4204-8555-d3f93f30e982": {"__data__": {"id_": "860c4228-3dfe-4204-8555-d3f93f30e982", "embedding": null, "metadata": {"window": "The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n", "original_text": "The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f9cc2420-88fe-404c-b7dc-a64dc68fa7ec", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n", "original_text": "For this, the Bank shall rely on internal \naudit and internal compliance testing. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "8e0bfb2b085e8a9db71ba4d6699c894f001c986c429ad7846c64b8822c53ba03", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6a65d6cc-b8ef-4b49-a1b9-06501f385281", "node_type": "1", "metadata": {"window": "2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n", "original_text": "The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n"}, "hash": "7e928eb0721ecf16dc8eece2af51dd54667e93ab42ead75ad1f09060286c77a7", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n", "start_char_idx": 556, "end_char_idx": 685, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6a65d6cc-b8ef-4b49-a1b9-06501f385281": {"__data__": {"id_": "6a65d6cc-b8ef-4b49-a1b9-06501f385281", "embedding": null, "metadata": {"window": "2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n", "original_text": "The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "860c4228-3dfe-4204-8555-d3f93f30e982", "node_type": "1", "metadata": {"window": "The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n", "original_text": "The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "56d29f02341b564b00d3a685520266feccbefb85090b7a670128d3d6b8fb37e6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "deb4207f-47b8-4363-ac6c-c00cf633e9a3", "node_type": "1", "metadata": {"window": "For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n", "original_text": "b. Effectiveness of controls to manage and mitigate the assessed risks. \n"}, "hash": "2644794883657c771eeab3c1677fcccbc59bd4a09c83b58e433dea79f92562c5", "class_name": "RelatedNodeInfo"}}, "text": "The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n", "start_char_idx": 685, "end_char_idx": 807, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "deb4207f-47b8-4363-ac6c-c00cf633e9a3": {"__data__": {"id_": "deb4207f-47b8-4363-ac6c-c00cf633e9a3", "embedding": null, "metadata": {"window": "For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n", "original_text": "b. Effectiveness of controls to manage and mitigate the assessed risks. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6a65d6cc-b8ef-4b49-a1b9-06501f385281", "node_type": "1", "metadata": {"window": "2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n", "original_text": "The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "4d0e167d71da749cb2db24953bf46cdb4af819afd87eb2bc7dfeeea658ec0345", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "70207f0b-28b6-4000-9af1-a9751ec388a1", "node_type": "1", "metadata": {"window": "The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n", "original_text": "c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n"}, "hash": "d15698ebcc1365ae14249f7df216e227d7fc0f6fc47d4a5cf676d9b14e709f36", "class_name": "RelatedNodeInfo"}}, "text": "b. Effectiveness of controls to manage and mitigate the assessed risks. \n", "start_char_idx": 807, "end_char_idx": 881, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "70207f0b-28b6-4000-9af1-a9751ec388a1": {"__data__": {"id_": "70207f0b-28b6-4000-9af1-a9751ec388a1", "embedding": null, "metadata": {"window": "The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n", "original_text": "c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "deb4207f-47b8-4363-ac6c-c00cf633e9a3", "node_type": "1", "metadata": {"window": "For this, the Bank shall rely on internal \naudit and internal compliance testing. The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n", "original_text": "b. Effectiveness of controls to manage and mitigate the assessed risks. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "3ae0818aa5ff701096fa6277e98097174dc6a23b185f289b0dbb2267de689e54", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "35b30ee3-83d7-4c50-a533-590b75092687", "node_type": "1", "metadata": {"window": "The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n", "original_text": "d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n"}, "hash": "0c0c9d96b976f411ba6d2b77bf670ee76caf5378d9d4af55df94794c07a75a91", "class_name": "RelatedNodeInfo"}}, "text": "c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n", "start_char_idx": 881, "end_char_idx": 970, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "35b30ee3-83d7-4c50-a533-590b75092687": {"__data__": {"id_": "35b30ee3-83d7-4c50-a533-590b75092687", "embedding": null, "metadata": {"window": "The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n", "original_text": "d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "70207f0b-28b6-4000-9af1-a9751ec388a1", "node_type": "1", "metadata": {"window": "The Bank shall conduct self -\nassessment of control ef fectiveness of AML/ CFT program to develop risk \nmitigating strategies. \n The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n", "original_text": "c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "50678376707b5cdfd4690c9239d10b6615cbb80f5876bbf85bc48031aa4dadb8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b74e5b1c-365c-4a04-b58e-ca8df2f2a812", "node_type": "1", "metadata": {"window": "b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n", "original_text": "e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n"}, "hash": "01fae6d71dba935c4c38a4df20203588b38001cc6ae972fddfcb2426b84a4fab", "class_name": "RelatedNodeInfo"}}, "text": "d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n", "start_char_idx": 970, "end_char_idx": 1068, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b74e5b1c-365c-4a04-b58e-ca8df2f2a812": {"__data__": {"id_": "b74e5b1c-365c-4a04-b58e-ca8df2f2a812", "embedding": null, "metadata": {"window": "b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n", "original_text": "e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "35b30ee3-83d7-4c50-a533-590b75092687", "node_type": "1", "metadata": {"window": "The assessment shall consider the followings \na. Identify and assess the ML/TF risks that are significant to the Bank. \n b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n", "original_text": "d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "0f1754efe777306273a97e08fbbb26ac925766a1d97987f2999a43a89fdc8664", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "dac79022-37f6-466c-99fe-255aa9a4aff6", "node_type": "1", "metadata": {"window": "c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. ", "original_text": "f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n"}, "hash": "36b658c9e3242023afd9955671b27f5dcfaa6c88102bf18b9e4534cac9fa4019", "class_name": "RelatedNodeInfo"}}, "text": "e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n", "start_char_idx": 1068, "end_char_idx": 1271, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "dac79022-37f6-466c-99fe-255aa9a4aff6": {"__data__": {"id_": "dac79022-37f6-466c-99fe-255aa9a4aff6", "embedding": null, "metadata": {"window": "c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. ", "original_text": "f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b74e5b1c-365c-4a04-b58e-ca8df2f2a812", "node_type": "1", "metadata": {"window": "b. Effectiveness of controls to manage and mitigate the assessed risks. \n c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n", "original_text": "e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "036a5e5453361fc2d6e7e901e87b0f7848037464f9a2110aa9353c6d8303c604", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a684faf2-d6e7-4094-a1f5-3073e3010969", "node_type": "1", "metadata": {"window": "d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n", "original_text": "2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n"}, "hash": "e27f70ee48705e4d3bf0668e2384428fd660d1466f1a2994af845dd56e1e1b91", "class_name": "RelatedNodeInfo"}}, "text": "f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n", "start_char_idx": 1271, "end_char_idx": 1573, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a684faf2-d6e7-4094-a1f5-3073e3010969": {"__data__": {"id_": "a684faf2-d6e7-4094-a1f5-3073e3010969", "embedding": null, "metadata": {"window": "d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n", "original_text": "2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "dac79022-37f6-466c-99fe-255aa9a4aff6", "node_type": "1", "metadata": {"window": "c. Alignment of the risk based on the National Risk Assessment report \nof the country. \n d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. ", "original_text": "f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "5facd7e1c475fcb6307734838a08efafed9e44a6723edcf7d8f21d45eafe0631", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b71e453e-c24c-4ddf-9f76-8f1d2c3f59e5", "node_type": "1", "metadata": {"window": "e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . ", "original_text": "The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n"}, "hash": "325704d3beda0299bd479f7a6d7f284a70d78e1abf4ae1a8f838f6e1032ccc8e", "class_name": "RelatedNodeInfo"}}, "text": "2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n", "start_char_idx": 1573, "end_char_idx": 1682, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b71e453e-c24c-4ddf-9f76-8f1d2c3f59e5": {"__data__": {"id_": "b71e453e-c24c-4ddf-9f76-8f1d2c3f59e5", "embedding": null, "metadata": {"window": "e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . ", "original_text": "The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a684faf2-d6e7-4094-a1f5-3073e3010969", "node_type": "1", "metadata": {"window": "d. Managing risk based on business relationship, transaction threshold \nand nature of customer. \n e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n", "original_text": "2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "676dcae8e012e17905d0bc217a4c912cc91ee8fe4e3bbe85e6b7986ef771db8d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "09d878c5-7b5f-43df-b2fc-17349c286eb7", "node_type": "1", "metadata": {"window": "f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n", "original_text": "The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. "}, "hash": "50f7778d981c9616056c41ceb908146fa9e00809cca647f97fbd1c3f0b2fa753", "class_name": "RelatedNodeInfo"}}, "text": "The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n", "start_char_idx": 1682, "end_char_idx": 1818, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "09d878c5-7b5f-43df-b2fc-17349c286eb7": {"__data__": {"id_": "09d878c5-7b5f-43df-b2fc-17349c286eb7", "embedding": null, "metadata": {"window": "f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n", "original_text": "The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b71e453e-c24c-4ddf-9f76-8f1d2c3f59e5", "node_type": "1", "metadata": {"window": "e. Mechanism to record digitally customer information obtained in the \nprocess of Customer Identification in unified way and ensure that \nsuch customer data are updated in line with the risk profile. \n f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . ", "original_text": "The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "bb67ac6a4c26dc6dd2873f827794219820c1af6488be8638e341807f9f69b7df", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e369201a-c028-456e-b33f-5a823cd04c4b", "node_type": "1", "metadata": {"window": "2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. ", "original_text": "The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n"}, "hash": "c96e345324f26ed8921f093ab73b488adc875b358ae4334e393dca29014f6e15", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. ", "start_char_idx": 1818, "end_char_idx": 1921, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e369201a-c028-456e-b33f-5a823cd04c4b": {"__data__": {"id_": "e369201a-c028-456e-b33f-5a823cd04c4b", "embedding": null, "metadata": {"window": "2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. ", "original_text": "The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "09d878c5-7b5f-43df-b2fc-17349c286eb7", "node_type": "1", "metadata": {"window": "f. Mechanism where Customer Identification process requires \ncustomer to be identified based on centralized record of the customer \nkept digitally by the bank, when updating data/in formation of the \ncustomer availing different product/service of the bank it shall be \nupdated in one single system. \n 2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n", "original_text": "The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "e6ad553dff83d0bba8b060dc67683698c54ba914d2925fc130f0e43a17844c1a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0862dba7-c437-419d-a67c-a7a19278ee37", "node_type": "1", "metadata": {"window": "The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. ", "original_text": "The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . "}, "hash": "786f7a4cebd20349b8093bdec160723f43e22ce262f86b6cf20b50ca8bb85b29", "class_name": "RelatedNodeInfo"}}, "text": "The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n", "start_char_idx": 1921, "end_char_idx": 2141, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0862dba7-c437-419d-a67c-a7a19278ee37": {"__data__": {"id_": "0862dba7-c437-419d-a67c-a7a19278ee37", "embedding": null, "metadata": {"window": "The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. ", "original_text": "The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e369201a-c028-456e-b33f-5a823cd04c4b", "node_type": "1", "metadata": {"window": "2.2.2.3 Assessment of residual risk \nRisk management generally shall be regarded as a continuous process. \n The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. ", "original_text": "The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "ba2e4f545fc0da42c7de6141d39b31f669643c56e6e13ae1283184a9d6d49a7c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8a6a3656-e862-4e1e-9566-98904db6b57b", "node_type": "1", "metadata": {"window": "The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n"}, "hash": "11add81c186a517f9808b9027fabad6ba37da3ad48bd0a23b678bbe123f9db2b", "class_name": "RelatedNodeInfo"}}, "text": "The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . ", "start_char_idx": 2141, "end_char_idx": 2387, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8a6a3656-e862-4e1e-9566-98904db6b57b": {"__data__": {"id_": "8a6a3656-e862-4e1e-9566-98904db6b57b", "embedding": null, "metadata": {"window": "The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0862dba7-c437-419d-a67c-a7a19278ee37", "node_type": "1", "metadata": {"window": "The Bank therefore, ensures that its risk ma nagement process for \nmanaging ML/TF risks are kept under regular monitoring and review. \n The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. ", "original_text": "The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "136842cf6b999bce94a1b933fcae447b93d4d15c0c594e9a53b78c79a4b549f3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a0f8d230-720d-442f-ae36-25a8a54cfa97", "node_type": "1", "metadata": {"window": "The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. "}, "hash": "9e5f81bb66f67081b7204603565e2427c922f5551b1791f574263221c0f8d1ee", "class_name": "RelatedNodeInfo"}}, "text": "This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n", "start_char_idx": 2387, "end_char_idx": 2489, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a0f8d230-720d-442f-ae36-25a8a54cfa97": {"__data__": {"id_": "a0f8d230-720d-442f-ae36-25a8a54cfa97", "embedding": null, "metadata": {"window": "The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8a6a3656-e862-4e1e-9566-98904db6b57b", "node_type": "1", "metadata": {"window": "The Bank shall revisit its assessments at least annua lly as per the provision \nin Unified Directive5. The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "a35f429fd01aba5766690419c620c7b7aa0ea52f7847120c89e0157bd62d8b2f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "058fd3d4-efa5-4488-a1c3-74bf09781e86", "node_type": "1", "metadata": {"window": "The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. "}, "hash": "cd6d4440eb4112e14f7110c5fc1e7d1bad3fe7ee5f6729f892854a6d703d25ac", "class_name": "RelatedNodeInfo"}}, "text": "2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. ", "start_char_idx": 2489, "end_char_idx": 2645, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "058fd3d4-efa5-4488-a1c3-74bf09781e86": {"__data__": {"id_": "058fd3d4-efa5-4488-a1c3-74bf09781e86", "embedding": null, "metadata": {"window": "The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a0f8d230-720d-442f-ae36-25a8a54cfa97", "node_type": "1", "metadata": {"window": "The risk-based approach principals propose \nidentification, assessment, understanding, and mitigation of ML/TF risk \nincluding explicit consideration to key risk factors and its impacts in \nmanagement of such risks. \n The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "d2435dc634df89c741d8a23bded79045472186c1378b8daa06fe82ba31b8ed41", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9f902caa-3c8a-4c05-b46c-1e1f1df83834", "node_type": "1", "metadata": {"window": "This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "19/078, clause (9)(7) "}, "hash": "7544b6040757526e591078c7d4030fc5a9d2bfec0520b1caeb80217a0b025ae7", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. ", "start_char_idx": 2645, "end_char_idx": 2825, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9f902caa-3c8a-4c05-b46c-1e1f1df83834": {"__data__": {"id_": "9f902caa-3c8a-4c05-b46c-1e1f1df83834", "embedding": null, "metadata": {"window": "This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "19/078, clause (9)(7) ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "2be49d31-8552-4227-ab21-3c4a73e2771f", "node_type": "4", "metadata": {"page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "058fd3d4-efa5-4488-a1c3-74bf09781e86", "node_type": "1", "metadata": {"window": "The results of the risk assessment and measures taken by the Bank to \nmanage the identified risks shall be consolidated within a comprehensive \nreport and communicated to the AML/CFT Committee and Asset (Money) \nLaundering Prevention Committee . This will ensure that the bank is aware \nof the key risks, control gaps , and remediation efforts. \n 2.2.3 Customer Acceptance Policy \nThe B ank shall clearly define the information and documents required to establish \na new relationship with a customer. The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. 19/078, clause (9)(7) ", "original_text": "The Bank shall define circumstances under \nwhich a new relationship would not be accepted, or a current relationship would be \n \n5 At present Unified Directive 2078, Directive no. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "hash": "afd5fa490c17f81817de559bf656fa579dd2fff374c5b43439872a42a89b3d5a", "class_name": "RelatedNodeInfo"}}, "text": "19/078, clause (9)(7) ", "start_char_idx": 2825, "end_char_idx": 2848, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "15997e69-4974-4fe1-9800-c562eec9b258": {"__data__": {"id_": "15997e69-4974-4fe1-9800-c562eec9b258", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n11 terminated. ", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "76601a4c-5955-4f68-8fe0-2347f76e0d83", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n", "original_text": "The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n"}, "hash": "b8b79664aa69435b3913e10a04c5e551b564d805816280f8b3c0fc4363f662dd", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n11 terminated. ", "start_char_idx": 0, "end_char_idx": 60, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "76601a4c-5955-4f68-8fe0-2347f76e0d83": {"__data__": {"id_": "76601a4c-5955-4f68-8fe0-2347f76e0d83", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n", "original_text": "The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "15997e69-4974-4fe1-9800-c562eec9b258", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n11 terminated. ", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "9780836a5389814b0ac0e577d48832f9f012d129e2d96fca90f526b22905ca1a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "78a03d23-9f82-4414-be59-a73782dee41c", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n", "original_text": "2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n"}, "hash": "8b1d3e8fb796300f40b93aa0b4f321808cea5302a6ca9c25e3053fc6cda809ea", "class_name": "RelatedNodeInfo"}}, "text": "The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n", "start_char_idx": 60, "end_char_idx": 162, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "78a03d23-9f82-4414-be59-a73782dee41c": {"__data__": {"id_": "78a03d23-9f82-4414-be59-a73782dee41c", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n", "original_text": "2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "76601a4c-5955-4f68-8fe0-2347f76e0d83", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n", "original_text": "The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "6a3a75cfcd3e247a9635d534e5232b52ffe32724a4f93984c7099ca1d8d9c646", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "97d1c507-fc21-47f4-9eb4-f7321a4c0a77", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n", "original_text": "Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. "}, "hash": "bede6dc86f050f899fa02299914512cdec2a513d7c4f2606f39ace1df8f057f3", "class_name": "RelatedNodeInfo"}}, "text": "2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n", "start_char_idx": 162, "end_char_idx": 340, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "97d1c507-fc21-47f4-9eb4-f7321a4c0a77": {"__data__": {"id_": "97d1c507-fc21-47f4-9eb4-f7321a4c0a77", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n", "original_text": "Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. ", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "78a03d23-9f82-4414-be59-a73782dee41c", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n", "original_text": "2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "82ea7697092c3e679536bec56eed4201e55f8677640dba58ab256ef3fd72492f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b4423dab-675c-4491-9cea-c5384fd18e2b", "node_type": "1", "metadata": {"window": "The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n", "original_text": "The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n"}, "hash": "c929e7f7640043a47245ebc2744df0f03edb2e33aeeb7b628c4a54182c4de3f7", "class_name": "RelatedNodeInfo"}}, "text": "Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. ", "start_char_idx": 340, "end_char_idx": 467, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b4423dab-675c-4491-9cea-c5384fd18e2b": {"__data__": {"id_": "b4423dab-675c-4491-9cea-c5384fd18e2b", "embedding": null, "metadata": {"window": "The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n", "original_text": "The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "97d1c507-fc21-47f4-9eb4-f7321a4c0a77", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n", "original_text": "Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. ", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "c4be4fe7a9d755b625126fa4123295fff07572292119cae88012ab980e921691", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5c8c1f58-f167-4b77-aa0e-61d47a8039d7", "node_type": "1", "metadata": {"window": "2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n", "original_text": "b. Shell banks including those banks that maintain relationship with shell \nbank. \n"}, "hash": "e79c980d217c34505183ca6c5a4525971b9702a4cfd8fe82af73b3b76e644a1c", "class_name": "RelatedNodeInfo"}}, "text": "The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n", "start_char_idx": 467, "end_char_idx": 679, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5c8c1f58-f167-4b77-aa0e-61d47a8039d7": {"__data__": {"id_": "5c8c1f58-f167-4b77-aa0e-61d47a8039d7", "embedding": null, "metadata": {"window": "2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n", "original_text": "b. Shell banks including those banks that maintain relationship with shell \nbank. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b4423dab-675c-4491-9cea-c5384fd18e2b", "node_type": "1", "metadata": {"window": "The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n", "original_text": "The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "1a9cb1d10f977e528ed4252be6856e3184594bd17e7da2d7ab3046ff17a58a0f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7e34500c-dbfa-4e84-8d64-3d1163dd5c48", "node_type": "1", "metadata": {"window": "Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n", "original_text": "The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n"}, "hash": "5217bcc34fe928f68677d940b150068da02af23b0dfad34e44bf748c918ef903", "class_name": "RelatedNodeInfo"}}, "text": "b. Shell banks including those banks that maintain relationship with shell \nbank. \n", "start_char_idx": 679, "end_char_idx": 763, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7e34500c-dbfa-4e84-8d64-3d1163dd5c48": {"__data__": {"id_": "7e34500c-dbfa-4e84-8d64-3d1163dd5c48", "embedding": null, "metadata": {"window": "Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n", "original_text": "The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5c8c1f58-f167-4b77-aa0e-61d47a8039d7", "node_type": "1", "metadata": {"window": "2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n", "original_text": "b. Shell banks including those banks that maintain relationship with shell \nbank. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "6fb214cd98e7d026d0a2fba0b3760c89d45a3995283089ee3298298c5e90b819", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a8f88646-e5af-4381-8a33-f2d66d538ffd", "node_type": "1", "metadata": {"window": "The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n", "original_text": "c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n"}, "hash": "57b40fde62285bd7176f540c133b43211c88a79b5058d80a70d4a1cfece398d7", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n", "start_char_idx": 763, "end_char_idx": 920, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a8f88646-e5af-4381-8a33-f2d66d538ffd": {"__data__": {"id_": "a8f88646-e5af-4381-8a33-f2d66d538ffd", "embedding": null, "metadata": {"window": "The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n", "original_text": "c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7e34500c-dbfa-4e84-8d64-3d1163dd5c48", "node_type": "1", "metadata": {"window": "Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n", "original_text": "The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "f0d66ca9cf9882a06dd3a8362bc1b533e39f0ef91a3ece3684b8ae247bbb390c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2604e495-b5e9-41b6-bcac-c29ffed09f4c", "node_type": "1", "metadata": {"window": "b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n", "original_text": "The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n"}, "hash": "0d5172ff70d72e6d9f5275810c09e72969e01338c6c352e7cbd8a0150bf598df", "class_name": "RelatedNodeInfo"}}, "text": "c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n", "start_char_idx": 920, "end_char_idx": 1012, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2604e495-b5e9-41b6-bcac-c29ffed09f4c": {"__data__": {"id_": "2604e495-b5e9-41b6-bcac-c29ffed09f4c", "embedding": null, "metadata": {"window": "b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n", "original_text": "The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a8f88646-e5af-4381-8a33-f2d66d538ffd", "node_type": "1", "metadata": {"window": "The Bank \nmust take all reasonable steps to confirm the true identity of the \ncustomer by collecting all relevant information and documen ts to \nascertain the identity of the beneficial owner of the account. \n \n b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n", "original_text": "c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "9e730b48f8e9974e1c23e33fd6ccddf1bd9df4d7a24bbd0187656cba973de93c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8ab04d40-d2ca-4185-9bab-b4c745a49c48", "node_type": "1", "metadata": {"window": "The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n", "original_text": "d. The customer acting on behalf of another customer to open an account. \n"}, "hash": "d2614d626d94a82e8a2ac3023a521cf9823f4ea44dfd3fb04a44cfbfa0c3ed2c", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n", "start_char_idx": 1012, "end_char_idx": 1121, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8ab04d40-d2ca-4185-9bab-b4c745a49c48": {"__data__": {"id_": "8ab04d40-d2ca-4185-9bab-b4c745a49c48", "embedding": null, "metadata": {"window": "The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n", "original_text": "d. The customer acting on behalf of another customer to open an account. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2604e495-b5e9-41b6-bcac-c29ffed09f4c", "node_type": "1", "metadata": {"window": "b. Shell banks including those banks that maintain relationship with shell \nbank. \n The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n", "original_text": "The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "72cd57c042bad1442faf9b1320cf5adf173a9811c663ce7f3bff88be648dfa1b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5285e0af-31bb-4297-9b85-74f17d7939e9", "node_type": "1", "metadata": {"window": "c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n", "original_text": "The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n"}, "hash": "d2d14262fbf92a238336e774a9c985d8df6912a27487194ab1b4761c08567ff5", "class_name": "RelatedNodeInfo"}}, "text": "d. The customer acting on behalf of another customer to open an account. \n", "start_char_idx": 1121, "end_char_idx": 1196, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5285e0af-31bb-4297-9b85-74f17d7939e9": {"__data__": {"id_": "5285e0af-31bb-4297-9b85-74f17d7939e9", "embedding": null, "metadata": {"window": "c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n", "original_text": "The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8ab04d40-d2ca-4185-9bab-b4c745a49c48", "node_type": "1", "metadata": {"window": "The Bank shall ensure that it does not maintain any relationship with \nshell entities including those banks that maintain relationship with shell \nbank. \n \n c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n", "original_text": "d. The customer acting on behalf of another customer to open an account. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "be3a2ba52f8e1555f142939de9b8713ccbad45245917b2a2d0a6d2f83937e84a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8fbe5691-8155-4aee-a535-dfeb2a06cf9b", "node_type": "1", "metadata": {"window": "The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n", "original_text": "e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n"}, "hash": "917e775da62537a3feea18bf8ec363a25cb861f470e6fb9a46bc77f840ceef1b", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n", "start_char_idx": 1196, "end_char_idx": 1332, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8fbe5691-8155-4aee-a535-dfeb2a06cf9b": {"__data__": {"id_": "8fbe5691-8155-4aee-a535-dfeb2a06cf9b", "embedding": null, "metadata": {"window": "The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n", "original_text": "e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5285e0af-31bb-4297-9b85-74f17d7939e9", "node_type": "1", "metadata": {"window": "c. Unregistered entity (except allowed by regulator or legal body for \nspecific purpose). \n The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n", "original_text": "The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "165979e70a4def2b1a562b3600fa5e5dc2fcbcbdc0ebe0f683a888e01cf1fee5", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "032cec94-aeb3-436e-a40f-60f21acda04f", "node_type": "1", "metadata": {"window": "d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n", "original_text": "The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n"}, "hash": "cf2de69b62ee4d05952e0767ad7212b122b86c08261af7a82ccaf6d1d00f5eca", "class_name": "RelatedNodeInfo"}}, "text": "e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n", "start_char_idx": 1332, "end_char_idx": 1480, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "032cec94-aeb3-436e-a40f-60f21acda04f": {"__data__": {"id_": "032cec94-aeb3-436e-a40f-60f21acda04f", "embedding": null, "metadata": {"window": "d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n", "original_text": "The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8fbe5691-8155-4aee-a535-dfeb2a06cf9b", "node_type": "1", "metadata": {"window": "The Bank shall not establish relationship with entities that are not \nregistered under the law of Nepal. \n \n d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n", "original_text": "e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "3d2fc8b68e6499147b4eb7489bf5af1633b910b352979f5908f2ddc7f0ef3532", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6b7d8b5b-95aa-4bb5-bc55-174503dd4e62", "node_type": "1", "metadata": {"window": "The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. ", "original_text": "f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n"}, "hash": "f2d38e6c57de8c958e2ffa8669a37daffc22a16ab814c8ab7d5709a1e6ad123d", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n", "start_char_idx": 1480, "end_char_idx": 1622, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6b7d8b5b-95aa-4bb5-bc55-174503dd4e62": {"__data__": {"id_": "6b7d8b5b-95aa-4bb5-bc55-174503dd4e62", "embedding": null, "metadata": {"window": "The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. ", "original_text": "f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "032cec94-aeb3-436e-a40f-60f21acda04f", "node_type": "1", "metadata": {"window": "d. The customer acting on behalf of another customer to open an account. \n The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n", "original_text": "The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "534d914a71474b2193d9320cf2d810e26cd9368d1d08942b7abe7b0ae573aacc", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "274dcbca-d18d-4650-a190-c0911bb99942", "node_type": "1", "metadata": {"window": "e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n"}, "hash": "6d6af0696b257d6402fc4c26c3dcabc2daba1a647b2221df6918a18327bf26ab", "class_name": "RelatedNodeInfo"}}, "text": "f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n", "start_char_idx": 1622, "end_char_idx": 2012, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "274dcbca-d18d-4650-a190-c0911bb99942": {"__data__": {"id_": "274dcbca-d18d-4650-a190-c0911bb99942", "embedding": null, "metadata": {"window": "e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6b7d8b5b-95aa-4bb5-bc55-174503dd4e62", "node_type": "1", "metadata": {"window": "The Bank shall not establish relationship with a customer who is acting \non other person\u2019s behalf without any legal right to do so. \n \n e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. ", "original_text": "f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "b0f90c94587148745035d00ca265d6bdeebfa31ffeba88047e635c50ab5db2cf", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4dea95ae-199c-4134-af0a-d58ebfff00f9", "node_type": "1", "metadata": {"window": "The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n"}, "hash": "f331f9b3c16fce66d065d9c0131f1894f87121ab06ce1b4934b89fdec6ce4cd5", "class_name": "RelatedNodeInfo"}}, "text": "g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n", "start_char_idx": 2012, "end_char_idx": 2153, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4dea95ae-199c-4134-af0a-d58ebfff00f9": {"__data__": {"id_": "4dea95ae-199c-4134-af0a-d58ebfff00f9", "embedding": null, "metadata": {"window": "The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "274dcbca-d18d-4650-a190-c0911bb99942", "node_type": "1", "metadata": {"window": "e. Entities/persons appearing in sanctioned lists of Nepal Government \nand int ernational bodies that include UN, HMT, EU, OFAC, Australian \nlist. \n The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "6395d06f6d001b793eaaff25401c00a71feea2641bd75ebb49336588d4b15cb1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ebec4eac-8275-4125-8b61-3c7cbd201d55", "node_type": "1", "metadata": {"window": "f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "6 Unified Directive 2078, directive no. "}, "hash": "49e35de7dac140636230c5b69c700b83e807af9e2441ff07f84dc50b8b7692b8", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n", "start_char_idx": 2153, "end_char_idx": 2379, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ebec4eac-8275-4125-8b61-3c7cbd201d55": {"__data__": {"id_": "ebec4eac-8275-4125-8b61-3c7cbd201d55", "embedding": null, "metadata": {"window": "f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "6 Unified Directive 2078, directive no. ", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4dea95ae-199c-4134-af0a-d58ebfff00f9", "node_type": "1", "metadata": {"window": "The Bank shall not establish relationship or enter into any transaction \ndirectly or indirectly with sanctioned person, group and entity. \n \n f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "1ed7de659f41c9665f2faad34f9c65bb9db7dc2b847f19825f2eb82b879fa2c0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "50b32ea2-6fc6-481c-865a-980bec925996", "node_type": "1", "metadata": {"window": "g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) "}, "hash": "dbe261d34aa9c1d61f1caf4b92752008435f1c3b915027f066ffb337bfea16b3", "class_name": "RelatedNodeInfo"}}, "text": "6 Unified Directive 2078, directive no. ", "start_char_idx": 2379, "end_char_idx": 2419, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "50b32ea2-6fc6-481c-865a-980bec925996": {"__data__": {"id_": "50b32ea2-6fc6-481c-865a-980bec925996", "embedding": null, "metadata": {"window": "g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87", "node_type": "4", "metadata": {"page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ebec4eac-8275-4125-8b61-3c7cbd201d55", "node_type": "1", "metadata": {"window": "f. The customers who are unwilling and/or unable to pr ovide mandatory \ndocuments, information, and/or details required for customer \nidentification and verification.6 \nThe bank shall not establish or continue relationship with a customer \nwho is reluctant to provide documents, and information mandatorily \nrequire d to identify and access ML/TF risk associated with the \ncustomer. \n \n g. The customers whose documents, information, and other details \nprovided to the Bank appear conflicting to the identity of the customer. \n The Bank shall not establish relationship with a customer whose \ninformation provided to the Bank is found to be suspectable, dubious, \nconflicting, or misleading in accessing ML/TF risk associated with the \ncustomer. \n \n \n \n 6 Unified Directive 2078, directive no. 19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "original_text": "6 Unified Directive 2078, directive no. ", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "hash": "ce44801f0ccc4757d2aba00d3f8336754f33bf609d0fed9b03815d59861821eb", "class_name": "RelatedNodeInfo"}}, "text": "19/078, Clause ( 16) (7) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8 /16 BS) ", "start_char_idx": 2419, "end_char_idx": 2514, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f2cbf011-bc22-410f-b36e-05f7c6edc459": {"__data__": {"id_": "f2cbf011-bc22-410f-b36e-05f7c6edc459", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "346aa99f-bb2b-4cf7-a7ae-2aaea8ebb785", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n", "original_text": "i. Those who deal with arma ments. \n"}, "hash": "860a9418896338a4c2872c68648b207eb1bac9f149810a7c02101b253ab9fc94", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n", "start_char_idx": 0, "end_char_idx": 359, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "346aa99f-bb2b-4cf7-a7ae-2aaea8ebb785": {"__data__": {"id_": "346aa99f-bb2b-4cf7-a7ae-2aaea8ebb785", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n", "original_text": "i. Those who deal with arma ments. \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f2cbf011-bc22-410f-b36e-05f7c6edc459", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "75a978c1fe9930d4d0a18cc55db59bff3924cd266c32fd62c327f30562134fb9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "1c75b713-6f92-4ec8-9218-3bb3e58c4e03", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. ", "original_text": "The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n"}, "hash": "288fcc06ba7b0589094df878e26723429cecef2ba737fa2b8403a11f3d3a400a", "class_name": "RelatedNodeInfo"}}, "text": "i. Those who deal with arma ments. \n", "start_char_idx": 359, "end_char_idx": 396, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "1c75b713-6f92-4ec8-9218-3bb3e58c4e03": {"__data__": {"id_": "1c75b713-6f92-4ec8-9218-3bb3e58c4e03", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. ", "original_text": "The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "346aa99f-bb2b-4cf7-a7ae-2aaea8ebb785", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n", "original_text": "i. Those who deal with arma ments. \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "0d7faac7e4d8b355690934a1fe45be0de87a674b75361b3b00b0f57a428eb540", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ccc440cc-471f-40a5-a4b4-2fe156a969fc", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. ", "original_text": "j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n"}, "hash": "f18741ca51e30ecf78a38e8cad05d9f899dff1fc942f4c50e8ebb843c45f4b8f", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n", "start_char_idx": 396, "end_char_idx": 487, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ccc440cc-471f-40a5-a4b4-2fe156a969fc": {"__data__": {"id_": "ccc440cc-471f-40a5-a4b4-2fe156a969fc", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. ", "original_text": "j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "1c75b713-6f92-4ec8-9218-3bb3e58c4e03", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. ", "original_text": "The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "438bc7899d1d8c31b3e6ecb7e5aa37fe52ace425b2bea667f06025ac151ca933", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "33b8bf66-a163-4af4-8f34-974afdb37833", "node_type": "1", "metadata": {"window": "i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n", "original_text": "k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n"}, "hash": "4e12ea17b6c74396885ebe8c690da909d0953c5ddbe9d877c5566e5f73a9c0f1", "class_name": "RelatedNodeInfo"}}, "text": "j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n", "start_char_idx": 487, "end_char_idx": 572, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "33b8bf66-a163-4af4-8f34-974afdb37833": {"__data__": {"id_": "33b8bf66-a163-4af4-8f34-974afdb37833", "embedding": null, "metadata": {"window": "i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n", "original_text": "k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ccc440cc-471f-40a5-a4b4-2fe156a969fc", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. ", "original_text": "j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "e64f141b7d0b5c9a431f7e3c000dbb2db897c952c4d7ff2c249569d4bc862dd9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "364f57dc-fe18-47a9-816d-ea654a4b2b7c", "node_type": "1", "metadata": {"window": "The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. ", "original_text": "2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. "}, "hash": "450b23eaef2726ba5adc087fe90ebfea29cbfe879710b3ea0fe08a5a0a2c72e9", "class_name": "RelatedNodeInfo"}}, "text": "k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n", "start_char_idx": 572, "end_char_idx": 904, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "364f57dc-fe18-47a9-816d-ea654a4b2b7c": {"__data__": {"id_": "364f57dc-fe18-47a9-816d-ea654a4b2b7c", "embedding": null, "metadata": {"window": "The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. ", "original_text": "2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. ", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "33b8bf66-a163-4af4-8f34-974afdb37833", "node_type": "1", "metadata": {"window": "i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n", "original_text": "k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "7677e7410873480fc82ceac96b37f305c1c6b239fdc387adf828ceac046dfd31", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "cdc234c5-6d40-4b9a-8a6b-aed34b6c6ed7", "node_type": "1", "metadata": {"window": "j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n", "original_text": "Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. "}, "hash": "560000041ce5f02dfcc1fb71ff373cef980a3200a7163cd2d6e9971fb8522f3c", "class_name": "RelatedNodeInfo"}}, "text": "2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. ", "start_char_idx": 904, "end_char_idx": 1148, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "cdc234c5-6d40-4b9a-8a6b-aed34b6c6ed7": {"__data__": {"id_": "cdc234c5-6d40-4b9a-8a6b-aed34b6c6ed7", "embedding": null, "metadata": {"window": "j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n", "original_text": "Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. ", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "364f57dc-fe18-47a9-816d-ea654a4b2b7c", "node_type": "1", "metadata": {"window": "The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. ", "original_text": "2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. ", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "cdae1ddf4860b6dc1d13bafd3edc84d7020cd6f96ef7e67a3bee603c60e3b38e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d42c8120-3255-4b13-83d4-eb2cad0d73c0", "node_type": "1", "metadata": {"window": "k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n", "original_text": "In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n"}, "hash": "8b5de5addef52b42ff7569ac1983e92316e3adbd9a19f0633116a7f62da9cd84", "class_name": "RelatedNodeInfo"}}, "text": "Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. ", "start_char_idx": 1148, "end_char_idx": 1344, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d42c8120-3255-4b13-83d4-eb2cad0d73c0": {"__data__": {"id_": "d42c8120-3255-4b13-83d4-eb2cad0d73c0", "embedding": null, "metadata": {"window": "k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n", "original_text": "In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "cdc234c5-6d40-4b9a-8a6b-aed34b6c6ed7", "node_type": "1", "metadata": {"window": "j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n", "original_text": "Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. ", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "21167a34a88d035df091ca4ccd67a8f2ec1f4b76d0b59fc2962ef98b0f7be3c6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0a61de61-47dd-42cd-94be-4467bdc87028", "node_type": "1", "metadata": {"window": "2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n", "original_text": "The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. "}, "hash": "0e4803e0141abf6069b253770ad03c1b386b181cae0cbdcb666da2b6e1cd84b2", "class_name": "RelatedNodeInfo"}}, "text": "In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n", "start_char_idx": 1344, "end_char_idx": 1508, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0a61de61-47dd-42cd-94be-4467bdc87028": {"__data__": {"id_": "0a61de61-47dd-42cd-94be-4467bdc87028", "embedding": null, "metadata": {"window": "2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n", "original_text": "The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. ", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d42c8120-3255-4b13-83d4-eb2cad0d73c0", "node_type": "1", "metadata": {"window": "k. End of relationship \nWhere the Bank is unable to apply appropriate KYC measures due t o \nnon-furnishing of information and /or non -cooperation by a n existing \ncustomer, the Bank shall initiate to terminate the business relationship8 \nafter issuing notice to the customer explaining the reasons for taking \nsuch a decision. \n 2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n", "original_text": "In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "43f8416631906832793478bc417a721277ddadd4d695d5e7fb3cc068930f4caf", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a11f6bc2-d45c-4302-9f93-15f941acefa1", "node_type": "1", "metadata": {"window": "Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. ", "original_text": "The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n"}, "hash": "473affe8cc6764f66307b1f669cac4aac3776c2096d1a0a8d13ff696633b82ff", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. ", "start_char_idx": 1508, "end_char_idx": 1726, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a11f6bc2-d45c-4302-9f93-15f941acefa1": {"__data__": {"id_": "a11f6bc2-d45c-4302-9f93-15f941acefa1", "embedding": null, "metadata": {"window": "Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. ", "original_text": "The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0a61de61-47dd-42cd-94be-4467bdc87028", "node_type": "1", "metadata": {"window": "2.2.4 Monitoring of Transac tions \nThe Bank shall monitor the transactions of its customers based on risk profile, size, \ncomplexity, and activities to check and ensure whether they are consistent with the \nbank\u2019s knowledge of the customer. Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n", "original_text": "The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. ", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "81d865b4556b59012dfd43daac2f32862320e2870b53203393e9486fca0a932d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b20c38b6-59e4-43a9-9b10-8ef6127ecb04", "node_type": "1", "metadata": {"window": "In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n"}, "hash": "1818a86086d31126545f1d8e0d7c7776a99fc489e83a5c0c0787a282bf2e7627", "class_name": "RelatedNodeInfo"}}, "text": "The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n", "start_char_idx": 1726, "end_char_idx": 2042, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b20c38b6-59e4-43a9-9b10-8ef6127ecb04": {"__data__": {"id_": "b20c38b6-59e4-43a9-9b10-8ef6127ecb04", "embedding": null, "metadata": {"window": "In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a11f6bc2-d45c-4302-9f93-15f941acefa1", "node_type": "1", "metadata": {"window": "Transaction monitoring shall be conducted to \nidentify any unusual activity and to assist the Bank in meeting statutory obligations \nwith respect to reporting potentially suspicious transactions. In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. ", "original_text": "The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "2b3abf47ee3cd5dc38e32248c644fccd7b4a72464fe809b5dde7f7640bd34f01", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ed17db20-b032-4c05-a08d-760554d40e33", "node_type": "1", "metadata": {"window": "The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n"}, "hash": "ae097f639364765af1c59a8e827da5838d82114343a990d854b4359cb0187b4b", "class_name": "RelatedNodeInfo"}}, "text": "2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n", "start_char_idx": 2042, "end_char_idx": 2248, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ed17db20-b032-4c05-a08d-760554d40e33": {"__data__": {"id_": "ed17db20-b032-4c05-a08d-760554d40e33", "embedding": null, "metadata": {"window": "The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b20c38b6-59e4-43a9-9b10-8ef6127ecb04", "node_type": "1", "metadata": {"window": "In identifying, \ninvestigating, and reporting suspicious activity, banks can collect relevant \ninformation fro m various departments, branches, and subsidiaries. \n The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "b6f36ca627cf7e84694d347087ca88e1082e539c090f5905519a74845c09f556", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6e13df71-09d7-4d1e-9790-ff7ffdf84823", "node_type": "1", "metadata": {"window": "The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "7 Prohibition on dealing in crypto currency is an existing provision of our policy. "}, "hash": "8b0f11e9054e5acad14b213cf67f4bd02b8a0e658f070a28f6b40edf4f66c9c3", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n", "start_char_idx": 2248, "end_char_idx": 2646, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6e13df71-09d7-4d1e-9790-ff7ffdf84823": {"__data__": {"id_": "6e13df71-09d7-4d1e-9790-ff7ffdf84823", "embedding": null, "metadata": {"window": "The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "7 Prohibition on dealing in crypto currency is an existing provision of our policy. ", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ed17db20-b032-4c05-a08d-760554d40e33", "node_type": "1", "metadata": {"window": "The Bank shall give more attention to the transactions that do not match with the \ncustomers/profile, the line of business, high value transactions, high account \nturnover and transactions exceeding threshol d limit. The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "aee2534fcd883105310fbe50825173ca78290332d7f0b40498f28d8a76625d53", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d51236fd-2a0c-4de1-b447-a5aca9c8206b", "node_type": "1", "metadata": {"window": "2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) "}, "hash": "8934ee4809aaa620fa0f636e2567f708be00cc41f183005becca49302973587e", "class_name": "RelatedNodeInfo"}}, "text": "7 Prohibition on dealing in crypto currency is an existing provision of our policy. ", "start_char_idx": 2646, "end_char_idx": 2730, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d51236fd-2a0c-4de1-b447-a5aca9c8206b": {"__data__": {"id_": "d51236fd-2a0c-4de1-b447-a5aca9c8206b", "embedding": null, "metadata": {"window": "2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144", "node_type": "4", "metadata": {"page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6e13df71-09d7-4d1e-9790-ff7ffdf84823", "node_type": "1", "metadata": {"window": "The automated system shall \nbe deployed for monitoring purpose and any deviation in the transaction performed \nin the account against the customer profile shall be followed by reviewing of the \ncustomer profile and by conducting proper due diligence based on transactions and \nrisk categorization of the customer. \n 2.3 Customer Due Diligence \nThe bank shall conduct due diligence of its customers and update such due diligence \nthroughout the banking relationship with the customer based on the customer risk level . \n The Bank shall apply customer due diligence in the following circumstances:9 \na. Establishing a new business relationship \nb. Opening of an account \nc. Carrying out occasional transactions above the established threshold limit \nd. Cross -border and domestic wire transfers \ne. When there are doubts about the authenticity or adequacy of previously obtained \ncustomer identification data. \n \n 7 Prohibition on dealing in crypto currency is an existing provision of our policy. NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "original_text": "7 Prohibition on dealing in crypto currency is an existing provision of our policy. ", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "hash": "b5d3bca70a9e6331dfad8754bf5b27fa31b5663100f8d565ccb96c9632d38698", "class_name": "RelatedNodeInfo"}}, "text": "NRB has banned dealing in \ncrypto currency through the notice published on 2078 /10/09 \n8 ALPA \u2013 Chapter 3, Clause (7)( ANA )(2) \n9 ALPA \u2013 Chapter 2, Clause (7)( KA)(1) ", "start_char_idx": 2730, "end_char_idx": 2899, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "464b1f97-e2e7-4c08-831e-26f486e2c433": {"__data__": {"id_": "464b1f97-e2e7-4c08-831e-26f486e2c433", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "58ab7dd7-68b1-4ed3-b40f-38b076c70908", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . ", "original_text": "g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n"}, "hash": "91e126c40fd083ae658f6695e8ba10dc04e0e5b37332e03320633e12b820b94b", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n", "start_char_idx": 0, "end_char_idx": 116, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "58ab7dd7-68b1-4ed3-b40f-38b076c70908": {"__data__": {"id_": "58ab7dd7-68b1-4ed3-b40f-38b076c70908", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . ", "original_text": "g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "464b1f97-e2e7-4c08-831e-26f486e2c433", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "02e28f5e73af5bcae466349c7a3759b42a185cae137065ff39cf4e4d6602ddb6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ae0078e0-7d33-47a4-b481-d98e71589dce", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n", "original_text": "2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. "}, "hash": "d0b0c36464093642e104c5dbfc49a34b667268ffa11905a64f0ad4998a9d8af6", "class_name": "RelatedNodeInfo"}}, "text": "g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n", "start_char_idx": 116, "end_char_idx": 225, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ae0078e0-7d33-47a4-b481-d98e71589dce": {"__data__": {"id_": "ae0078e0-7d33-47a4-b481-d98e71589dce", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n", "original_text": "2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "58ab7dd7-68b1-4ed3-b40f-38b076c70908", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . ", "original_text": "g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "c47c8e3498b239ec055ed47a301781f20fac29ae4222978c600da940fed1c40f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3f6a626d-e8cb-4481-a77f-848c263aa0a7", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. ", "original_text": "Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n"}, "hash": "fdd966824e29b56cbec819f7205deba4955e6afc98d62d29639833e5d4929d33", "class_name": "RelatedNodeInfo"}}, "text": "2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. ", "start_char_idx": 225, "end_char_idx": 465, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3f6a626d-e8cb-4481-a77f-848c263aa0a7": {"__data__": {"id_": "3f6a626d-e8cb-4481-a77f-848c263aa0a7", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. ", "original_text": "Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ae0078e0-7d33-47a4-b481-d98e71589dce", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n", "original_text": "2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "e26ac95ac00334f5fa658eda6ad5e78c411489022f35196eb87cd7e229f8fd66", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "412c18f5-2adf-4945-acb2-777ae502bdc3", "node_type": "1", "metadata": {"window": "g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n", "original_text": "a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . "}, "hash": "692fff963389fea150ad238633ade102c76ee297a122978011ebcfd8993b2383", "class_name": "RelatedNodeInfo"}}, "text": "Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n", "start_char_idx": 465, "end_char_idx": 630, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "412c18f5-2adf-4945-acb2-777ae502bdc3": {"__data__": {"id_": "412c18f5-2adf-4945-acb2-777ae502bdc3", "embedding": null, "metadata": {"window": "g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n", "original_text": "a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "3f6a626d-e8cb-4481-a77f-848c263aa0a7", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. ", "original_text": "Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "01888d24ffa10098021a41d22f8a35849376ef6396572f08ced8df8a70d493de", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ef4cefad-0d6b-47c8-9cb9-039fb64b5457", "node_type": "1", "metadata": {"window": "2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ", "original_text": "The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n"}, "hash": "794f16a8b02c745dc40c471381fb4c71406bb949f70ccb7aaf7418374d96c073", "class_name": "RelatedNodeInfo"}}, "text": "a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . ", "start_char_idx": 630, "end_char_idx": 802, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ef4cefad-0d6b-47c8-9cb9-039fb64b5457": {"__data__": {"id_": "ef4cefad-0d6b-47c8-9cb9-039fb64b5457", "embedding": null, "metadata": {"window": "2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ", "original_text": "The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "412c18f5-2adf-4945-acb2-777ae502bdc3", "node_type": "1", "metadata": {"window": "g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n", "original_text": "a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "600098c8ba65dbbae615f7ec47be29e85678f2fb4ae0fc7650b5f0a775fa9172", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5ccf1886-586d-469b-9c5d-0edcc27c58c9", "node_type": "1", "metadata": {"window": "Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. ", "original_text": "b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. "}, "hash": "f7a1f9f53b783a76cb7391f83f626f66412cdf9c9910a7ca70e488df6173ffe4", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n", "start_char_idx": 802, "end_char_idx": 918, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5ccf1886-586d-469b-9c5d-0edcc27c58c9": {"__data__": {"id_": "5ccf1886-586d-469b-9c5d-0edcc27c58c9", "embedding": null, "metadata": {"window": "Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. ", "original_text": "b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ef4cefad-0d6b-47c8-9cb9-039fb64b5457", "node_type": "1", "metadata": {"window": "2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ", "original_text": "The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "d6a9ecdead0ca450c57d8e12e759330c3d898abb78064c83144b3038532ec54b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "fb5057d6-151f-45f4-94e3-0b72ee4db0b1", "node_type": "1", "metadata": {"window": "a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n"}, "hash": "0da938073aafc22fc284e1642c58df99ee3531d28ee1c765d834d24ba57c04b5", "class_name": "RelatedNodeInfo"}}, "text": "b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. ", "start_char_idx": 918, "end_char_idx": 1053, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "fb5057d6-151f-45f4-94e3-0b72ee4db0b1": {"__data__": {"id_": "fb5057d6-151f-45f4-94e3-0b72ee4db0b1", "embedding": null, "metadata": {"window": "a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5ccf1886-586d-469b-9c5d-0edcc27c58c9", "node_type": "1", "metadata": {"window": "Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. ", "original_text": "b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "9c2fe9cc57cc9bf5f9bc82eb1b84e210ae00cc3c69a8a7801cfe03de8958e830", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6876f76e-e347-4f20-ac56-af1923c786a1", "node_type": "1", "metadata": {"window": "The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. "}, "hash": "1a7a81abe8ec48c40d44edd115422cdc2ff2166e998eee1b3101fe31935ab4c6", "class_name": "RelatedNodeInfo"}}, "text": "The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n", "start_char_idx": 1053, "end_char_idx": 1233, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6876f76e-e347-4f20-ac56-af1923c786a1": {"__data__": {"id_": "6876f76e-e347-4f20-ac56-af1923c786a1", "embedding": null, "metadata": {"window": "The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "fb5057d6-151f-45f4-94e3-0b72ee4db0b1", "node_type": "1", "metadata": {"window": "a. Simplified Customer Due Diligence (SCDD): \nSimplified CDD is the lowest level of due diligence, which shall apply on those \ncustomers with low risk of ML/TF activity . The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "c23ef482206981ec3502af07f886465ee2c9a08989d84a7f46d4bcf2ca8bf23f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d1479bee-44ae-4a44-93f5-f3792b1cd94a", "node_type": "1", "metadata": {"window": "b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. "}, "hash": "48fee9f66055a9aa9931b1924f401d258f737d78424b483a40bf3f4cc18cfc15", "class_name": "RelatedNodeInfo"}}, "text": "c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ", "start_char_idx": 1233, "end_char_idx": 1358, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d1479bee-44ae-4a44-93f5-f3792b1cd94a": {"__data__": {"id_": "d1479bee-44ae-4a44-93f5-f3792b1cd94a", "embedding": null, "metadata": {"window": "b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6876f76e-e347-4f20-ac56-af1923c786a1", "node_type": "1", "metadata": {"window": "The Bank shall establish a separate \nsimplified mechanism to obtain information/ and documents of such customers. \n b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "79086401a1a120cb2df81faa95cf6497d5ba625db795490e0e86382f804d8ae3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "405fb950-67ab-482b-9e74-48979480e5c4", "node_type": "1", "metadata": {"window": "The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n "}, "hash": "f2daf11d8ca4eb23ff9daafb4dbe645d53534cf7bb65e767fad83270505e3d95", "class_name": "RelatedNodeInfo"}}, "text": "ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. ", "start_char_idx": 1358, "end_char_idx": 1453, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "405fb950-67ab-482b-9e74-48979480e5c4": {"__data__": {"id_": "405fb950-67ab-482b-9e74-48979480e5c4", "embedding": null, "metadata": {"window": "The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a", "node_type": "4", "metadata": {"page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d1479bee-44ae-4a44-93f5-f3792b1cd94a", "node_type": "1", "metadata": {"window": "b. Customer Due Diligence (CDD): \nCustomer du e diligence shall be applied to those customers who have \nmoderately higher ML/TF risk. The due diligence shall be made to understand \nthe purpose and intended nature of the business relationship from the type of \ntransactions or business relationship establi shed. \n c. Enhanced Customer Due Diligence (ECDD) \nThe Bank shall apply ECDD measures if the customer risk is deemed to be \nhigher. ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "original_text": "ECDD shall be applied to satisfy the Bank for the establishing and \ncontinuing relationship. ", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "hash": "e51ab9174588d00a7bf07d9f658e4ef17da91ce149615531edf4b2ab24a7f277", "class_name": "RelatedNodeInfo"}}, "text": "The bank may apply ECDD to low or medium risk \ncustomer on its own discretion. \n \n \n ", "start_char_idx": 1453, "end_char_idx": 1540, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8d404377-1b77-4704-b523-3dcbd4c8b233": {"__data__": {"id_": "8d404377-1b77-4704-b523-3dcbd4c8b233", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4d66d061-fd5a-497c-ba1e-a14318f7f516", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n", "original_text": "Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n"}, "hash": "e279ea40185bb880f53292942ee9f02035877e0d4898ee730abd1bc8506f7b34", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. ", "start_char_idx": 0, "end_char_idx": 323, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4d66d061-fd5a-497c-ba1e-a14318f7f516": {"__data__": {"id_": "4d66d061-fd5a-497c-ba1e-a14318f7f516", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n", "original_text": "Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8d404377-1b77-4704-b523-3dcbd4c8b233", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "562a33ef462b973382b86da2c3b9afa107d234a40a3d9ef53c1d566c73a3955a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0120a2e9-c4f5-4f6a-8d8c-56e844c24f0e", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. ", "original_text": "The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n"}, "hash": "11758cfc39d50d09ac898123474c2d7f7dfdbef0b031529911b732f04f401ed3", "class_name": "RelatedNodeInfo"}}, "text": "Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n", "start_char_idx": 323, "end_char_idx": 518, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0120a2e9-c4f5-4f6a-8d8c-56e844c24f0e": {"__data__": {"id_": "0120a2e9-c4f5-4f6a-8d8c-56e844c24f0e", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. ", "original_text": "The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4d66d061-fd5a-497c-ba1e-a14318f7f516", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n", "original_text": "Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "0aea4f762993e9a5a1c5ae51aec093cb9d9852ce941baef776bc4904f426018b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "71b50d05-a9dd-4398-b6af-ea4c37803aef", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n", "original_text": "For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. "}, "hash": "26ad2e55f908a8ff26e713584b46d8e930919c2a3a9fa17fc411d8e468f9c9fa", "class_name": "RelatedNodeInfo"}}, "text": "The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n", "start_char_idx": 518, "end_char_idx": 689, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "71b50d05-a9dd-4398-b6af-ea4c37803aef": {"__data__": {"id_": "71b50d05-a9dd-4398-b6af-ea4c37803aef", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n", "original_text": "For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0120a2e9-c4f5-4f6a-8d8c-56e844c24f0e", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. ", "original_text": "The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "b699dfd27cdc502561eaa3a841173f9e5357e1af0a6a82e4b08ce8205eaff1a4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "60b16a6e-e240-4685-8033-5110a9e2662e", "node_type": "1", "metadata": {"window": "Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n", "original_text": "Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n"}, "hash": "91c2fda87f609454d2c30637e7a5ff835ab29ac31f04f9dab2b80c209263eab5", "class_name": "RelatedNodeInfo"}}, "text": "For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. ", "start_char_idx": 689, "end_char_idx": 815, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "60b16a6e-e240-4685-8033-5110a9e2662e": {"__data__": {"id_": "60b16a6e-e240-4685-8033-5110a9e2662e", "embedding": null, "metadata": {"window": "Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n", "original_text": "Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "71b50d05-a9dd-4398-b6af-ea4c37803aef", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n", "original_text": "For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "cd1dee0bdfeb4c43bcf359369a42f75bfa334e14141515335cb30c506360aa53", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5293cdfc-2093-4688-848c-c294e9d766ea", "node_type": "1", "metadata": {"window": "The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n", "original_text": "In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. "}, "hash": "f93417eb6f863f4a6c504fb8e9ade9946c3ca35270a7ba334655e13c68da89c2", "class_name": "RelatedNodeInfo"}}, "text": "Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n", "start_char_idx": 815, "end_char_idx": 927, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5293cdfc-2093-4688-848c-c294e9d766ea": {"__data__": {"id_": "5293cdfc-2093-4688-848c-c294e9d766ea", "embedding": null, "metadata": {"window": "The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n", "original_text": "In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "60b16a6e-e240-4685-8033-5110a9e2662e", "node_type": "1", "metadata": {"window": "Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n", "original_text": "Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "a52a10bda3ba98a08d7816270359e84c330ca31e90a3fdcf26426fcebd44a625", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c71e7e12-cedf-4542-b14b-231a8ddcb334", "node_type": "1", "metadata": {"window": "For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. ", "original_text": "In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n"}, "hash": "fd9caa1858b4b43a12ad1f2a6bc41f55f495a1ac295d2cb88814659880bd53ed", "class_name": "RelatedNodeInfo"}}, "text": "In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. ", "start_char_idx": 927, "end_char_idx": 1139, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c71e7e12-cedf-4542-b14b-231a8ddcb334": {"__data__": {"id_": "c71e7e12-cedf-4542-b14b-231a8ddcb334", "embedding": null, "metadata": {"window": "For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. ", "original_text": "In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5293cdfc-2093-4688-848c-c294e9d766ea", "node_type": "1", "metadata": {"window": "The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n", "original_text": "In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "07e6bf2415889dfeb6ec3f0ced3aed22d366912b4168f3708a208423ed0c64ae", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c575058c-205e-4995-955e-14e1968bfa57", "node_type": "1", "metadata": {"window": "Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . ", "original_text": "b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n"}, "hash": "7bcfc8b6e2e7375a50b7127cee6eb410279772315bc90b257d9e9fa34de1581e", "class_name": "RelatedNodeInfo"}}, "text": "In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n", "start_char_idx": 1139, "end_char_idx": 1253, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c575058c-205e-4995-955e-14e1968bfa57": {"__data__": {"id_": "c575058c-205e-4995-955e-14e1968bfa57", "embedding": null, "metadata": {"window": "Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . ", "original_text": "b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c71e7e12-cedf-4542-b14b-231a8ddcb334", "node_type": "1", "metadata": {"window": "For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. ", "original_text": "In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "93f85d829f378896e743a0dfdc28bd4ece3a65ef67bf7e450e253aa4a9b7a68f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d72190e5-f2aa-44a6-b790-d25e61ac052d", "node_type": "1", "metadata": {"window": "In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. ", "original_text": "c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n"}, "hash": "741457f1774afe350603fc037b3daf1120c9c9693f47f9f42d49c65056206147", "class_name": "RelatedNodeInfo"}}, "text": "b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n", "start_char_idx": 1253, "end_char_idx": 1548, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d72190e5-f2aa-44a6-b790-d25e61ac052d": {"__data__": {"id_": "d72190e5-f2aa-44a6-b790-d25e61ac052d", "embedding": null, "metadata": {"window": "In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. ", "original_text": "c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c575058c-205e-4995-955e-14e1968bfa57", "node_type": "1", "metadata": {"window": "Alert scenarios and se tting limit for particular activity \nshall be as guided at least by AML/CFT Committee. \n In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . ", "original_text": "b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "8336f2d91ebe482aca5dfd71ca672c566aff1d6f3bd85288efa7c6ca4b5e854b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b4288da3-3532-4958-8cbb-5f314e568859", "node_type": "1", "metadata": {"window": "In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n", "original_text": "Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. "}, "hash": "fa7680a9adda1175d71503bc6748d46a38b4de3d36c87e13e8581f4dbaa76482", "class_name": "RelatedNodeInfo"}}, "text": "c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n", "start_char_idx": 1548, "end_char_idx": 1662, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b4288da3-3532-4958-8cbb-5f314e568859": {"__data__": {"id_": "b4288da3-3532-4958-8cbb-5f314e568859", "embedding": null, "metadata": {"window": "In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n", "original_text": "Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d72190e5-f2aa-44a6-b790-d25e61ac052d", "node_type": "1", "metadata": {"window": "In addition to the regular activities, the Bank shall provide special attention to the following \nactivities: \na. Wire Transfer : \nMessages associated with wire transfers shall be subject to ongoing monitoring. In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. ", "original_text": "c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "ae01cb59e21d08bab10876ac87e1f023155149bbbeb3bd06be76842f326773a3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d1691c76-81d3-42d2-8b4b-13216c91266d", "node_type": "1", "metadata": {"window": "b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. ", "original_text": "Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . "}, "hash": "75620676dc3cd46041f3a9e9983fe559d0dd3b757a0d8087af60ba5cd72b6d58", "class_name": "RelatedNodeInfo"}}, "text": "Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. ", "start_char_idx": 1662, "end_char_idx": 1769, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d1691c76-81d3-42d2-8b4b-13216c91266d": {"__data__": {"id_": "d1691c76-81d3-42d2-8b4b-13216c91266d", "embedding": null, "metadata": {"window": "b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. ", "original_text": "Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b4288da3-3532-4958-8cbb-5f314e568859", "node_type": "1", "metadata": {"window": "In the \ncontext of wire transfers, the Bank shall identify the sender and beneficiary of the wire \ntransfer. \n \n b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n", "original_text": "Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "3bae29179ac14484b7b4b74c716b207d61c59529b3d1632390f7dce7f2074c6b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "81ec9bf4-9a1f-4c66-ab51-9c83014d037b", "node_type": "1", "metadata": {"window": "c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. ", "original_text": "If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. "}, "hash": "cfd3a88e53c30e86c7730d2e5d0b3651b57c0a18c8691dbba032fa5da3da55b2", "class_name": "RelatedNodeInfo"}}, "text": "Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . ", "start_char_idx": 1769, "end_char_idx": 1912, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "81ec9bf4-9a1f-4c66-ab51-9c83014d037b": {"__data__": {"id_": "81ec9bf4-9a1f-4c66-ab51-9c83014d037b", "embedding": null, "metadata": {"window": "c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. ", "original_text": "If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d1691c76-81d3-42d2-8b4b-13216c91266d", "node_type": "1", "metadata": {"window": "b. Trade related transactions: \nAll the trade transactions including all related parties thereto shall be strictly sanction \nchecked / monitored prior to the execution ensur ing that the appropriate customer due \ndiligence is carried out properly and periodically and to prevent TBML . \n \n c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. ", "original_text": "Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "bdf08961c8ec71eac50612989ba2a674b2347b63bbc96137fffd868c6aff9bd4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "480985cf-845c-4498-9784-3795b988ffbe", "node_type": "1", "metadata": {"window": "Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . ", "original_text": "Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n"}, "hash": "1f98d7ef9cb0c26c35ff9f0b9a5741d186cfb89fdd45c5403c4e61ef7fc2144e", "class_name": "RelatedNodeInfo"}}, "text": "If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. ", "start_char_idx": 1912, "end_char_idx": 2115, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "480985cf-845c-4498-9784-3795b988ffbe": {"__data__": {"id_": "480985cf-845c-4498-9784-3795b988ffbe", "embedding": null, "metadata": {"window": "Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . ", "original_text": "Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "81ec9bf4-9a1f-4c66-ab51-9c83014d037b", "node_type": "1", "metadata": {"window": "c. Correspondent Banking : \nThe Bank shall carry out ECDD while establishing a new correspondent relationship . \n Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. ", "original_text": "If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "ac6acf763f4f39eedc025fa21ba2d3c555c1aed2df8672105d501c2ffeb5e1c3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8c831ae1-636c-4638-a199-e71f19d1a116", "node_type": "1", "metadata": {"window": "Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. ", "original_text": "d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. "}, "hash": "326939d0d6a78fa2433f0864c310e10b83852d7626f3ce1cf742077f3167f5fe", "class_name": "RelatedNodeInfo"}}, "text": "Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n", "start_char_idx": 2115, "end_char_idx": 2285, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8c831ae1-636c-4638-a199-e71f19d1a116": {"__data__": {"id_": "8c831ae1-636c-4638-a199-e71f19d1a116", "embedding": null, "metadata": {"window": "Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. ", "original_text": "d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "480985cf-845c-4498-9784-3795b988ffbe", "node_type": "1", "metadata": {"window": "Treasury Department shall review existing correspondent banking relationship at least \non an annual basis. Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . ", "original_text": "Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "9ae27bf91081f5b8bc5fc437e7d28b1227e30cd2c6581185eafc067b825bc7ff", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b3304b34-b04b-4c3d-bef5-a595f990cd6a", "node_type": "1", "metadata": {"window": "If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "Remittance Department shall review existing relationship \nat least on an annual basis. "}, "hash": "06eb3711a9186738af09cebcb5b6cbbef72522cd1cb9ef45950fc4c444ef2c50", "class_name": "RelatedNodeInfo"}}, "text": "d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. ", "start_char_idx": 2285, "end_char_idx": 2434, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b3304b34-b04b-4c3d-bef5-a595f990cd6a": {"__data__": {"id_": "b3304b34-b04b-4c3d-bef5-a595f990cd6a", "embedding": null, "metadata": {"window": "If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "Remittance Department shall review existing relationship \nat least on an annual basis. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8c831ae1-636c-4638-a199-e71f19d1a116", "node_type": "1", "metadata": {"window": "Treasury Department shall perform CDD for all the existing \nBanks/Financial Institutions with which the Bank has correspondent relationship . If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. ", "original_text": "d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "1ec582358184bed81eedaa8881024f5f857849129c66c11419a8af1495c7f542", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "35050b70-c5a7-48cf-b9e2-650bd0ae7363", "node_type": "1", "metadata": {"window": "Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "Remittance Department shall perform CDD for all the \nexisting remittance partners . "}, "hash": "de1a62189a2dcaa8fbefb75d22ac8aec1b0a12153cb1595bf19e910e2a95fbc7", "class_name": "RelatedNodeInfo"}}, "text": "Remittance Department shall review existing relationship \nat least on an annual basis. ", "start_char_idx": 2434, "end_char_idx": 2522, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "35050b70-c5a7-48cf-b9e2-650bd0ae7363": {"__data__": {"id_": "35050b70-c5a7-48cf-b9e2-650bd0ae7363", "embedding": null, "metadata": {"window": "Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "Remittance Department shall perform CDD for all the \nexisting remittance partners . ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b3304b34-b04b-4c3d-bef5-a595f990cd6a", "node_type": "1", "metadata": {"window": "If the \nassessment is not satisfactory to the Bank in terms of AML/CFT measures, it shall be \ncommunicated to AML/ CFT Unit for presentment in AML/CFT Committee for \nappropriate i nstructions/ guidance. Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "Remittance Department shall review existing relationship \nat least on an annual basis. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "0ab28035efc3eab1f49937d0f78b77408b09a199c55174a1dcb4986250290292", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c4ed859d-65f6-4952-9136-e2168eaa364b", "node_type": "1", "metadata": {"window": "d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. "}, "hash": "59eb7acd3fa47c455824fd00384aad96e4fe48bd7c110aa6740a77e7e8eccd88", "class_name": "RelatedNodeInfo"}}, "text": "Remittance Department shall perform CDD for all the \nexisting remittance partners . ", "start_char_idx": 2522, "end_char_idx": 2606, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c4ed859d-65f6-4952-9136-e2168eaa364b": {"__data__": {"id_": "c4ed859d-65f6-4952-9136-e2168eaa364b", "embedding": null, "metadata": {"window": "d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "35050b70-c5a7-48cf-b9e2-650bd0ae7363", "node_type": "1", "metadata": {"window": "Treasury Department shall collect questionnaire in \nthe Bank\u2019s format or Wolfsberg Questionnaire during onboarding and every year and \nprovide it to AML/ CFT Unit . \n \n d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "Remittance Department shall perform CDD for all the \nexisting remittance partners . ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "28526ac118cf0c9f62bca70f5ee4a78abb2d67025506741d9f475114d83beba3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3ee50f81-fa6a-4edb-847c-6ca85593d6a1", "node_type": "1", "metadata": {"window": "Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n "}, "hash": "fe833565959c851b760533b485639b820fd28d176fb2d01814bb666d01eb0c93", "class_name": "RelatedNodeInfo"}}, "text": "If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. ", "start_char_idx": 2606, "end_char_idx": 2808, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3ee50f81-fa6a-4edb-847c-6ca85593d6a1": {"__data__": {"id_": "3ee50f81-fa6a-4edb-847c-6ca85593d6a1", "embedding": null, "metadata": {"window": "Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f", "node_type": "4", "metadata": {"page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c4ed859d-65f6-4952-9136-e2168eaa364b", "node_type": "1", "metadata": {"window": "d. Remittance agents / other partners: \nThe bank shall carry out ECDD of remittance partners while establishing a new \nrelationship for remittance. Remittance Department shall review existing relationship \nat least on an annual basis. Remittance Department shall perform CDD for all the \nexisting remittance partners . If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "original_text": "If the assessme nt is not satisfactory to the Bank in terms \nof AML/CFT measures, it shall be communicated to AML /CFT Unit for presentment in \nAML/CFT Committee for appropriate instructions/ guidance. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "hash": "0257a5fb9bf94d42110711f37ffe5d53aee71921ff4fa1413607ac0efb21e59a", "class_name": "RelatedNodeInfo"}}, "text": "Remittance Department \nshall collect questionnaire in the Bank\u2019s format or Wolfsberg Questionnaire during \nonboarding and every year and provide it to AML/CFT Unit. \n ", "start_char_idx": 2808, "end_char_idx": 2976, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "280c0e76-41c0-4264-8a9c-9da2abc3c6ec": {"__data__": {"id_": "280c0e76-41c0-4264-8a9c-9da2abc3c6ec", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ca6cb905-f47c-401a-bf43-e3a31a4f55da", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n", "original_text": "f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n"}, "hash": "5c40f45ff82139e60c0f0752ae5b255745f26a59a87bc17c6f636fe4908dad25", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n", "start_char_idx": 0, "end_char_idx": 238, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ca6cb905-f47c-401a-bf43-e3a31a4f55da": {"__data__": {"id_": "ca6cb905-f47c-401a-bf43-e3a31a4f55da", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n", "original_text": "f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "280c0e76-41c0-4264-8a9c-9da2abc3c6ec", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "44c633a033b7b07f52b20d8ae9a8ff8138e76cfe92211fd0b89aeed37d904169", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "90d1ef37-a2f9-4e2d-ae8d-9e949b3099ef", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. ", "original_text": "g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n"}, "hash": "8cad05de58aace3d9ea39ab158363d219de65477f891c5c17d8e68399c57dbea", "class_name": "RelatedNodeInfo"}}, "text": "f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n", "start_char_idx": 238, "end_char_idx": 425, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "90d1ef37-a2f9-4e2d-ae8d-9e949b3099ef": {"__data__": {"id_": "90d1ef37-a2f9-4e2d-ae8d-9e949b3099ef", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. ", "original_text": "g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ca6cb905-f47c-401a-bf43-e3a31a4f55da", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n", "original_text": "f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "ebcd4c2681c6325acee93ca62294187c4eff023b761b1c7499edbba2a17ec790", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d64e91df-5c26-4967-b652-9ae074915b33", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "original_text": "3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. "}, "hash": "f42b7ccf8440010a5cd0361cc87c9e49167816d674aaae773d5280bd11f7c502", "class_name": "RelatedNodeInfo"}}, "text": "g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n", "start_char_idx": 425, "end_char_idx": 575, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d64e91df-5c26-4967-b652-9ae074915b33": {"__data__": {"id_": "d64e91df-5c26-4967-b652-9ae074915b33", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "original_text": "3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "90d1ef37-a2f9-4e2d-ae8d-9e949b3099ef", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. ", "original_text": "g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "57f9e2bbfb139c0ea695eb7908399eae7b7a8c740df653903cf16c6ab1fbb322", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6b49d114-f4f4-485d-b910-70d6d6180da0", "node_type": "1", "metadata": {"window": "f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n", "original_text": "The records of such transactions are \nto be maintained. \n"}, "hash": "27658e0ab86d40b61b4d854000dc41cc3a697849c950197ca96a468e22ca3338", "class_name": "RelatedNodeInfo"}}, "text": "3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. ", "start_char_idx": 575, "end_char_idx": 748, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6b49d114-f4f4-485d-b910-70d6d6180da0": {"__data__": {"id_": "6b49d114-f4f4-485d-b910-70d6d6180da0", "embedding": null, "metadata": {"window": "f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n", "original_text": "The records of such transactions are \nto be maintained. \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d64e91df-5c26-4967-b652-9ae074915b33", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "original_text": "3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "3320e932b0e9fe4cb116d0604b294e232a50e12deff99bcf81b904713872081d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "44a95309-3132-4d05-80d1-c46a5678b3dc", "node_type": "1", "metadata": {"window": "g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . ", "original_text": "3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. "}, "hash": "130aeb8c0258f90d80c4b1d73b2683a30eddb7e4f6e05323eb585f6fda3feba9", "class_name": "RelatedNodeInfo"}}, "text": "The records of such transactions are \nto be maintained. \n", "start_char_idx": 748, "end_char_idx": 806, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "44a95309-3132-4d05-80d1-c46a5678b3dc": {"__data__": {"id_": "44a95309-3132-4d05-80d1-c46a5678b3dc", "embedding": null, "metadata": {"window": "g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . ", "original_text": "3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6b49d114-f4f4-485d-b910-70d6d6180da0", "node_type": "1", "metadata": {"window": "f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n", "original_text": "The records of such transactions are \nto be maintained. \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "87032d558930ca6e89e8e2dbb7c5cb884b7fe4f5d2146d0c3f750938197a3746", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "1fef1573-f066-4242-a6eb-2564da31ff53", "node_type": "1", "metadata": {"window": "3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. ", "original_text": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n"}, "hash": "802dc6dc785ff1cbef616ef1e299b65a8fc5371001dfee5f2c0dc627caeb61f8", "class_name": "RelatedNodeInfo"}}, "text": "3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. ", "start_char_idx": 806, "end_char_idx": 1013, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "1fef1573-f066-4242-a6eb-2564da31ff53": {"__data__": {"id_": "1fef1573-f066-4242-a6eb-2564da31ff53", "embedding": null, "metadata": {"window": "3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. ", "original_text": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "44a95309-3132-4d05-80d1-c46a5678b3dc", "node_type": "1", "metadata": {"window": "g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . ", "original_text": "3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "2cba5a4a776ca48238eca3669733a2384bf6df4e3e736cf28eae2f9773a089e8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ad7f3325-40a7-4edc-849c-1cf0a687bd08", "node_type": "1", "metadata": {"window": "The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n", "original_text": "3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n"}, "hash": "a6f4fd26f4f0bae0bf4db76f39953f785134bdeacb58ffe56e765e23705c1bc2", "class_name": "RelatedNodeInfo"}}, "text": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "start_char_idx": 1013, "end_char_idx": 1155, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ad7f3325-40a7-4edc-849c-1cf0a687bd08": {"__data__": {"id_": "ad7f3325-40a7-4edc-849c-1cf0a687bd08", "embedding": null, "metadata": {"window": "The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n", "original_text": "3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "1fef1573-f066-4242-a6eb-2564da31ff53", "node_type": "1", "metadata": {"window": "3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. ", "original_text": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "ce5c25e2349a0efa0196194b6e6dc82d44e7a0edf3eeba10375206e660042f83", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "87a116ae-c397-4230-8e39-fae765e6d4dd", "node_type": "1", "metadata": {"window": "3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. ", "original_text": "Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . "}, "hash": "a3ba90b354060d7a8232eab5b4d5dacb704a3c39235b71ef8e5e82984ebe77bd", "class_name": "RelatedNodeInfo"}}, "text": "3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n", "start_char_idx": 1155, "end_char_idx": 1717, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "87a116ae-c397-4230-8e39-fae765e6d4dd": {"__data__": {"id_": "87a116ae-c397-4230-8e39-fae765e6d4dd", "embedding": null, "metadata": {"window": "3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. ", "original_text": "Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ad7f3325-40a7-4edc-849c-1cf0a687bd08", "node_type": "1", "metadata": {"window": "The records of such transactions are \nto be maintained. \n 3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n", "original_text": "3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "9699a6a598f96ab093c310648ca863a620bfeb32177118689b5451ffa0f1d03b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d343ff63-7653-4429-a4f9-d48a41df1b27", "node_type": "1", "metadata": {"window": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n", "original_text": "Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. "}, "hash": "f44f1635e571310e9966b73e8e93780abdf7ef0b12e985770dbd1e3c9afa37db", "class_name": "RelatedNodeInfo"}}, "text": "Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . ", "start_char_idx": 1717, "end_char_idx": 1885, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d343ff63-7653-4429-a4f9-d48a41df1b27": {"__data__": {"id_": "d343ff63-7653-4429-a4f9-d48a41df1b27", "embedding": null, "metadata": {"window": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n", "original_text": "Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "87a116ae-c397-4230-8e39-fae765e6d4dd", "node_type": "1", "metadata": {"window": "3.2.2 Failure to Report \nStaff failing to report any identified unusual and suspic ious transactions, shall be \nsubject to action in accordance with Bank \u2019s policy ALPA or NRB Directive as \nappropriate. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. ", "original_text": "Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "b9f0c4f8e8077386c877d98ea276d1bf5cbba0a2066e12f7e83558f0fd2a2827", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8390024f-9a10-4c45-8477-8f43e6cc772d", "node_type": "1", "metadata": {"window": "3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n", "original_text": "If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n"}, "hash": "7988e31e0768340a7e2a63bc2ed362105c79840c0ba172bbe408ac9f4aca147c", "class_name": "RelatedNodeInfo"}}, "text": "Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. ", "start_char_idx": 1885, "end_char_idx": 2095, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8390024f-9a10-4c45-8477-8f43e6cc772d": {"__data__": {"id_": "8390024f-9a10-4c45-8477-8f43e6cc772d", "embedding": null, "metadata": {"window": "3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n", "original_text": "If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d343ff63-7653-4429-a4f9-d48a41df1b27", "node_type": "1", "metadata": {"window": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n", "original_text": "Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "b0e13b58a1b8d468669389534b6741b56c7c8ee6ed7b844ddb770c90c640aaca", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a172593c-f4f9-4d7b-b0ab-e683c8f21c70", "node_type": "1", "metadata": {"window": "Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. "}, "hash": "b4ebacb552a719e97ea18c007f3a35cfc693e9667e515001dff67fc022694d51", "class_name": "RelatedNodeInfo"}}, "text": "If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n", "start_char_idx": 2095, "end_char_idx": 2293, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a172593c-f4f9-4d7b-b0ab-e683c8f21c70": {"__data__": {"id_": "a172593c-f4f9-4d7b-b0ab-e683c8f21c70", "embedding": null, "metadata": {"window": "Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8390024f-9a10-4c45-8477-8f43e6cc772d", "node_type": "1", "metadata": {"window": "3.2.3 Sanctions and Name Screening \nAny person or entity designated by the United Nations Security Council under \nChapter VII of the Charter of the United Nations, pursuant to Security Council \nresolutions that relate to the prevention and disruption of the financing of \nproliferation of WMD shall be screened and such listed person/entity asset/fund, \nheld singly or in joint ownership, increment in such fund/asset shall be blocked \n(freeze ) and reported as per the Chapter 6 (kha), Section 29 (cha) of Asset (Money) \nLaunde ring Prevention Act 2064. \n \n Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n", "original_text": "If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "073a17614bc20e3d0ad5b18da82547fdc2674b15b177e11363f5c799c0240e37", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2a580198-957b-4937-9cbc-9c634ba3c008", "node_type": "1", "metadata": {"window": "Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n"}, "hash": "3b453794ed40ce37ee81f3a33b44e9bf48a65da38f1d258d9c0f7af5118c523e", "class_name": "RelatedNodeInfo"}}, "text": "Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. ", "start_char_idx": 2293, "end_char_idx": 2403, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2a580198-957b-4937-9cbc-9c634ba3c008": {"__data__": {"id_": "2a580198-957b-4937-9cbc-9c634ba3c008", "embedding": null, "metadata": {"window": "Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a172593c-f4f9-4d7b-b0ab-e683c8f21c70", "node_type": "1", "metadata": {"window": "Bank shall have an appropriate Sanction Screening mechanism (including batch \nscreening) ; the sanction list whenever gets updated shall be reflected in the \nsystem . Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "d3c913b33b90c6da152d852667db028fd951ef31371474b91eec78bf80ab006c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e138bd74-d5de-4d81-9ef5-5c4c15f03829", "node_type": "1", "metadata": {"window": "If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n"}, "hash": "3f7232e0fae57cd9fdb2bca72965126fa1029cd58f68e316202499e318d1b3af", "class_name": "RelatedNodeInfo"}}, "text": "The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n", "start_char_idx": 2403, "end_char_idx": 2531, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e138bd74-d5de-4d81-9ef5-5c4c15f03829": {"__data__": {"id_": "e138bd74-d5de-4d81-9ef5-5c4c15f03829", "embedding": null, "metadata": {"window": "If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2a580198-957b-4937-9cbc-9c634ba3c008", "node_type": "1", "metadata": {"window": "Further, Departments/Branches while opening account, reviewing \naccount, and initiating the wire transfer transaction shall perform the sanction check \nagainst customer and parties involved in the transaction. If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "96eb95d71c74a4c23faa3df6baf72e1873627267a04edc4bcb64ab59bc64d723", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7d06288f-71e6-4cb6-a44f-6c4a982fc775", "node_type": "1", "metadata": {"window": "Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) "}, "hash": "f60861d4249ec35aa35b795493defac496ca005728a7148f61d02f7ea94bc8b7", "class_name": "RelatedNodeInfo"}}, "text": "Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n", "start_char_idx": 2531, "end_char_idx": 2903, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7d06288f-71e6-4cb6-a44f-6c4a982fc775": {"__data__": {"id_": "7d06288f-71e6-4cb6-a44f-6c4a982fc775", "embedding": null, "metadata": {"window": "Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5", "node_type": "4", "metadata": {"page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e138bd74-d5de-4d81-9ef5-5c4c15f03829", "node_type": "1", "metadata": {"window": "If any exact/true match is \nfound with the list of United Nations Security Council , the Bank shall blo ck/freeze \nthe accounts/assets of such customer immediately and notify to the regulator10. \n Similarly, any customer under doubt on their information should also be referred to \nthe MLRO as suspicious. The MLRO shall investigate on such issues and derive \nconcl usion within reasonable time and give appropriate instruction. \n \n Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n 10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "original_text": "Further, the Bank shall check various lists directed/required by A LPA Act, \nRegulator and any other competent authorities so as to safe -guard Banks \nreputation and prevent it from being used by money launderers and terrorists, such \nas OFAC, UN, EU, HMT, Australian sanction list, Government of Nepal or any other \nsanctions list as deemed necessary by the Bank. \n \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "hash": "c1d0f567440f86c4ae9bbf2e7ec431e63365842abbccbc537ad3cfc5b4e01744", "class_name": "RelatedNodeInfo"}}, "text": "10 ALPA , 2064 \u2013 Chapter 6KHA , Clause ( 29 CHHA )(5) ", "start_char_idx": 2903, "end_char_idx": 2957, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "87cdb9f9-6443-4de6-805e-60fa79892b8c": {"__data__": {"id_": "87cdb9f9-6443-4de6-805e-60fa79892b8c", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . ", "original_text": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69", "node_type": "4", "metadata": {"page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "c44a222b03b0a13cabbeb2d2c2afb58d8c4f9bdf94ae578bf28b53470b01b3b1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "5b089c73-d94f-4170-9d23-00175b148dff", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. ", "original_text": "3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n"}, "hash": "626961940b821df4f36fb0f3e456db46367351d20972ff2eecfdd1928f4cd8db", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n", "start_char_idx": 0, "end_char_idx": 304, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5b089c73-d94f-4170-9d23-00175b148dff": {"__data__": {"id_": "5b089c73-d94f-4170-9d23-00175b148dff", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. ", "original_text": "3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69", "node_type": "4", "metadata": {"page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "c44a222b03b0a13cabbeb2d2c2afb58d8c4f9bdf94ae578bf28b53470b01b3b1", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "87cdb9f9-6443-4de6-805e-60fa79892b8c", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . ", "original_text": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "de766231e5d2f472534f8fbfaa2651a906da18b43f7faaa45ab1cbf35838b009", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2bedf45a-a532-4f34-af89-5e54ebbb3360", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n", "original_text": "Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. "}, "hash": "39c210b4a33fc8dbf851a484bdce9bfd0e57708e3d6b81a6d3cafcf2cdd5cbcc", "class_name": "RelatedNodeInfo"}}, "text": "3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n", "start_char_idx": 304, "end_char_idx": 589, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2bedf45a-a532-4f34-af89-5e54ebbb3360": {"__data__": {"id_": "2bedf45a-a532-4f34-af89-5e54ebbb3360", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n", "original_text": "Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. ", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69", "node_type": "4", "metadata": {"page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "c44a222b03b0a13cabbeb2d2c2afb58d8c4f9bdf94ae578bf28b53470b01b3b1", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5b089c73-d94f-4170-9d23-00175b148dff", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. ", "original_text": "3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "dc7e2ed9ba5e642ef0706bc01de70fd8e2e5748ce68ed9191324aaafc87d058c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c4a882e3-5baf-45de-a850-58acb66aaf09", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . "}, "hash": "844bff5d7a15c32868c95b4d2d29d1cd7d43574f2f1912eaf995576611ec7d44", "class_name": "RelatedNodeInfo"}}, "text": "Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. ", "start_char_idx": 589, "end_char_idx": 990, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c4a882e3-5baf-45de-a850-58acb66aaf09": {"__data__": {"id_": "c4a882e3-5baf-45de-a850-58acb66aaf09", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . ", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69", "node_type": "4", "metadata": {"page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "c44a222b03b0a13cabbeb2d2c2afb58d8c4f9bdf94ae578bf28b53470b01b3b1", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2bedf45a-a532-4f34-af89-5e54ebbb3360", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n", "original_text": "Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. ", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "b24ff48429e1563cc2602d2fe0953863932bc418c559fbf457d1d4b146a0ab90", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "efa844fa-c6b3-49df-bf77-56953f9df462", "node_type": "1", "metadata": {"window": "3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. "}, "hash": "a9ea4f5f6d067a122740c24b90dac2e6592e52778e61f5ae81288c51d9bda31c", "class_name": "RelatedNodeInfo"}}, "text": "However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . ", "start_char_idx": 990, "end_char_idx": 1117, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "efa844fa-c6b3-49df-bf77-56953f9df462": {"__data__": {"id_": "efa844fa-c6b3-49df-bf77-56953f9df462", "embedding": null, "metadata": {"window": "3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. ", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69", "node_type": "4", "metadata": {"page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "c44a222b03b0a13cabbeb2d2c2afb58d8c4f9bdf94ae578bf28b53470b01b3b1", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c4a882e3-5baf-45de-a850-58acb66aaf09", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . ", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "a511034d0ce65a6b4234914925c60d3943452618f2665152447bf6810a0c280c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "79183a94-0bfd-4e26-b2ac-01b4844777d6", "node_type": "1", "metadata": {"window": "Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n"}, "hash": "b6793d74fb3a80547eac077a2d9b7366b9364c3314e68ba9286057e63470443b", "class_name": "RelatedNodeInfo"}}, "text": "The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. ", "start_char_idx": 1117, "end_char_idx": 1212, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "79183a94-0bfd-4e26-b2ac-01b4844777d6": {"__data__": {"id_": "79183a94-0bfd-4e26-b2ac-01b4844777d6", "embedding": null, "metadata": {"window": "Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69", "node_type": "4", "metadata": {"page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "c44a222b03b0a13cabbeb2d2c2afb58d8c4f9bdf94ae578bf28b53470b01b3b1", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "efa844fa-c6b3-49df-bf77-56953f9df462", "node_type": "1", "metadata": {"window": "3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. ", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "376b6cf67d92c8672c1f17409e23995a3c63c9548f654bee1eebf167e67ca63a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b90b3dfd-a42f-4419-b97f-f89f1c08ab54", "node_type": "1", "metadata": {"window": "However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n "}, "hash": "1e2e4f18debce453b96d8cca0c4edcb4110d96499ea68ea5afc78d251c567040", "class_name": "RelatedNodeInfo"}}, "text": "Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n", "start_char_idx": 1212, "end_char_idx": 1342, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b90b3dfd-a42f-4419-b97f-f89f1c08ab54": {"__data__": {"id_": "b90b3dfd-a42f-4419-b97f-f89f1c08ab54", "embedding": null, "metadata": {"window": "However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69", "node_type": "4", "metadata": {"page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "c44a222b03b0a13cabbeb2d2c2afb58d8c4f9bdf94ae578bf28b53470b01b3b1", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "79183a94-0bfd-4e26-b2ac-01b4844777d6", "node_type": "1", "metadata": {"window": "Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . The MLRO shall further analyze \nand, if suspicion is established, shall be reported t o FIU. Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n 3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "original_text": "Similarly, TTR shall also \nbe report ed to the FIU by the AML/CFT Unit as per TTR and other re lated \nguidelines issued by FIU. \n", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "hash": "ac67a01513aa6b04a79587473a54bba3daa5d6173c8d596b09ca81a9b200de2d", "class_name": "RelatedNodeInfo"}}, "text": "3.3 Record Keeping \nThe Bank shall maintain following records accurately and securely records for minimum of \nfive years after the termination of business relationship or from the date of transaction or \nfrom the date of occasional transaction: \na. Documents and records related to identification and verification of customer and \nbeneficial owner, \nb. Documents, records and conclusion of the analysis of customer or beneficial owner \nand transaction, \nc. Documents, details and records related to accounting and business relation of the \nBank \nd. Documents, details and records relating to domestic and foreign transactions, \ne. Documents, details and records of attempted t ransactions, \nf. Other documents, details and records as prescribed by regulators. \n ", "start_char_idx": 1342, "end_char_idx": 2113, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4e3e7b84-0d91-4cf7-b805-b232c8b649ba": {"__data__": {"id_": "4e3e7b84-0d91-4cf7-b805-b232c8b649ba", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "81d50026-2523-41c6-9b77-902190f43f7b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. ", "original_text": "Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . "}, "hash": "d88ec7a4cff94ae17b4eefaeca3e8945c57b13a9c20670fe298b60b1db98fe92", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. ", "start_char_idx": 0, "end_char_idx": 91, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "81d50026-2523-41c6-9b77-902190f43f7b": {"__data__": {"id_": "81d50026-2523-41c6-9b77-902190f43f7b", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. ", "original_text": "Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4e3e7b84-0d91-4cf7-b805-b232c8b649ba", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "8f32526d1a72129d8e73c550f89378cae51b0e5a9b9c4f8f51ef0de510332d7a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "05dec978-9706-4716-ac11-f33bae44ea0b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. ", "original_text": "The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. "}, "hash": "99eb12a502183bac70351cc8dfa63d9970140e086bd56c1701d635e0cddf2412", "class_name": "RelatedNodeInfo"}}, "text": "Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . ", "start_char_idx": 91, "end_char_idx": 270, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "05dec978-9706-4716-ac11-f33bae44ea0b": {"__data__": {"id_": "05dec978-9706-4716-ac11-f33bae44ea0b", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. ", "original_text": "The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "81d50026-2523-41c6-9b77-902190f43f7b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. ", "original_text": "Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "f8d24a0ac6b5d2a132d606c2b93a75d34a27083208e69ac1d3977f8d4cb53cf4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "713a8421-fb21-41ba-ab14-183e576edcf8", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . ", "original_text": "Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n"}, "hash": "1859a4fb5d81400405f89e32b21d5c96e0d007b78d549b70d0061837876e3004", "class_name": "RelatedNodeInfo"}}, "text": "The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. ", "start_char_idx": 270, "end_char_idx": 425, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "713a8421-fb21-41ba-ab14-183e576edcf8": {"__data__": {"id_": "713a8421-fb21-41ba-ab14-183e576edcf8", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . ", "original_text": "Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "05dec978-9706-4716-ac11-f33bae44ea0b", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. ", "original_text": "The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "a0d7fe3c315da66f649ce70aea6a59f499f144c6f2048bde3f9d672167b1c93c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "fe545f00-c6d3-4531-9c21-45cdddb63c6b", "node_type": "1", "metadata": {"window": "Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . ", "original_text": "Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. "}, "hash": "8864edb8513f92f07e0a17c778253ef4db1a2bf3da179a9a4f97a160f84a035f", "class_name": "RelatedNodeInfo"}}, "text": "Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n", "start_char_idx": 425, "end_char_idx": 919, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "fe545f00-c6d3-4531-9c21-45cdddb63c6b": {"__data__": {"id_": "fe545f00-c6d3-4531-9c21-45cdddb63c6b", "embedding": null, "metadata": {"window": "Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . ", "original_text": "Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "713a8421-fb21-41ba-ab14-183e576edcf8", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . ", "original_text": "Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "00b8ff37c5994e35d93e3b9bd6cb1247726c7af7b0789c272e7d66ba17ffccac", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "fb3649b3-a0a1-4bf8-a6fb-31d6cb3e4f3a", "node_type": "1", "metadata": {"window": "The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n", "original_text": "Feedback of onsite visits shall be submitted to the CCO for review. "}, "hash": "2f5a55f8be4b064abcbc3b5f7c69b57687ee9aca487d17de20a0c8af84516e91", "class_name": "RelatedNodeInfo"}}, "text": "Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. ", "start_char_idx": 919, "end_char_idx": 1106, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "fb3649b3-a0a1-4bf8-a6fb-31d6cb3e4f3a": {"__data__": {"id_": "fb3649b3-a0a1-4bf8-a6fb-31d6cb3e4f3a", "embedding": null, "metadata": {"window": "The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n", "original_text": "Feedback of onsite visits shall be submitted to the CCO for review. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "fe545f00-c6d3-4531-9c21-45cdddb63c6b", "node_type": "1", "metadata": {"window": "Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . ", "original_text": "Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "49b0892f056934945aaff9507d51a474952a9ed4824b2c8fd10c4a01ddad8be2", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9dead0bc-0207-435a-ae20-ce09bcfe8f58", "node_type": "1", "metadata": {"window": "Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. ", "original_text": "More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . "}, "hash": "5bcdb1449349bcc32d6439be3917a13d126b17e8e7f59241c8accbe33c4dfeb2", "class_name": "RelatedNodeInfo"}}, "text": "Feedback of onsite visits shall be submitted to the CCO for review. ", "start_char_idx": 1106, "end_char_idx": 1175, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9dead0bc-0207-435a-ae20-ce09bcfe8f58": {"__data__": {"id_": "9dead0bc-0207-435a-ae20-ce09bcfe8f58", "embedding": null, "metadata": {"window": "Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. ", "original_text": "More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "fb3649b3-a0a1-4bf8-a6fb-31d6cb3e4f3a", "node_type": "1", "metadata": {"window": "The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n", "original_text": "Feedback of onsite visits shall be submitted to the CCO for review. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "0a830bf94b1a7d73a7d1ad6cd2f10170e377814c2d2cd4f8ba4feff066a88da3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c7c5137c-0629-4b93-86d0-e670c9f67a27", "node_type": "1", "metadata": {"window": "Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. ", "original_text": "The training shall be conducted in coordination with HRD . "}, "hash": "d5bef497c9e42f71ab939150279582af0dc5f16d78770c3c965b96891993b271", "class_name": "RelatedNodeInfo"}}, "text": "More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . ", "start_char_idx": 1175, "end_char_idx": 1287, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c7c5137c-0629-4b93-86d0-e670c9f67a27": {"__data__": {"id_": "c7c5137c-0629-4b93-86d0-e670c9f67a27", "embedding": null, "metadata": {"window": "Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. ", "original_text": "The training shall be conducted in coordination with HRD . ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9dead0bc-0207-435a-ae20-ce09bcfe8f58", "node_type": "1", "metadata": {"window": "Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. ", "original_text": "More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "96a84d390c70ad522a7948b71a522abf3b8de6685f05f35bb69f3fd33193444b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8757f6b1-ae55-499f-b25f-de05ab6dda08", "node_type": "1", "metadata": {"window": "Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n", "original_text": "All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n"}, "hash": "524b69e3ac3fe1528da186bebfdbff31242eece21a8283297dfca75311dbf9f4", "class_name": "RelatedNodeInfo"}}, "text": "The training shall be conducted in coordination with HRD . ", "start_char_idx": 1287, "end_char_idx": 1346, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8757f6b1-ae55-499f-b25f-de05ab6dda08": {"__data__": {"id_": "8757f6b1-ae55-499f-b25f-de05ab6dda08", "embedding": null, "metadata": {"window": "Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n", "original_text": "All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c7c5137c-0629-4b93-86d0-e670c9f67a27", "node_type": "1", "metadata": {"window": "Further, onsite/offsite branch/departments visits shall be conducted by the AML/CFT Unit \nas felt necessary to check/monitor the activities and to create awareness in aspect to \nAML/CFT. Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. ", "original_text": "The training shall be conducted in coordination with HRD . ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "b2b10c78b48acd400fa4c09ce7802cdddeb43b03fb46cbc9a1bba6d10f897b2e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f40f7e2e-0b7f-4b3e-a2b9-23ed6bc639b7", "node_type": "1", "metadata": {"window": "More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. ", "original_text": "4.2. "}, "hash": "5c73b5d83e1417b072ed331f92754935f36268837d76ff323baf48fee06c7ee9", "class_name": "RelatedNodeInfo"}}, "text": "All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n", "start_char_idx": 1346, "end_char_idx": 1479, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f40f7e2e-0b7f-4b3e-a2b9-23ed6bc639b7": {"__data__": {"id_": "f40f7e2e-0b7f-4b3e-a2b9-23ed6bc639b7", "embedding": null, "metadata": {"window": "More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. ", "original_text": "4.2. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8757f6b1-ae55-499f-b25f-de05ab6dda08", "node_type": "1", "metadata": {"window": "Feedback of onsite visits shall be submitted to the CCO for review. More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n", "original_text": "All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "5fdde89194f989c4e29c79fdb2972ac45a6e7398e2268617e58391cafe5517fc", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d1a21348-e334-4cfd-bec4-dd62abb6f17e", "node_type": "1", "metadata": {"window": "The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n", "original_text": "Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. "}, "hash": "081adb45aedf55f9175cceaa27a925869176e9f5d71577ef60dde229040bd1b4", "class_name": "RelatedNodeInfo"}}, "text": "4.2. ", "start_char_idx": 1479, "end_char_idx": 1484, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d1a21348-e334-4cfd-bec4-dd62abb6f17e": {"__data__": {"id_": "d1a21348-e334-4cfd-bec4-dd62abb6f17e", "embedding": null, "metadata": {"window": "The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n", "original_text": "Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f40f7e2e-0b7f-4b3e-a2b9-23ed6bc639b7", "node_type": "1", "metadata": {"window": "More \nextensive training including foreign training shall also be provided to staff under AML/CFT \nfunctions . The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. ", "original_text": "4.2. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "d09e6e27360177622b8e3e0f80c31f219bf20082d76746e23d3504e4051a47a9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e04b7813-1ac3-41bd-9d76-1989880984cd", "node_type": "1", "metadata": {"window": "All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. ", "original_text": "Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n"}, "hash": "0a4b3f5a66efe4299675277890df1ba53ec5e0e7a555bf79250f71486f2bb153", "class_name": "RelatedNodeInfo"}}, "text": "Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. ", "start_char_idx": 1484, "end_char_idx": 1848, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e04b7813-1ac3-41bd-9d76-1989880984cd": {"__data__": {"id_": "e04b7813-1ac3-41bd-9d76-1989880984cd", "embedding": null, "metadata": {"window": "All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. ", "original_text": "Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d1a21348-e334-4cfd-bec4-dd62abb6f17e", "node_type": "1", "metadata": {"window": "The training shall be conducted in coordination with HRD . All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n", "original_text": "Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "0737112ef83730ad8aac8e07487d73fbcb70c1e088eeb2c1560daa6467f6afcb", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4d438801-b2bf-411f-977d-f82dd9f153ee", "node_type": "1", "metadata": {"window": "4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. ", "original_text": "Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. "}, "hash": "1a46439b3b5af0cd4de7d86efe49a447e721c2e48a8ccb7257f26de9f557a175", "class_name": "RelatedNodeInfo"}}, "text": "Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n", "start_char_idx": 1848, "end_char_idx": 1931, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4d438801-b2bf-411f-977d-f82dd9f153ee": {"__data__": {"id_": "4d438801-b2bf-411f-977d-f82dd9f153ee", "embedding": null, "metadata": {"window": "4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. ", "original_text": "Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e04b7813-1ac3-41bd-9d76-1989880984cd", "node_type": "1", "metadata": {"window": "All Branch Managers/ \nHead of Departments shall ensure that all staff members have read and understood The \nPolicy and Guideline. \n 4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. ", "original_text": "Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "e22d8bd28c049277f91f9c276f73962246678d0a3908c66ff2ffa6a5402da309", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d906a6e3-7a82-4967-b953-b0fdc66a6e47", "node_type": "1", "metadata": {"window": "Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n", "original_text": "Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n"}, "hash": "28414940f7e3ff00ae33dbd676004febe35e2033f1cc2e46e68153ddec3fbde1", "class_name": "RelatedNodeInfo"}}, "text": "Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. ", "start_char_idx": 1931, "end_char_idx": 2084, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d906a6e3-7a82-4967-b953-b0fdc66a6e47": {"__data__": {"id_": "d906a6e3-7a82-4967-b953-b0fdc66a6e47", "embedding": null, "metadata": {"window": "Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n", "original_text": "Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4d438801-b2bf-411f-977d-f82dd9f153ee", "node_type": "1", "metadata": {"window": "4.2. Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. ", "original_text": "Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "30d893e981f757373995323cef7c2c3136ad8d75a84a76946ba5e3939ba81528", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9b99d183-9a8b-43db-b957-6e4913e35169", "node_type": "1", "metadata": {"window": "Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. ", "original_text": "4.3. "}, "hash": "4aa8bb935ad3bb01bf6879808de3f5bc76c348fe9a11037fcd6f25f1c7e00edb", "class_name": "RelatedNodeInfo"}}, "text": "Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n", "start_char_idx": 2084, "end_char_idx": 2247, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9b99d183-9a8b-43db-b957-6e4913e35169": {"__data__": {"id_": "9b99d183-9a8b-43db-b957-6e4913e35169", "embedding": null, "metadata": {"window": "Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. ", "original_text": "4.3. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d906a6e3-7a82-4967-b953-b0fdc66a6e47", "node_type": "1", "metadata": {"window": "Confidentiality and Tipping off \nThe Bank shall keep the details of all transaction of STR, TTR, and correspondence record \nto and from the regulatory body on Bank's customers under the investigation as confidential \nand this information shall not be shared with the customer or any irrelevant bank staff, \nunrelated official meetings or anyone outside the Bank. Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n", "original_text": "Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "4b64dc5da6e65af5d141e6cc2d1e3ed4eb02f3b7f15f019d40e026bf60f0168e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "329fa215-36f6-4ca9-9ab5-f4cbbc2dd9b4", "node_type": "1", "metadata": {"window": "Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "original_text": "Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. "}, "hash": "f555450f67fca2d8775e111ec794564516079a04ab8905db632ef8bbfd746b35", "class_name": "RelatedNodeInfo"}}, "text": "4.3. ", "start_char_idx": 2247, "end_char_idx": 2252, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "329fa215-36f6-4ca9-9ab5-f4cbbc2dd9b4": {"__data__": {"id_": "329fa215-36f6-4ca9-9ab5-f4cbbc2dd9b4", "embedding": null, "metadata": {"window": "Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "original_text": "Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9b99d183-9a8b-43db-b957-6e4913e35169", "node_type": "1", "metadata": {"window": "Tipping off will be treated as a \ncriminal offe nse and be punished accordingly. \n Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. ", "original_text": "4.3. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "17c5ab16c85d573e0a46ce72a854fdee537ff4d3a42f9fa170d1c365cff78f3f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "bc7ed399-c799-4a22-a1b6-e1f003dd5610", "node_type": "1", "metadata": {"window": "Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. ", "original_text": "Any deliberate breach will be viewed as gross misconduct. \n"}, "hash": "65e2c674d52df4694709c076b8abd8c201a771499265644904f93e62df45480a", "class_name": "RelatedNodeInfo"}}, "text": "Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. ", "start_char_idx": 2252, "end_char_idx": 2391, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "bc7ed399-c799-4a22-a1b6-e1f003dd5610": {"__data__": {"id_": "bc7ed399-c799-4a22-a1b6-e1f003dd5610", "embedding": null, "metadata": {"window": "Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. ", "original_text": "Any deliberate breach will be viewed as gross misconduct. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "329fa215-36f6-4ca9-9ab5-f4cbbc2dd9b4", "node_type": "1", "metadata": {"window": "Further, any documents, information and transaction details of the customer shall be kept \nconfidential and not leaked/shared to an unauthorized person. Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "original_text": "Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "28d4b7f05a697ba96255c1bb7a8f8be975dd6350ec81a7c2ec7441c168a43bfa", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "67b55cd7-f8e1-469b-ad4b-03fa99f217a6", "node_type": "1", "metadata": {"window": "4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. ", "original_text": "Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. "}, "hash": "dd96655cfe7ecd86cfe529467419ea384e56a4174f24945d4a7858d44076ec61", "class_name": "RelatedNodeInfo"}}, "text": "Any deliberate breach will be viewed as gross misconduct. \n", "start_char_idx": 2391, "end_char_idx": 2450, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "67b55cd7-f8e1-469b-ad4b-03fa99f217a6": {"__data__": {"id_": "67b55cd7-f8e1-469b-ad4b-03fa99f217a6", "embedding": null, "metadata": {"window": "4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. ", "original_text": "Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "bc7ed399-c799-4a22-a1b6-e1f003dd5610", "node_type": "1", "metadata": {"window": "Such personal data is \nconsidered as confidential and is prohibited to be shared to the third party unless otherwise \nstipulated by the applicable Legislation11. \n 4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. ", "original_text": "Any deliberate breach will be viewed as gross misconduct. \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "910978dee79dec751575b489260c17c1d0ede680f0bb711c0c8412a983623ba7", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "418bdbeb-1337-428f-9947-64b09fbb11d2", "node_type": "1", "metadata": {"window": "Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . ", "original_text": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n"}, "hash": "b87f5db35e8fc2df4b12470c03418f493bf5600b0ba833c556273272d248e2bf", "class_name": "RelatedNodeInfo"}}, "text": "Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. ", "start_char_idx": 2450, "end_char_idx": 2564, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "418bdbeb-1337-428f-9947-64b09fbb11d2": {"__data__": {"id_": "418bdbeb-1337-428f-9947-64b09fbb11d2", "embedding": null, "metadata": {"window": "Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . ", "original_text": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "67b55cd7-f8e1-469b-ad4b-03fa99f217a6", "node_type": "1", "metadata": {"window": "4.3. Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. ", "original_text": "Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "16017dbc6d6fd1f26f1ff7e6d29741dd465409b4f81cd430a2facedd47d45548", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f3fd52ab-6701-4e46-bc50-334d434e5506", "node_type": "1", "metadata": {"window": "Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. ", "original_text": "4.4. "}, "hash": "e2b1b7bef17cb0a4b131d65f1d4e5c05eb35c94b4ef48f8b77421622b49ab221", "class_name": "RelatedNodeInfo"}}, "text": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "start_char_idx": 2564, "end_char_idx": 2705, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f3fd52ab-6701-4e46-bc50-334d434e5506": {"__data__": {"id_": "f3fd52ab-6701-4e46-bc50-334d434e5506", "embedding": null, "metadata": {"window": "Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. ", "original_text": "4.4. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "418bdbeb-1337-428f-9947-64b09fbb11d2", "node_type": "1", "metadata": {"window": "Non-Compliance \nFailure from staffs to abide by The Policy set by the Bank to prevent ML and TF will be \ntreated as a disciplinary issue. Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . ", "original_text": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "f40c5a56a2d07a4f84de0c2eb574efa0a68207a9e07f71554cde4b02ba647474", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9b6eccff-e7af-41e1-9e66-b386cde7c1c0", "node_type": "1", "metadata": {"window": "Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. "}, "hash": "725c5c4dee4f446380f6329068c5c1fd7f5f5842ed5c193aa446ed6750ad4a71", "class_name": "RelatedNodeInfo"}}, "text": "4.4. ", "start_char_idx": 2705, "end_char_idx": 2710, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9b6eccff-e7af-41e1-9e66-b386cde7c1c0": {"__data__": {"id_": "9b6eccff-e7af-41e1-9e66-b386cde7c1c0", "embedding": null, "metadata": {"window": "Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f3fd52ab-6701-4e46-bc50-334d434e5506", "node_type": "1", "metadata": {"window": "Any deliberate breach will be viewed as gross misconduct. \n Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. ", "original_text": "4.4. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "25a0f90bf4e679e653dede701ac50c384e478fa9450de48ecdc9b98a75eba4b9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "19e66bab-9c92-4328-9ef0-c968ba87545d", "node_type": "1", "metadata": {"window": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . "}, "hash": "585b267218d887c83c42035f32ed1734770b34583782d2bd8646b424870c434d", "class_name": "RelatedNodeInfo"}}, "text": "Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. ", "start_char_idx": 2710, "end_char_idx": 3034, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "19e66bab-9c92-4328-9ef0-c968ba87545d": {"__data__": {"id_": "19e66bab-9c92-4328-9ef0-c968ba87545d", "embedding": null, "metadata": {"window": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9b6eccff-e7af-41e1-9e66-b386cde7c1c0", "node_type": "1", "metadata": {"window": "Further, such actions shall also attract the penalty as per the applicable legislation and \nregulatory provision. MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "056125f791a2b974fedb50b690018838496f51f52be2e2d93de9de3f9e960cdc", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ab51dd03-4549-42e0-8ce6-c7bec4f90dea", "node_type": "1", "metadata": {"window": "4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. "}, "hash": "3387cd62416105740b7b7196cd947e4947154a143cf87be46068f8fe6a84b649", "class_name": "RelatedNodeInfo"}}, "text": "Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . ", "start_char_idx": 3034, "end_char_idx": 3171, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ab51dd03-4549-42e0-8ce6-c7bec4f90dea": {"__data__": {"id_": "ab51dd03-4549-42e0-8ce6-c7bec4f90dea", "embedding": null, "metadata": {"window": "4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "19e66bab-9c92-4328-9ef0-c968ba87545d", "node_type": "1", "metadata": {"window": "MLRO shall have the authority to recommend suitable action for such \nstaffs failing to adhere with this policy in consultation with CCO . \n 4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "082fbed411c4e004222c0790103ae180651c07e033c1384215ac3e44b0a2d5c7", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a3543077-dc63-462e-bdde-45a63f52b730", "node_type": "1", "metadata": {"window": "Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) "}, "hash": "52c8034c16deff70b6f0a9fff3d67ae2e52553a66a96a52ef672b073365cfa98", "class_name": "RelatedNodeInfo"}}, "text": "Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. ", "start_char_idx": 3171, "end_char_idx": 3279, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a3543077-dc63-462e-bdde-45a63f52b730": {"__data__": {"id_": "a3543077-dc63-462e-bdde-45a63f52b730", "embedding": null, "metadata": {"window": "Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9", "node_type": "4", "metadata": {"page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ab51dd03-4549-42e0-8ce6-c7bec4f90dea", "node_type": "1", "metadata": {"window": "4.4. Not to be Liable for Providing Information \nIn case any loss occurs to a person/customer or to the business of the bank a s a result of \nsubmission of information to the FIU or other investigating authorities by the designated \nstaff in good faith, the Bank shall not take any action to such designated officials .12 \n4.5. Importance of Know Your Employee (KYE) \nThe bank employees will conduct themselves in accordance with the hi ghest ethical \nstandards . Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "original_text": "Staff should not provide advice or other assistance to individuals who are \nindulging in ML/TF activities. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "hash": "1073f27d6742f8686db30b8c3eac613477120f4adfcf1cdc615a9cf9ff2e5568", "class_name": "RelatedNodeInfo"}}, "text": "Any knowledge / information of any staff involved in such \n \n11 ALPA \u2013 Chapter 6, Clause ( 26) \n12 ALPA \u2013 Chapter 8, Clause ( 37) ", "start_char_idx": 3279, "end_char_idx": 3410, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e53f0119-da24-4204-88c5-936fab297322": {"__data__": {"id_": "e53f0119-da24-4204-88c5-936fab297322", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460", "node_type": "4", "metadata": {"page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "74d4e276c5a0df0efb6151fd6cde663f294b70f6efc69505b0b6565dff909170", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4f2cb7ba-803b-414c-8fad-e09bf904bef8", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. ", "original_text": "Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . "}, "hash": "d70d1e26718524b8269bef6ecfaf736ae7e67f11cb1c738f95e25457c6eaee7f", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n", "start_char_idx": 0, "end_char_idx": 189, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4f2cb7ba-803b-414c-8fad-e09bf904bef8": {"__data__": {"id_": "4f2cb7ba-803b-414c-8fad-e09bf904bef8", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. ", "original_text": "Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . ", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460", "node_type": "4", "metadata": {"page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "74d4e276c5a0df0efb6151fd6cde663f294b70f6efc69505b0b6565dff909170", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e53f0119-da24-4204-88c5-936fab297322", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "5ef346c5b111f5000e916192b9264f33f0945eccf592917e831227a702503f48", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "bd03b071-a4f2-47be-8f28-d03f6308a455", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n", "original_text": "It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n"}, "hash": "d075e1e29ebf6d30a64df812bb5f810671644117b455ddb1a55db88b4e84a90c", "class_name": "RelatedNodeInfo"}}, "text": "Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . ", "start_char_idx": 189, "end_char_idx": 322, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "bd03b071-a4f2-47be-8f28-d03f6308a455": {"__data__": {"id_": "bd03b071-a4f2-47be-8f28-d03f6308a455", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n", "original_text": "It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460", "node_type": "4", "metadata": {"page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "74d4e276c5a0df0efb6151fd6cde663f294b70f6efc69505b0b6565dff909170", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "4f2cb7ba-803b-414c-8fad-e09bf904bef8", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. ", "original_text": "Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . ", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "0e944ca4d47335f4a1c8385114817b4a39ece8f1824387d1bede70a6ffd3db57", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "65cd9328-4671-4d36-8c75-e84b8a97fced", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. ", "original_text": "4.6. "}, "hash": "f83bce9a7a31c1e0e70dbfe70390747237f7017f69ef9f9af5b18c0f136cdee9", "class_name": "RelatedNodeInfo"}}, "text": "It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n", "start_char_idx": 322, "end_char_idx": 512, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "65cd9328-4671-4d36-8c75-e84b8a97fced": {"__data__": {"id_": "65cd9328-4671-4d36-8c75-e84b8a97fced", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. ", "original_text": "4.6. ", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460", "node_type": "4", "metadata": {"page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "74d4e276c5a0df0efb6151fd6cde663f294b70f6efc69505b0b6565dff909170", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "bd03b071-a4f2-47be-8f28-d03f6308a455", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n", "original_text": "It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "641b7e9ebc8166af7d8fd692300635c8c6ca6d1d68f1d535202188ec0775d910", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "cfb22927-a751-4cd7-bdd6-cfd0ba9ab7ae", "node_type": "1", "metadata": {"window": "Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. "}, "hash": "ca139cab6c84a7e8aaeff9062245a9653cd0c242d13a1d3c14ea627d49436610", "class_name": "RelatedNodeInfo"}}, "text": "4.6. ", "start_char_idx": 512, "end_char_idx": 517, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "cfb22927-a751-4cd7-bdd6-cfd0ba9ab7ae": {"__data__": {"id_": "cfb22927-a751-4cd7-bdd6-cfd0ba9ab7ae", "embedding": null, "metadata": {"window": "Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. ", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460", "node_type": "4", "metadata": {"page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "74d4e276c5a0df0efb6151fd6cde663f294b70f6efc69505b0b6565dff909170", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "65cd9328-4671-4d36-8c75-e84b8a97fced", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. ", "original_text": "4.6. ", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "df764cc070aec6ef62bebed8b9806ce755ad5fcd10a5e8e17f551b2aa3646dfd", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0200d07e-ac4a-4836-a687-85bceb36acac", "node_type": "1", "metadata": {"window": "It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n"}, "hash": "1abee0bf3866d80b4f0612c4b6301ffb550e54dc056dfb9405d3e1688a109302", "class_name": "RelatedNodeInfo"}}, "text": "Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. ", "start_char_idx": 517, "end_char_idx": 743, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0200d07e-ac4a-4836-a687-85bceb36acac": {"__data__": {"id_": "0200d07e-ac4a-4836-a687-85bceb36acac", "embedding": null, "metadata": {"window": "It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460", "node_type": "4", "metadata": {"page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "74d4e276c5a0df0efb6151fd6cde663f294b70f6efc69505b0b6565dff909170", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "cfb22927-a751-4cd7-bdd6-cfd0ba9ab7ae", "node_type": "1", "metadata": {"window": "Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. ", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "3845ce808065ded1c03174f8beed88ef38c38784c36d362e659176463c81c5b8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "216c6559-336b-4dad-9799-4b97091755cc", "node_type": "1", "metadata": {"window": "4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "13 Unified Directive 2078, directive no. "}, "hash": "5536821d0af7d88078c6e6a09b8eff43621299976558b25974346e8c2204a0d2", "class_name": "RelatedNodeInfo"}}, "text": "Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n", "start_char_idx": 743, "end_char_idx": 818, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "216c6559-336b-4dad-9799-4b97091755cc": {"__data__": {"id_": "216c6559-336b-4dad-9799-4b97091755cc", "embedding": null, "metadata": {"window": "4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "13 Unified Directive 2078, directive no. ", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460", "node_type": "4", "metadata": {"page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "74d4e276c5a0df0efb6151fd6cde663f294b70f6efc69505b0b6565dff909170", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0200d07e-ac4a-4836-a687-85bceb36acac", "node_type": "1", "metadata": {"window": "It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "5dfca20b68183342611cfe9069787660c0ede5c2de44b128fbb26ac543b56cdd", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "22c2f1c7-5c1e-488c-8bac-d5aa917d73ad", "node_type": "1", "metadata": {"window": "Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) "}, "hash": "d86042c19649c3b15b4a42bc0accb9905b01d3ee5cf9fb12703e9ec938f445c0", "class_name": "RelatedNodeInfo"}}, "text": "13 Unified Directive 2078, directive no. ", "start_char_idx": 818, "end_char_idx": 859, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "22c2f1c7-5c1e-488c-8bac-d5aa917d73ad": {"__data__": {"id_": "22c2f1c7-5c1e-488c-8bac-d5aa917d73ad", "embedding": null, "metadata": {"window": "Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460", "node_type": "4", "metadata": {"page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "74d4e276c5a0df0efb6151fd6cde663f294b70f6efc69505b0b6565dff909170", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "216c6559-336b-4dad-9799-4b97091755cc", "node_type": "1", "metadata": {"window": "4.6. Code -of-conduct \nAs per the Personnel Policy Guidelines of the bank, HRD shall obtain signed and accepted \nCode of Conduct from every staff ensuring that the staffs have understood and aware of \ncode of conduct of the Bank. Also, a code for conduct for the BOD is also to be obtained13. \n \n \n \n \n \n 13 Unified Directive 2078, directive no. 19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "original_text": "13 Unified Directive 2078, directive no. ", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "hash": "efcdae973ba8907037a88970407c1e90b1498aa58ff83d9415b67c050376cf98", "class_name": "RelatedNodeInfo"}}, "text": "19/078, Clause ( 18) (10) added through NRB circular 4/079/80 dated 2 -\nDec-22 (2079/8/16 BS) ", "start_char_idx": 859, "end_char_idx": 954, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5cb2ca77-8c68-4eca-ba7b-09fd6f940847": {"__data__": {"id_": "5cb2ca77-8c68-4eca-ba7b-09fd6f940847", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c570b9fd-00b6-44cc-9eb6-3e013d8cdd0a", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) ", "original_text": "AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. "}, "hash": "e47d04d4dd8f7f941e205a7d1cc5f2f6385bebfa8ff9364a9f6c019eb50d54f4", "class_name": "RelatedNodeInfo"}}, "text": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. ", "start_char_idx": 0, "end_char_idx": 84, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c570b9fd-00b6-44cc-9eb6-3e013d8cdd0a": {"__data__": {"id_": "c570b9fd-00b6-44cc-9eb6-3e013d8cdd0a", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) ", "original_text": "AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5cb2ca77-8c68-4eca-ba7b-09fd6f940847", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "f37706b970bedeee6b4225daea7500c8fca15fc4a41053ba3971a4f9e6872240", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a5d51abe-ea19-4749-aac1-0b15fde47d8c", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. ", "original_text": "The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n"}, "hash": "5e3c98d33a4aca6cdd6346f3e8d12c0e2a3175b95f4fe04f0d643f315d6e6c28", "class_name": "RelatedNodeInfo"}}, "text": "AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. ", "start_char_idx": 84, "end_char_idx": 166, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a5d51abe-ea19-4749-aac1-0b15fde47d8c": {"__data__": {"id_": "a5d51abe-ea19-4749-aac1-0b15fde47d8c", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. ", "original_text": "The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c570b9fd-00b6-44cc-9eb6-3e013d8cdd0a", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) ", "original_text": "AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "0f4e5132065c998224653a1d34bc57cae145933ac2b2dd5fba6bbdb1ecc01f0b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8035ab1f-a41e-4fe9-bf09-ec5ca904acef", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n", "original_text": "5.2. "}, "hash": "5451613769bf2af51f33cbeca0c36eb9d59ad3aef508298de20ecfd675cd1489", "class_name": "RelatedNodeInfo"}}, "text": "The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n", "start_char_idx": 166, "end_char_idx": 371, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8035ab1f-a41e-4fe9-bf09-ec5ca904acef": {"__data__": {"id_": "8035ab1f-a41e-4fe9-bf09-ec5ca904acef", "embedding": null, "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n", "original_text": "5.2. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a5d51abe-ea19-4749-aac1-0b15fde47d8c", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. ", "original_text": "The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "efc708c64b315bcbf4c9bdf59bfe550ff1fd622271fea106caa830466c23be9f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a23ebbe3-906f-4680-b1f3-a8fb40303f61", "node_type": "1", "metadata": {"window": "AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. ", "original_text": "Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) "}, "hash": "b4fb7c9cbf299fc0190c0c3d5338720527e13a1a99834cf44f5148c7623f671c", "class_name": "RelatedNodeInfo"}}, "text": "5.2. ", "start_char_idx": 371, "end_char_idx": 376, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a23ebbe3-906f-4680-b1f3-a8fb40303f61": {"__data__": {"id_": "a23ebbe3-906f-4680-b1f3-a8fb40303f61", "embedding": null, "metadata": {"window": "AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. ", "original_text": "Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8035ab1f-a41e-4fe9-bf09-ec5ca904acef", "node_type": "1", "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n", "original_text": "5.2. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "df556fe1797ff33507c1547629aacd380d6bf4bae61cbb066ff7bee560450556", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "27461456-384c-47b7-b8c8-98d570467a6d", "node_type": "1", "metadata": {"window": "The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. ", "original_text": "shall be developed in compliance to this Policy. "}, "hash": "9517fafeef489ed7185e907813d34b49d07f2d67565141027eb692f2849c0e29", "class_name": "RelatedNodeInfo"}}, "text": "Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) ", "start_char_idx": 376, "end_char_idx": 480, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "27461456-384c-47b7-b8c8-98d570467a6d": {"__data__": {"id_": "27461456-384c-47b7-b8c8-98d570467a6d", "embedding": null, "metadata": {"window": "The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. ", "original_text": "shall be developed in compliance to this Policy. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a23ebbe3-906f-4680-b1f3-a8fb40303f61", "node_type": "1", "metadata": {"window": "AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. ", "original_text": "Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "ff2acf7fc74dfe85dcb9771f86b4e1250a372234e1e530fed053afa71b4827c8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "aee00e79-c56b-4bd1-8a78-2057cc30c0e8", "node_type": "1", "metadata": {"window": "5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. ", "original_text": "Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n"}, "hash": "8acd790740280d77e4568fba508a6f16ef62b420748ecd1eccf7200446df1bb5", "class_name": "RelatedNodeInfo"}}, "text": "shall be developed in compliance to this Policy. ", "start_char_idx": 480, "end_char_idx": 529, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "aee00e79-c56b-4bd1-8a78-2057cc30c0e8": {"__data__": {"id_": "aee00e79-c56b-4bd1-8a78-2057cc30c0e8", "embedding": null, "metadata": {"window": "5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. ", "original_text": "Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "27461456-384c-47b7-b8c8-98d570467a6d", "node_type": "1", "metadata": {"window": "The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. ", "original_text": "shall be developed in compliance to this Policy. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "012e647de435bb3f13844aee3aebc169fdd956caf396095c32bc44ad557e1b50", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "724f31c2-5a6e-477f-a1ea-1e3edaeb4b4a", "node_type": "1", "metadata": {"window": "Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. ", "original_text": "While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. "}, "hash": "93fa5ff0bf0f1b45fdfba87f704b86149ee83683a7a5d427f2eeaa4ddb01888e", "class_name": "RelatedNodeInfo"}}, "text": "Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n", "start_char_idx": 529, "end_char_idx": 711, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "724f31c2-5a6e-477f-a1ea-1e3edaeb4b4a": {"__data__": {"id_": "724f31c2-5a6e-477f-a1ea-1e3edaeb4b4a", "embedding": null, "metadata": {"window": "Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. ", "original_text": "While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "aee00e79-c56b-4bd1-8a78-2057cc30c0e8", "node_type": "1", "metadata": {"window": "5.2. Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. ", "original_text": "Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7fd8e5569856b39e7d6eb7230c6256310d67a5ea1d1ebd115ade27f81046129a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "892abaa6-8499-4327-bb96-06284025b901", "node_type": "1", "metadata": {"window": "shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. ", "original_text": "Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. "}, "hash": "f3e921e4e93f2ec31c402bb5f02c1e30c3ff015d25577cfa6254e663701693fa", "class_name": "RelatedNodeInfo"}}, "text": "While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. ", "start_char_idx": 711, "end_char_idx": 895, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "892abaa6-8499-4327-bb96-06284025b901": {"__data__": {"id_": "892abaa6-8499-4327-bb96-06284025b901", "embedding": null, "metadata": {"window": "shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. ", "original_text": "Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "724f31c2-5a6e-477f-a1ea-1e3edaeb4b4a", "node_type": "1", "metadata": {"window": "Others \nAll other internal documents of the Bank (policies, manuals, process notes, guidelines, \netc.) shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. ", "original_text": "While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "3a0b8b7aaee2895f9384b00f022727b352e8ffcb31eb694184be11affd78ab21", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "04b9e023-54a9-48bd-b155-eb593f297bdd", "node_type": "1", "metadata": {"window": "Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n", "original_text": "The Bank may review AML/CFT related \ndocuments and practices of such affiliates. "}, "hash": "4f149d5ad8ee6afa874428c74f32ae5208b2abfe8df35883e761a6045a29fff5", "class_name": "RelatedNodeInfo"}}, "text": "Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. ", "start_char_idx": 895, "end_char_idx": 1038, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "04b9e023-54a9-48bd-b155-eb593f297bdd": {"__data__": {"id_": "04b9e023-54a9-48bd-b155-eb593f297bdd", "embedding": null, "metadata": {"window": "Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n", "original_text": "The Bank may review AML/CFT related \ndocuments and practices of such affiliates. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "892abaa6-8499-4327-bb96-06284025b901", "node_type": "1", "metadata": {"window": "shall be developed in compliance to this Policy. Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. ", "original_text": "Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "df30e3153197a6884286473b00a7ba8288beab4dd5e786e192774f947dd29c0c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "20cb6038-10f9-4d16-b107-1cd06e1e0e6a", "node_type": "1", "metadata": {"window": "While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. ", "original_text": "The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. "}, "hash": "3f318956ca65d3e618e642e5d0eecc2df2a8be3ba0e00e624e63466302d49846", "class_name": "RelatedNodeInfo"}}, "text": "The Bank may review AML/CFT related \ndocuments and practices of such affiliates. ", "start_char_idx": 1038, "end_char_idx": 1119, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "20cb6038-10f9-4d16-b107-1cd06e1e0e6a": {"__data__": {"id_": "20cb6038-10f9-4d16-b107-1cd06e1e0e6a", "embedding": null, "metadata": {"window": "While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. ", "original_text": "The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "04b9e023-54a9-48bd-b155-eb593f297bdd", "node_type": "1", "metadata": {"window": "Likewise, all the process notes and \nproduct papers should mention about the monitoring and control mechanism of ML/TF as \nper this Policy and AML/CFT Guidelines where applicable. \n While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n", "original_text": "The Bank may review AML/CFT related \ndocuments and practices of such affiliates. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "2b0ec05aee5469185e1fd6e0ca5ccb786124bce1368f9b6acc3f787556b67127", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "33b4d705-5b0e-44ba-9e0d-a823990bf169", "node_type": "1", "metadata": {"window": "Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc.", "original_text": "The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. "}, "hash": "96acd7972930cd9008f580f0f6a295ba90b71b9b7e36a4936f844c1349002d98", "class_name": "RelatedNodeInfo"}}, "text": "The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. ", "start_char_idx": 1119, "end_char_idx": 1304, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "33b4d705-5b0e-44ba-9e0d-a823990bf169": {"__data__": {"id_": "33b4d705-5b0e-44ba-9e0d-a823990bf169", "embedding": null, "metadata": {"window": "Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc.", "original_text": "The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "20cb6038-10f9-4d16-b107-1cd06e1e0e6a", "node_type": "1", "metadata": {"window": "While introducing new products and services or entering affiliation with any third party, the \nBank shall confirm that it is in accordance with this Policy and NRB Directives and Act. Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. ", "original_text": "The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "9ddd767af19477adf8a031f6827e2ae4495827219c06425dc3a8c2a0ca6f481b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c887158b-3381-4c4b-acfc-233bf64aebaf", "node_type": "1", "metadata": {"window": "The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. ", "original_text": "Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n"}, "hash": "fa28eea10d91dbd670682b58609a4ffdc24dbf272c582c9d18fed2771a4bd4f9", "class_name": "RelatedNodeInfo"}}, "text": "The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. ", "start_char_idx": 1304, "end_char_idx": 1454, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c887158b-3381-4c4b-acfc-233bf64aebaf": {"__data__": {"id_": "c887158b-3381-4c4b-acfc-233bf64aebaf", "embedding": null, "metadata": {"window": "The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. ", "original_text": "Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "33b4d705-5b0e-44ba-9e0d-a823990bf169", "node_type": "1", "metadata": {"window": "Any \naffiliates of the Bank shall have policies and practices which preven t the organization from \nmoney laundering and terrorist activities. The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc.", "original_text": "The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "80ee31de8b8e329accfd865f893be3da3040a98a3521700a6dca797a872b96aa", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "180e4ce0-e01b-4b8f-bfaf-14189430a48f", "node_type": "1", "metadata": {"window": "The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. ", "original_text": "5.3. "}, "hash": "5775b052e80f99be54ef6587538762c1732bbd8e0e7fe1d08984eb85c17f2277", "class_name": "RelatedNodeInfo"}}, "text": "Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n", "start_char_idx": 1454, "end_char_idx": 1574, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "180e4ce0-e01b-4b8f-bfaf-14189430a48f": {"__data__": {"id_": "180e4ce0-e01b-4b8f-bfaf-14189430a48f", "embedding": null, "metadata": {"window": "The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. ", "original_text": "5.3. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c887158b-3381-4c4b-acfc-233bf64aebaf", "node_type": "1", "metadata": {"window": "The Bank may review AML/CFT related \ndocuments and practices of such affiliates. The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. ", "original_text": "Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "b2c80f86e741f5aaa3c64b0b616bdc8849fbbf3681e72dd9d7d19dda0417c2b1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "cae614fa-03f8-4886-b62d-3b8e05d62d75", "node_type": "1", "metadata": {"window": "The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n", "original_text": "Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc."}, "hash": "04138e82241f22c037530cb7bdebbeff05b6c2850bb71ac67250f1aeab9e61fb", "class_name": "RelatedNodeInfo"}}, "text": "5.3. ", "start_char_idx": 1574, "end_char_idx": 1580, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "cae614fa-03f8-4886-b62d-3b8e05d62d75": {"__data__": {"id_": "cae614fa-03f8-4886-b62d-3b8e05d62d75", "embedding": null, "metadata": {"window": "The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n", "original_text": "Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc.", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "180e4ce0-e01b-4b8f-bfaf-14189430a48f", "node_type": "1", "metadata": {"window": "The subsidiary companies of the Bank shall \nprepare their own AML/CFT Policy as directed by their respective R egulators and shall \nalso be in line/spirit with the Policy of the Bank. The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. ", "original_text": "5.3. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "564473797358b6e98f97225f52f0c6b14358a30e459f4429415d24f07b21b50c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "39cc9373-6da8-4f5a-95c4-4e81f0f83b35", "node_type": "1", "metadata": {"window": "Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n", "original_text": "), and internal and external dynamics in \nwhich Bank operates. "}, "hash": "e53a3980b36171770228f00db7517aaa1da583c208ae8796329a7a85f9fb2aa9", "class_name": "RelatedNodeInfo"}}, "text": "Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc.", "start_char_idx": 1580, "end_char_idx": 1825, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "39cc9373-6da8-4f5a-95c4-4e81f0f83b35": {"__data__": {"id_": "39cc9373-6da8-4f5a-95c4-4e81f0f83b35", "embedding": null, "metadata": {"window": "Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n", "original_text": "), and internal and external dynamics in \nwhich Bank operates. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "cae614fa-03f8-4886-b62d-3b8e05d62d75", "node_type": "1", "metadata": {"window": "The Bank representative office established \nabroad shall follow the A LPA and Provisions of their jurisdictions as well as The Policy and \nGuideline. Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n", "original_text": "Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc.", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "57baa1ba9f98a8dfc99ad8fa7730398757622a403adb9d69345d6479839ead10", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "50f9afff-32fd-4345-a9e5-fb54e7ec2c63", "node_type": "1", "metadata": {"window": "5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. ", "original_text": "Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. "}, "hash": "cc1eec8ac6fc6391ac1b7acc95dcbccf2d93beee0ffeabbaf5a73f5d266594bb", "class_name": "RelatedNodeInfo"}}, "text": "), and internal and external dynamics in \nwhich Bank operates. ", "start_char_idx": 1825, "end_char_idx": 1888, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "50f9afff-32fd-4345-a9e5-fb54e7ec2c63": {"__data__": {"id_": "50f9afff-32fd-4345-a9e5-fb54e7ec2c63", "embedding": null, "metadata": {"window": "5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. ", "original_text": "Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "39cc9373-6da8-4f5a-95c4-4e81f0f83b35", "node_type": "1", "metadata": {"window": "Where there is a conflict or confusio n between such, the more stringent policies, \nguidelines and rules shall apply. \n 5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n", "original_text": "), and internal and external dynamics in \nwhich Bank operates. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "8e3355355baff555e513426d914a9000b73def3295a00bd37d3f2b306fddc16c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f8f8b6e1-b323-41fd-85ba-6a4b6e29e8c1", "node_type": "1", "metadata": {"window": "Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . ", "original_text": "Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n"}, "hash": "a866b986067b053452fb644454c54400b651eaface96e52482a44351ba8ac8ee", "class_name": "RelatedNodeInfo"}}, "text": "Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. ", "start_char_idx": 1888, "end_char_idx": 2072, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f8f8b6e1-b323-41fd-85ba-6a4b6e29e8c1": {"__data__": {"id_": "f8f8b6e1-b323-41fd-85ba-6a4b6e29e8c1", "embedding": null, "metadata": {"window": "Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . ", "original_text": "Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "50f9afff-32fd-4345-a9e5-fb54e7ec2c63", "node_type": "1", "metadata": {"window": "5.3. Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. ", "original_text": "Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "28a72341e8770a6f026a95a5a2079c5d4808426ef75cf76208f58569a92a59c3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7160204a-9bae-4def-be19-1aaa04593075", "node_type": "1", "metadata": {"window": "), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n", "original_text": "This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n"}, "hash": "db53fb32a203fe3e40eedcda1e2ac1c1fd8794edca3e41a1cf8db80133d85eee", "class_name": "RelatedNodeInfo"}}, "text": "Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n", "start_char_idx": 2072, "end_char_idx": 2155, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7160204a-9bae-4def-be19-1aaa04593075": {"__data__": {"id_": "7160204a-9bae-4def-be19-1aaa04593075", "embedding": null, "metadata": {"window": "), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n", "original_text": "This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f8f8b6e1-b323-41fd-85ba-6a4b6e29e8c1", "node_type": "1", "metadata": {"window": "Maintenance and Update \nThe review and update of this Policy shall be an ongoing process to ensure continuous \nalignment with the Bank\u2019s strategy, Risk assessment reports as per NRB Directives (such \nas Annual ML/TF Risk Assessment Report, etc. ), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . ", "original_text": "Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "da7f25f0522425390ccf3a0fe630142f359cb11210de1ab84c21b4d3475d5a2a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c030132a-f9b1-4ad7-a328-18b6530adb71", "node_type": "1", "metadata": {"window": "Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. ", "original_text": "5.4. "}, "hash": "66d14cd20f2e3cd841c8195a28c397edacffaf116cae1974a5f665162d141d56", "class_name": "RelatedNodeInfo"}}, "text": "This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n", "start_char_idx": 2155, "end_char_idx": 2253, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c030132a-f9b1-4ad7-a328-18b6530adb71": {"__data__": {"id_": "c030132a-f9b1-4ad7-a328-18b6530adb71", "embedding": null, "metadata": {"window": "Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. ", "original_text": "5.4. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7160204a-9bae-4def-be19-1aaa04593075", "node_type": "1", "metadata": {"window": "), and internal and external dynamics in \nwhich Bank operates. Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n", "original_text": "This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "58b311db4267c193f6fa55b9203f8116944bb205e003bc9be29afa0bd0d789d5", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "04023cc9-dc58-42e3-b4e5-535bcabfb7a5", "node_type": "1", "metadata": {"window": "Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . "}, "hash": "531cc7b64a0c31e8322af540cb3cc550fda479ef2fd4a54dea75ad04a8451985", "class_name": "RelatedNodeInfo"}}, "text": "5.4. ", "start_char_idx": 2253, "end_char_idx": 2258, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "04023cc9-dc58-42e3-b4e5-535bcabfb7a5": {"__data__": {"id_": "04023cc9-dc58-42e3-b4e5-535bcabfb7a5", "embedding": null, "metadata": {"window": "Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c030132a-f9b1-4ad7-a328-18b6530adb71", "node_type": "1", "metadata": {"window": "Such factors shall include the developments, changes, and trends \nwhether required by law or by generally accepted risk management or business practices \nwithin the financial sector. Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. ", "original_text": "5.4. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "f4f3b91cec7c46862fa6fd29de17303c0db5479c4fe64bde0a86b6d9d170408f", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "968e9f84-ce3e-43c7-9e73-52ae72a4f8bb", "node_type": "1", "metadata": {"window": "This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n"}, "hash": "84c3767dc19868d8274cb77d2e8a4ddea07892134a281db5489299652114b475", "class_name": "RelatedNodeInfo"}}, "text": "Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . ", "start_char_idx": 2258, "end_char_idx": 2356, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "968e9f84-ce3e-43c7-9e73-52ae72a4f8bb": {"__data__": {"id_": "968e9f84-ce3e-43c7-9e73-52ae72a4f8bb", "embedding": null, "metadata": {"window": "This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "04023cc9-dc58-42e3-b4e5-535bcabfb7a5", "node_type": "1", "metadata": {"window": "Review and amendments of The Policy shall be as sessed and \napproved by the BOD. \n This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "715b5dfae804c34d4d3b4b900fd8ce6e111af8424e09c6a0e50c27932514d68d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "1cbea5fc-1a4e-42d4-9d8f-c0f5ad4a4885", "node_type": "1", "metadata": {"window": "5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "5.5. "}, "hash": "494571b15b7a12862889d8b873b5a3b75b4913de870c1e0e603ac6a9de328ad4", "class_name": "RelatedNodeInfo"}}, "text": "All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n", "start_char_idx": 2356, "end_char_idx": 2479, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "1cbea5fc-1a4e-42d4-9d8f-c0f5ad4a4885": {"__data__": {"id_": "1cbea5fc-1a4e-42d4-9d8f-c0f5ad4a4885", "embedding": null, "metadata": {"window": "5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "5.5. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "968e9f84-ce3e-43c7-9e73-52ae72a4f8bb", "node_type": "1", "metadata": {"window": "This Policy shall be subject to review at least once a year or whenever circumstances \njustify. \n 5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "a8488dff08195275bac7c51bf0437b35f1f5c944c810140dc43fb59101684d2b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2d5ff229-5b86-4a90-b589-649b7320c30a", "node_type": "1", "metadata": {"window": "Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n "}, "hash": "66506fbce6ab981a3bc15a0a9b2cf7d04b8fdcaaac262b3c3a519eb27f789ab8", "class_name": "RelatedNodeInfo"}}, "text": "5.5. ", "start_char_idx": 2479, "end_char_idx": 2484, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2d5ff229-5b86-4a90-b589-649b7320c30a": {"__data__": {"id_": "2d5ff229-5b86-4a90-b589-649b7320c30a", "embedding": null, "metadata": {"window": "Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9917c9ce-5007-41c0-a3da-0c22199145ca", "node_type": "4", "metadata": {"page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "1cbea5fc-1a4e-42d4-9d8f-c0f5ad4a4885", "node_type": "1", "metadata": {"window": "5.4. Repeal and Savings \nThe existing p olicy of the bank shall be repeal ed upon approval from BOD . All actions \ntaken and functions performed shall be considered to have been taken or performed \npursuant to The P olicy. \n 5.5. Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "original_text": "5.5. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "hash": "7eabbe1ac34f2d8fc463cf59421f5f7e237867d33dbd16fbb8cfda9dd5fc25dd", "class_name": "RelatedNodeInfo"}}, "text": "Effective Date \nThe Policy shall come into effect following approval from the BOD with immediate effect . \n \n \n ", "start_char_idx": 2484, "end_char_idx": 2599, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "961c0993-1414-4237-9fcd-5e18abbc1f27": {"__data__": {"id_": "961c0993-1414-4237-9fcd-5e18abbc1f27", "embedding": null, "metadata": {"window": " \n \n \nMuktinath Temple (Chumig Gyatsa) \nDistrict : Mustang Country : Nepal \nAltitude : 3710 meter Distance : 406 km from Kathmandu \nNearest Airport : Jomsom 200 km from Pokhara \nName in Hindu : Mukti K shetra Name in B uddhist : Chumig Gyatsa \nDivya Desam (premium \ntemples) 106th Shakti Peethams 51st \nGod Worshipped Vishnu \nMuktinath Temple \n\"The holiest of holy Vishnu temple in Mustang \nDistrict of Nepal\" ", "original_text": " \n \n \nMuktinath Temple (Chumig Gyatsa) \nDistrict : Mustang Country : Nepal \nAltitude : 3710 meter Distance : 406 km from Kathmandu \nNearest Airport : Jomsom 200 km from Pokhara \nName in Hindu : Mukti K shetra Name in B uddhist : Chumig Gyatsa \nDivya Desam (premium \ntemples) 106th Shakti Peethams 51st \nGod Worshipped Vishnu \nMuktinath Temple \n\"The holiest of holy Vishnu temple in Mustang \nDistrict of Nepal\" ", "page_label": "1", "file_name": "muktinath.pdf", "doc_id": "a2935351-6da3-4318-a839-4ee3ea5fc91d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a2935351-6da3-4318-a839-4ee3ea5fc91d", "node_type": "4", "metadata": {"page_label": "1", "file_name": "muktinath.pdf", "doc_id": "a2935351-6da3-4318-a839-4ee3ea5fc91d"}, "hash": "beeeb201d4c460874c61cf9bb322ce5033e518cb809f30eb8ea7ba3a1ecdeff6", "class_name": "RelatedNodeInfo"}}, "text": " \n \n \nMuktinath Temple (Chumig Gyatsa) \nDistrict : Mustang Country : Nepal \nAltitude : 3710 meter Distance : 406 km from Kathmandu \nNearest Airport : Jomsom 200 km from Pokhara \nName in Hindu : Mukti K shetra Name in B uddhist : Chumig Gyatsa \nDivya Desam (premium \ntemples) 106th Shakti Peethams 51st \nGod Worshipped Vishnu \nMuktinath Temple \n\"The holiest of holy Vishnu temple in Mustang \nDistrict of Nepal\" ", "start_char_idx": 0, "end_char_idx": 430, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "5020b73f-8873-4bc9-a860-984ff814f4ea": {"__data__": {"id_": "5020b73f-8873-4bc9-a860-984ff814f4ea", "embedding": null, "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). ", "original_text": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8e2e6e89-ded8-4515-9f9c-53a543c290d3", "node_type": "1", "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n", "original_text": "Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. "}, "hash": "8464e432a7750853350995247e0bb45edc369d35c871ac8bd6b2be80a9f61899", "class_name": "RelatedNodeInfo"}}, "text": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. ", "start_char_idx": 0, "end_char_idx": 154, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8e2e6e89-ded8-4515-9f9c-53a543c290d3": {"__data__": {"id_": "8e2e6e89-ded8-4515-9f9c-53a543c290d3", "embedding": null, "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n", "original_text": "Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "5020b73f-8873-4bc9-a860-984ff814f4ea", "node_type": "1", "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). ", "original_text": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "171bccf26b353dcd675eb0c1d3948607f86cf0cc3972bc5bc9977d32992cf90d", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a3e6ae4f-aa90-49a5-9bf0-9721d367ab6d", "node_type": "1", "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. ", "original_text": "Therefore he is worshipped as \nMuktinath (Lit. "}, "hash": "ecb68331c9a7eacecc4e17d3ce75de230a33a4957d1c0b4ee300d5b8dc084ad2", "class_name": "RelatedNodeInfo"}}, "text": "Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. ", "start_char_idx": 154, "end_char_idx": 249, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a3e6ae4f-aa90-49a5-9bf0-9721d367ab6d": {"__data__": {"id_": "a3e6ae4f-aa90-49a5-9bf0-9721d367ab6d", "embedding": null, "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. ", "original_text": "Therefore he is worshipped as \nMuktinath (Lit. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8e2e6e89-ded8-4515-9f9c-53a543c290d3", "node_type": "1", "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n", "original_text": "Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "6bc4ffbfc3180d48abf2d582e29d5434fc34e9104db783f7f567aaf94eec65d1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "e5f227b2-6b9f-4596-bd0e-9efb449a11f1", "node_type": "1", "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. ", "original_text": "the lord of salvation). "}, "hash": "2672959e63a36a0922d534c5056f35905d1f8f96cdbc0710dccab6de733a534f", "class_name": "RelatedNodeInfo"}}, "text": "Therefore he is worshipped as \nMuktinath (Lit. ", "start_char_idx": 249, "end_char_idx": 296, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "e5f227b2-6b9f-4596-bd0e-9efb449a11f1": {"__data__": {"id_": "e5f227b2-6b9f-4596-bd0e-9efb449a11f1", "embedding": null, "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. ", "original_text": "the lord of salvation). ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a3e6ae4f-aa90-49a5-9bf0-9721d367ab6d", "node_type": "1", "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. ", "original_text": "Therefore he is worshipped as \nMuktinath (Lit. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "4931308f32678b311ee8ab917a4f022f70fb5ac4b7efb85ed5c2e973c89a40ed", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8648d275-f562-4f15-8b2f-98dbc599a3eb", "node_type": "1", "metadata": {"window": "Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. ", "original_text": "The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n"}, "hash": "e381d3caf40910e5eda4983c61f0904c74644e06655a93cd6e8dd1e9a77b10e3", "class_name": "RelatedNodeInfo"}}, "text": "the lord of salvation). ", "start_char_idx": 296, "end_char_idx": 320, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8648d275-f562-4f15-8b2f-98dbc599a3eb": {"__data__": {"id_": "8648d275-f562-4f15-8b2f-98dbc599a3eb", "embedding": null, "metadata": {"window": "Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. ", "original_text": "The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "e5f227b2-6b9f-4596-bd0e-9efb449a11f1", "node_type": "1", "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. ", "original_text": "the lord of salvation). ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "32e0b95cc8b7365a5feb36772e44f0d04450d852250a8eef1b0ccade6d2708cd", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9cc69d8d-10c3-4775-a835-b59bc19029c3", "node_type": "1", "metadata": {"window": "Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. ", "original_text": "This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. "}, "hash": "0727ad75f1c14c4a30c1cc43b3cb988e7a86fe50690a2e2d81a5c58e98e96c69", "class_name": "RelatedNodeInfo"}}, "text": "The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n", "start_char_idx": 320, "end_char_idx": 517, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9cc69d8d-10c3-4775-a835-b59bc19029c3": {"__data__": {"id_": "9cc69d8d-10c3-4775-a835-b59bc19029c3", "embedding": null, "metadata": {"window": "Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. ", "original_text": "This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8648d275-f562-4f15-8b2f-98dbc599a3eb", "node_type": "1", "metadata": {"window": "Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. ", "original_text": "The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "3f7d92ed1318202fbf9fef807915e80e5bce455b38ca078f5859b9d012f2e3ae", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2eee2bd9-d3c6-42b6-a5ba-161c3140627e", "node_type": "1", "metadata": {"window": "the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. ", "original_text": "Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. "}, "hash": "30c45dbdb1707bfc4e01bb4422d34e579763429eea90853823823ee358bfe17a", "class_name": "RelatedNodeInfo"}}, "text": "This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. ", "start_char_idx": 517, "end_char_idx": 591, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2eee2bd9-d3c6-42b6-a5ba-161c3140627e": {"__data__": {"id_": "2eee2bd9-d3c6-42b6-a5ba-161c3140627e", "embedding": null, "metadata": {"window": "the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. ", "original_text": "Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9cc69d8d-10c3-4775-a835-b59bc19029c3", "node_type": "1", "metadata": {"window": "Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. ", "original_text": "This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "b8ca607de6618148d9f7e4d81d499b8ecfe1fa43fafbe70b279359f5677b69d7", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c676c70a-da45-43e0-bd7b-5cdd29aaddac", "node_type": "1", "metadata": {"window": "The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). ", "original_text": "Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. "}, "hash": "422e84314392a55fd2d015c44a0e8c5f15a0075f0219289f77cf5cf64306f746", "class_name": "RelatedNodeInfo"}}, "text": "Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. ", "start_char_idx": 591, "end_char_idx": 709, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c676c70a-da45-43e0-bd7b-5cdd29aaddac": {"__data__": {"id_": "c676c70a-da45-43e0-bd7b-5cdd29aaddac", "embedding": null, "metadata": {"window": "The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). ", "original_text": "Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2eee2bd9-d3c6-42b6-a5ba-161c3140627e", "node_type": "1", "metadata": {"window": "the lord of salvation). The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. ", "original_text": "Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "d02c83cd7bd3ba32e8b788615a46b394170784591fbdd5cb26bebb19b4a165a9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "323d4d8a-4832-4fba-a5f6-fbc36be4955f", "node_type": "1", "metadata": {"window": "This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "Everybody \nseek to get rid of this cycle and get nirvana. "}, "hash": "981a2141f5cbdefab682b0062b64f1e0da054f69eb7ef68ad0576e3857744f8e", "class_name": "RelatedNodeInfo"}}, "text": "Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. ", "start_char_idx": 709, "end_char_idx": 993, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "323d4d8a-4832-4fba-a5f6-fbc36be4955f": {"__data__": {"id_": "323d4d8a-4832-4fba-a5f6-fbc36be4955f", "embedding": null, "metadata": {"window": "This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "Everybody \nseek to get rid of this cycle and get nirvana. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c676c70a-da45-43e0-bd7b-5cdd29aaddac", "node_type": "1", "metadata": {"window": "The holy shrine, which is said to have risen on its own, is one of eight such \nshrines (the others include Srirangam, Sri Mushnam, Tirupati, Naimisaranyam, Thottadri, Pushkaram and Badrinath). \n This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). ", "original_text": "Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "996143074f7723abb71f2138cdecb5a7243effd6e0e8f950e72d0cbc6119781e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "627f64b5-cc0a-44f2-878d-1f6b1b555992", "node_type": "1", "metadata": {"window": "Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "A visit to Muktinath will help to achieve this goal. "}, "hash": "2a154b702bd4ee31204f0199b476dceee862eff78278677b5359ec4911eeaa59", "class_name": "RelatedNodeInfo"}}, "text": "Everybody \nseek to get rid of this cycle and get nirvana. ", "start_char_idx": 993, "end_char_idx": 1051, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "627f64b5-cc0a-44f2-878d-1f6b1b555992": {"__data__": {"id_": "627f64b5-cc0a-44f2-878d-1f6b1b555992", "embedding": null, "metadata": {"window": "Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "A visit to Muktinath will help to achieve this goal. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "323d4d8a-4832-4fba-a5f6-fbc36be4955f", "node_type": "1", "metadata": {"window": "This Pagoda Style Muktinath Temple is also one of 10 8 Vaishnava shrines. Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "Everybody \nseek to get rid of this cycle and get nirvana. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "0e758ef37a324a08a6c6a2f2ea11271b8d3f09f20e7a55cdf900edc6d3a62d84", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2c18f16c-acca-4b17-af67-b8012d776564", "node_type": "1", "metadata": {"window": "Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). "}, "hash": "faaa06e6818489aae56af31a028fe3bb4c9f1f0366f266b491800c523cab060d", "class_name": "RelatedNodeInfo"}}, "text": "A visit to Muktinath will help to achieve this goal. ", "start_char_idx": 1051, "end_char_idx": 1106, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2c18f16c-acca-4b17-af67-b8012d776564": {"__data__": {"id_": "2c18f16c-acca-4b17-af67-b8012d776564", "embedding": null, "metadata": {"window": "Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "627f64b5-cc0a-44f2-878d-1f6b1b555992", "node_type": "1", "metadata": {"window": "Here in the early 19th century the Hindus \nconsecrated a Vishnu temple and named is Muktinath - Lord of Liberation. Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "A visit to Muktinath will help to achieve this goal. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "7d8eb1db48c0263b43bbea6b7400ad96874bf174e266c567ca7cd292c496a0a7", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "4806f4d4-e0a6-42fe-bab5-a09a31869025", "node_type": "1", "metadata": {"window": "Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. "}, "hash": "024d696a44aa89949fc7896d1579052d2ca0516d26a7885c9a13836561f2d64a", "class_name": "RelatedNodeInfo"}}, "text": "There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). ", "start_char_idx": 1106, "end_char_idx": 1299, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "4806f4d4-e0a6-42fe-bab5-a09a31869025": {"__data__": {"id_": "4806f4d4-e0a6-42fe-bab5-a09a31869025", "embedding": null, "metadata": {"window": "Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d", "node_type": "4", "metadata": {"page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2c18f16c-acca-4b17-af67-b8012d776564", "node_type": "1", "metadata": {"window": "Against a backdrop of incredible \nstarkness you can sit and stare to the south the snow covered Annapurna range, or to th e north the Tibetan plateau \n \nImportances: \nAccording to Hindu Myth it is belief that this world is \"MAYA\" (an illusion) of life cycle of birth and rebirth. Everybody \nseek to get rid of this cycle and get nirvana. A visit to Muktinath will help to achieve this goal. There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "original_text": "There are 108 \nwaterspouts in the back yard of this temple called as Muktidhara where froozen water are continuously flowing \nfrom the bull head and two Kunda (ponds in front of the temple). ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "hash": "578932a44c38de1d5de0aea630d8ac8319f70938314b20fe882254edd8f4b5ff", "class_name": "RelatedNodeInfo"}}, "text": "Taking bath in these 108 waterspouts and two \nkunda belive that it brings them salvation. ", "start_char_idx": 1299, "end_char_idx": 1391, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "1dcaf295-e021-4a46-a0b2-b702b52a6625": {"__data__": {"id_": "1dcaf295-e021-4a46-a0b2-b702b52a6625", "embedding": null, "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. ", "original_text": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a", "node_type": "4", "metadata": {"page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6c2e21a2-b490-4b89-bb56-136d64d5176b", "node_type": "1", "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. ", "original_text": "This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n"}, "hash": "254f249b3c2c6c153b79007839e6fdc61e8de88b4112348aaee958e4cf1655ff", "class_name": "RelatedNodeInfo"}}, "text": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. ", "start_char_idx": 0, "end_char_idx": 189, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6c2e21a2-b490-4b89-bb56-136d64d5176b": {"__data__": {"id_": "6c2e21a2-b490-4b89-bb56-136d64d5176b", "embedding": null, "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. ", "original_text": "This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a", "node_type": "4", "metadata": {"page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "1dcaf295-e021-4a46-a0b2-b702b52a6625", "node_type": "1", "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. ", "original_text": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "08971e8286ca2c89dfdf94e96dcab00a0952064ae831280b46e77daaa5c61938", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "419073dd-6053-457f-883a-053dd428f9b1", "node_type": "1", "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. ", "original_text": "Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n"}, "hash": "e704f4d714234665df6a2a9e9b676d99ea3068dedeb03a9513367966aa9d32bc", "class_name": "RelatedNodeInfo"}}, "text": "This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n", "start_char_idx": 189, "end_char_idx": 275, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "419073dd-6053-457f-883a-053dd428f9b1": {"__data__": {"id_": "419073dd-6053-457f-883a-053dd428f9b1", "embedding": null, "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. ", "original_text": "Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a", "node_type": "4", "metadata": {"page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6c2e21a2-b490-4b89-bb56-136d64d5176b", "node_type": "1", "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. ", "original_text": "This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "cc1f5865c5ee736039a76889e75ff9a4219c68d9bc18f368f8a7f7e3cafcfbc4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f3d8f307-1cf9-473e-8720-8f1edb18be2d", "node_type": "1", "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. ", "original_text": "First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. "}, "hash": "9dda17dedbb4784e64f6b8c648451995b07dbba0d8b672fcec5e4757b7019584", "class_name": "RelatedNodeInfo"}}, "text": "Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n", "start_char_idx": 275, "end_char_idx": 546, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f3d8f307-1cf9-473e-8720-8f1edb18be2d": {"__data__": {"id_": "f3d8f307-1cf9-473e-8720-8f1edb18be2d", "embedding": null, "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. ", "original_text": "First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a", "node_type": "4", "metadata": {"page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "419073dd-6053-457f-883a-053dd428f9b1", "node_type": "1", "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. ", "original_text": "Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "dbe0188ad4a10fe88fd8eacccd21b0ad9ad0bee4f5d20f424e8d2054a0928f17", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6c34ca18-ab01-4b0b-bef7-c148cf014e89", "node_type": "1", "metadata": {"window": "This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. ", "original_text": "Road are blacktop and \ncomfortable for the journey. "}, "hash": "d18aa872b71c76367534f8a9c0ef126addf0df255fff2d1bcb52621d85f29b95", "class_name": "RelatedNodeInfo"}}, "text": "First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. ", "start_char_idx": 546, "end_char_idx": 753, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6c34ca18-ab01-4b0b-bef7-c148cf014e89": {"__data__": {"id_": "6c34ca18-ab01-4b0b-bef7-c148cf014e89", "embedding": null, "metadata": {"window": "This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. ", "original_text": "Road are blacktop and \ncomfortable for the journey. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a", "node_type": "4", "metadata": {"page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f3d8f307-1cf9-473e-8720-8f1edb18be2d", "node_type": "1", "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. ", "original_text": "First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "27dee72b94c18ccda025c57038b293569cb0f2e534f9097158cbc2a5ed107dfc", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b7aa2bd3-f6ff-4969-a34b-b9b2e6a66431", "node_type": "1", "metadata": {"window": "Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. "}, "hash": "ecd95e7a75cbb998f07f17fffc1ab34167bd9594d4324310869e2aa7ad293ef7", "class_name": "RelatedNodeInfo"}}, "text": "Road are blacktop and \ncomfortable for the journey. ", "start_char_idx": 753, "end_char_idx": 805, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b7aa2bd3-f6ff-4969-a34b-b9b2e6a66431": {"__data__": {"id_": "b7aa2bd3-f6ff-4969-a34b-b9b2e6a66431", "embedding": null, "metadata": {"window": "Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a", "node_type": "4", "metadata": {"page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6c34ca18-ab01-4b0b-bef7-c148cf014e89", "node_type": "1", "metadata": {"window": "This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. ", "original_text": "Road are blacktop and \ncomfortable for the journey. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "9da867d47798ef725a7821d78606a518dac4264a25d8501e00d12905906c1a10", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "163dc7ca-a294-44fb-9218-c6ed5185d210", "node_type": "1", "metadata": {"window": "First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "You can \neasily find different catogories hotel from standard to five star level as per your choice. "}, "hash": "32bece7669e8e2611f2a65384b8b7ccd9b09fac3c6fc0b8db63bcf6651f14fe8", "class_name": "RelatedNodeInfo"}}, "text": "Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. ", "start_char_idx": 805, "end_char_idx": 881, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "163dc7ca-a294-44fb-9218-c6ed5185d210": {"__data__": {"id_": "163dc7ca-a294-44fb-9218-c6ed5185d210", "embedding": null, "metadata": {"window": "First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "You can \neasily find different catogories hotel from standard to five star level as per your choice. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a", "node_type": "4", "metadata": {"page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b7aa2bd3-f6ff-4969-a34b-b9b2e6a66431", "node_type": "1", "metadata": {"window": "Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "b8e33cb242afc0bf324dbe4bbe2ffbbd779f9a2cb2556c61fee45123b6bcb840", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ce3ebbf7-81a2-47f4-ae0d-f5862aa6836e", "node_type": "1", "metadata": {"window": "Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. "}, "hash": "ab55eeecc0341d1338c3687a0343a87723649fa41d34d51db4e0625c4fc59f49", "class_name": "RelatedNodeInfo"}}, "text": "You can \neasily find different catogories hotel from standard to five star level as per your choice. ", "start_char_idx": 881, "end_char_idx": 984, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ce3ebbf7-81a2-47f4-ae0d-f5862aa6836e": {"__data__": {"id_": "ce3ebbf7-81a2-47f4-ae0d-f5862aa6836e", "embedding": null, "metadata": {"window": "Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a", "node_type": "4", "metadata": {"page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "163dc7ca-a294-44fb-9218-c6ed5185d210", "node_type": "1", "metadata": {"window": "First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "You can \neasily find different catogories hotel from standard to five star level as per your choice. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "57d6cbe58cd78370025349ac5e1fa7c023e9600f1c83c6869e66312b18df58db", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2b2ffcc6-21f2-472a-938b-b1df7e9515a0", "node_type": "1", "metadata": {"window": "Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. "}, "hash": "ea2ca5d5bff613d0361ca7cf3c92f2f193b8df56d1375d6ec70d8e659c233cbb", "class_name": "RelatedNodeInfo"}}, "text": "Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. ", "start_char_idx": 984, "end_char_idx": 1154, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2b2ffcc6-21f2-472a-938b-b1df7e9515a0": {"__data__": {"id_": "2b2ffcc6-21f2-472a-938b-b1df7e9515a0", "embedding": null, "metadata": {"window": "Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a", "node_type": "4", "metadata": {"page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ce3ebbf7-81a2-47f4-ae0d-f5862aa6836e", "node_type": "1", "metadata": {"window": "Road are blacktop and \ncomfortable for the journey. Whereas, Pokhara is easily accessible by 25 minutes flight from Kathmandu. You can \neasily find different catogories hotel from standard to five star level as per your choice. Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "original_text": "Most of the popular hotels, \nshopping center and restaurant are located near Lakeside and they do accept the major Credit Card, Visa Card, \nMaster Card, AMX, and more. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "hash": "e9118e8a7c940fac9b4e1f4a0e3556ee52076c8e6b397cd0cdd21cecd00d7b35", "class_name": "RelatedNodeInfo"}}, "text": "You can e njoy varities of foods with live music and cutural dance shows in diffrent \nrestaurant here. ", "start_char_idx": 1154, "end_char_idx": 1259, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "028f2cbc-d5a3-4c41-9cd7-ac718eca0b12": {"__data__": {"id_": "028f2cbc-d5a3-4c41-9cd7-ac718eca0b12", "embedding": null, "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. ", "original_text": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7d9ec202-c582-4890-b9d4-401a2ad0db07", "node_type": "1", "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. ", "original_text": "Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. "}, "hash": "c80ac546f60e2bac383441fafe028ad6efa51c00bae63c1492b082dc59b40b68", "class_name": "RelatedNodeInfo"}}, "text": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. ", "start_char_idx": 0, "end_char_idx": 164, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7d9ec202-c582-4890-b9d4-401a2ad0db07": {"__data__": {"id_": "7d9ec202-c582-4890-b9d4-401a2ad0db07", "embedding": null, "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. ", "original_text": "Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "028f2cbc-d5a3-4c41-9cd7-ac718eca0b12", "node_type": "1", "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. ", "original_text": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "3e3c38153796a12fa0a95f3b807a3b89cd7b2d069596db01d0e3ee4996217ed2", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "30b0ca3e-2620-4fe1-b097-72c110d705d1", "node_type": "1", "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. ", "original_text": "It might take 8/9 hours to reach at Jomsom. "}, "hash": "4399ea8af3bab837d0ce0fb50e56086eeed5f1f92b628e0e6affddf3ea33843e", "class_name": "RelatedNodeInfo"}}, "text": "Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. ", "start_char_idx": 164, "end_char_idx": 282, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "30b0ca3e-2620-4fe1-b097-72c110d705d1": {"__data__": {"id_": "30b0ca3e-2620-4fe1-b097-72c110d705d1", "embedding": null, "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. ", "original_text": "It might take 8/9 hours to reach at Jomsom. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7d9ec202-c582-4890-b9d4-401a2ad0db07", "node_type": "1", "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. ", "original_text": "Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "8d2444ffc2b7d5052ab66978a253658c15483471be30c952865cd8ef647d2083", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0a2374ea-14df-444e-b8fc-a813df7bfa17", "node_type": "1", "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n", "original_text": "Please do not expect for \nthe star hotel here. "}, "hash": "d9227b99094ba1ba13e00f50f1d12b2439134d129f34e954cfe9e436ed2e5d34", "class_name": "RelatedNodeInfo"}}, "text": "It might take 8/9 hours to reach at Jomsom. ", "start_char_idx": 282, "end_char_idx": 326, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0a2374ea-14df-444e-b8fc-a813df7bfa17": {"__data__": {"id_": "0a2374ea-14df-444e-b8fc-a813df7bfa17", "embedding": null, "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n", "original_text": "Please do not expect for \nthe star hotel here. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "30b0ca3e-2620-4fe1-b097-72c110d705d1", "node_type": "1", "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. ", "original_text": "It might take 8/9 hours to reach at Jomsom. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "091b791d1a78b55c5bf850ea58f54be697ccc88ac7827810d4e3cb1b10184bc0", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "70372725-dd90-49e5-ac9c-37f51dff536c", "node_type": "1", "metadata": {"window": "Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. ", "original_text": "Jomsom is also connected via air way from Pokhara. "}, "hash": "987e4544590f10aa75194317af8bbd29ee613d72cd33804d67d5b0deff2bf3e2", "class_name": "RelatedNodeInfo"}}, "text": "Please do not expect for \nthe star hotel here. ", "start_char_idx": 326, "end_char_idx": 374, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "70372725-dd90-49e5-ac9c-37f51dff536c": {"__data__": {"id_": "70372725-dd90-49e5-ac9c-37f51dff536c", "embedding": null, "metadata": {"window": "Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. ", "original_text": "Jomsom is also connected via air way from Pokhara. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0a2374ea-14df-444e-b8fc-a813df7bfa17", "node_type": "1", "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n", "original_text": "Please do not expect for \nthe star hotel here. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "ce014399d2295a62538abcedfea5d49202aa8024a59b73ff31319cf0ef700ed5", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c03e3b07-6ad9-43e6-8e1f-341a64b1b1a9", "node_type": "1", "metadata": {"window": "It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n", "original_text": "15 minute s flight from Pokhara will take you \nto the Jomsom. "}, "hash": "55d26d787b24a0de1ad4ffb63cba244cbaf30fcd55912bdde74e31cc052699c8", "class_name": "RelatedNodeInfo"}}, "text": "Jomsom is also connected via air way from Pokhara. ", "start_char_idx": 374, "end_char_idx": 425, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c03e3b07-6ad9-43e6-8e1f-341a64b1b1a9": {"__data__": {"id_": "c03e3b07-6ad9-43e6-8e1f-341a64b1b1a9", "embedding": null, "metadata": {"window": "It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n", "original_text": "15 minute s flight from Pokhara will take you \nto the Jomsom. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "70372725-dd90-49e5-ac9c-37f51dff536c", "node_type": "1", "metadata": {"window": "Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. ", "original_text": "Jomsom is also connected via air way from Pokhara. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "2c24f0f3c729b1fe69b23b2ecb720f80c63c127dc518b2cc0375ba6869c0f712", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "907087b0-4704-4abb-bf94-b06d63fc3627", "node_type": "1", "metadata": {"window": "Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. ", "original_text": "And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n"}, "hash": "f6f068270d3dfc0bfa82fbe9bf2aa95c217b5f58a2cdac83c998b96be05ac688", "class_name": "RelatedNodeInfo"}}, "text": "15 minute s flight from Pokhara will take you \nto the Jomsom. ", "start_char_idx": 425, "end_char_idx": 488, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "907087b0-4704-4abb-bf94-b06d63fc3627": {"__data__": {"id_": "907087b0-4704-4abb-bf94-b06d63fc3627", "embedding": null, "metadata": {"window": "Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. ", "original_text": "And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "c03e3b07-6ad9-43e6-8e1f-341a64b1b1a9", "node_type": "1", "metadata": {"window": "It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n", "original_text": "15 minute s flight from Pokhara will take you \nto the Jomsom. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "cf762f965b766980c5d48cbbb7e7f7a8ea5b58f423d04e2c9d4e6523e746d7e6", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "17304c45-6861-4e54-9145-85d48955a89a", "node_type": "1", "metadata": {"window": "Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. ", "original_text": "On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. "}, "hash": "2e2bb2aa78b0162919fefb794430db07117b67dbe4b465c9b0b3486458a8dac2", "class_name": "RelatedNodeInfo"}}, "text": "And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n", "start_char_idx": 488, "end_char_idx": 577, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "17304c45-6861-4e54-9145-85d48955a89a": {"__data__": {"id_": "17304c45-6861-4e54-9145-85d48955a89a", "embedding": null, "metadata": {"window": "Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. ", "original_text": "On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "907087b0-4704-4abb-bf94-b06d63fc3627", "node_type": "1", "metadata": {"window": "Please do not expect for \nthe star hotel here. Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. ", "original_text": "And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "0e4043e6968130ffab7a959adacdc0546005aa637b350284e51a46190edcedbd", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6b970b7f-58be-4c41-be0a-d7d9b07203f0", "node_type": "1", "metadata": {"window": "15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. ", "original_text": "Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n"}, "hash": "531daef9bb4196b3f6796a59af9e1661ef1006e09172d02c5d01782d15a44405", "class_name": "RelatedNodeInfo"}}, "text": "On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. ", "start_char_idx": 577, "end_char_idx": 780, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6b970b7f-58be-4c41-be0a-d7d9b07203f0": {"__data__": {"id_": "6b970b7f-58be-4c41-be0a-d7d9b07203f0", "embedding": null, "metadata": {"window": "15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. ", "original_text": "Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "17304c45-6861-4e54-9145-85d48955a89a", "node_type": "1", "metadata": {"window": "Jomsom is also connected via air way from Pokhara. 15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. ", "original_text": "On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "0abf361bed70d5f2ba4ad4ea885a1da836a696140baf70406d8efbbc74c057e3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "d69726f7-c633-4f58-9ce2-20dabee28f66", "node_type": "1", "metadata": {"window": "And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. ", "original_text": "Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. "}, "hash": "06fe3046c8d03861ae9e437342eb1790e6df5e625cdb117982b824c79846d5fb", "class_name": "RelatedNodeInfo"}}, "text": "Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n", "start_char_idx": 780, "end_char_idx": 870, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "d69726f7-c633-4f58-9ce2-20dabee28f66": {"__data__": {"id_": "d69726f7-c633-4f58-9ce2-20dabee28f66", "embedding": null, "metadata": {"window": "And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. ", "original_text": "Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6b970b7f-58be-4c41-be0a-d7d9b07203f0", "node_type": "1", "metadata": {"window": "15 minute s flight from Pokhara will take you \nto the Jomsom. And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. ", "original_text": "Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "b003464e8657744d07be36312c652d0324869c50062afe7a5292af012a3fd255", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2fd2ca3c-d471-42c6-ba5e-259b29a4768b", "node_type": "1", "metadata": {"window": "On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. ", "original_text": "There is no direct flight from Kathmandu. "}, "hash": "6f61966a63821ea916b55c4bb7cfd598aab19a2e221ee113b4109dde9b3c57f6", "class_name": "RelatedNodeInfo"}}, "text": "Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. ", "start_char_idx": 870, "end_char_idx": 1002, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2fd2ca3c-d471-42c6-ba5e-259b29a4768b": {"__data__": {"id_": "2fd2ca3c-d471-42c6-ba5e-259b29a4768b", "embedding": null, "metadata": {"window": "On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. ", "original_text": "There is no direct flight from Kathmandu. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "d69726f7-c633-4f58-9ce2-20dabee28f66", "node_type": "1", "metadata": {"window": "And on the same day you can visit Muktinath Temple and return back to Jomsom as well. \n On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. ", "original_text": "Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "c64bc3abc11463707f6283132d4cc46f896df7bb802d79669510f9184387dca8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9389dd14-1645-4a0c-b5b3-61df42c6bf08", "node_type": "1", "metadata": {"window": "Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. ", "original_text": "First, take flight \nto Pokhara, then to Jomsom. "}, "hash": "82599fc2c61cddea389c5833eea9b9a3d32de258e0a9742fe8471d55505de2c4", "class_name": "RelatedNodeInfo"}}, "text": "There is no direct flight from Kathmandu. ", "start_char_idx": 1002, "end_char_idx": 1045, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9389dd14-1645-4a0c-b5b3-61df42c6bf08": {"__data__": {"id_": "9389dd14-1645-4a0c-b5b3-61df42c6bf08", "embedding": null, "metadata": {"window": "Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. ", "original_text": "First, take flight \nto Pokhara, then to Jomsom. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2fd2ca3c-d471-42c6-ba5e-259b29a4768b", "node_type": "1", "metadata": {"window": "On the very next day morning, walk for 25 minutes to catch a Jeep then 1:30 hour drive to Ranipauwa - Jeep Station \nat M uktinath Temple (3710m) and again hike for 25 minutes till the temple entrance. Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. ", "original_text": "There is no direct flight from Kathmandu. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "d8e28f03b8daebd423614014fa7e1fa07fe5faa9b11a53b4f086909afe899469", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "f350b3ab-7bc7-440a-9d8e-81046830991c", "node_type": "1", "metadata": {"window": "Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. "}, "hash": "80b6e1d609510f37890d8fbe4692141a59def38ee399f358d39d2ac39370d2f8", "class_name": "RelatedNodeInfo"}}, "text": "First, take flight \nto Pokhara, then to Jomsom. ", "start_char_idx": 1045, "end_char_idx": 1093, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "f350b3ab-7bc7-440a-9d8e-81046830991c": {"__data__": {"id_": "f350b3ab-7bc7-440a-9d8e-81046830991c", "embedding": null, "metadata": {"window": "Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9389dd14-1645-4a0c-b5b3-61df42c6bf08", "node_type": "1", "metadata": {"window": "Have darshan/pooja at temple \nand either return directly to Pokhara or halt at Beni. \n \n Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. ", "original_text": "First, take flight \nto Pokhara, then to Jomsom. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "7403a1c604c475c28bccf27cf5e193efee4d1b91f6b30ca61dcf84ff02c97f5c", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "be0bce66-2562-4787-9f85-5fd437201f25", "node_type": "1", "metadata": {"window": "There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "Sometimes flight might get canceled due to bad weather. "}, "hash": "0fee0a2248c97aebfdd8154c1c8212bedca6b16ccea6c5e3348811c69efb80d5", "class_name": "RelatedNodeInfo"}}, "text": "Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. ", "start_char_idx": 1093, "end_char_idx": 1201, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "be0bce66-2562-4787-9f85-5fd437201f25": {"__data__": {"id_": "be0bce66-2562-4787-9f85-5fd437201f25", "embedding": null, "metadata": {"window": "There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "Sometimes flight might get canceled due to bad weather. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "f350b3ab-7bc7-440a-9d8e-81046830991c", "node_type": "1", "metadata": {"window": "Option 02: By Flight - 1 night (Kathmandu - Pokhara - Jomsom - Muktinath) \nJomsom is the nearer airport to reach Muktinath Temple. There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "e4db01873a27005c41a35cb3ae354fe4ef8ab054ab12170db3ddbda91d28af4a", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "0ed5e479-952d-4459-8e88-ecb54e9a8345", "node_type": "1", "metadata": {"window": "First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. "}, "hash": "51ed22d743d34ce12e92c7403321417aac1799d5a63ed0156e7f8668cc38e4dc", "class_name": "RelatedNodeInfo"}}, "text": "Sometimes flight might get canceled due to bad weather. ", "start_char_idx": 1201, "end_char_idx": 1258, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0ed5e479-952d-4459-8e88-ecb54e9a8345": {"__data__": {"id_": "0ed5e479-952d-4459-8e88-ecb54e9a8345", "embedding": null, "metadata": {"window": "First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "be0bce66-2562-4787-9f85-5fd437201f25", "node_type": "1", "metadata": {"window": "There is no direct flight from Kathmandu. First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "Sometimes flight might get canceled due to bad weather. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a7dc25dd9d1e54a2e780d793b97978f014e7423b3eeb887959bc9fe065f2c2cb", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "14f74901-ad84-493d-98ef-f6e18569dc84", "node_type": "1", "metadata": {"window": "Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "18 seats Twin Otter plane carries passengers in this route. \n "}, "hash": "3ba0837edef039b799be1f11c5ebecea79a71254691cc39461a54782328aa05b", "class_name": "RelatedNodeInfo"}}, "text": "So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. ", "start_char_idx": 1258, "end_char_idx": 1343, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "14f74901-ad84-493d-98ef-f6e18569dc84": {"__data__": {"id_": "14f74901-ad84-493d-98ef-f6e18569dc84", "embedding": null, "metadata": {"window": "Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "18 seats Twin Otter plane carries passengers in this route. \n ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e", "node_type": "4", "metadata": {"page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0ed5e479-952d-4459-8e88-ecb54e9a8345", "node_type": "1", "metadata": {"window": "First, take flight \nto Pokhara, then to Jomsom. Since, Jomsom is the windy place; flights are operated in the early morning onl y if the \nweather permits. Sometimes flight might get canceled due to bad weather. So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. 18 seats Twin Otter plane carries passengers in this route. \n ", "original_text": "So, one night stay at Pokhara is must and \ntakes next day morning flight to Jomsom. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "hash": "e763b45ae6bdb7668ed004a0f90ffade53be9f902a4a11dcb0325b566d3566ff", "class_name": "RelatedNodeInfo"}}, "text": "18 seats Twin Otter plane carries passengers in this route. \n ", "start_char_idx": 1343, "end_char_idx": 1406, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "0881a8f4-0cc8-4880-882e-5c5b4acdaaf8": {"__data__": {"id_": "0881a8f4-0cc8-4880-882e-5c5b4acdaaf8", "embedding": null, "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. ", "original_text": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "de36e662-d776-4bd7-8dc0-835d4c72d550", "node_type": "1", "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n", "original_text": "Muktinath Temple is in just one and half hour flying \ndistance by helicopter. "}, "hash": "dc47e658f91bc1f494a310488fb794b7addfa31b0ba7f7a544e6a57266613f34", "class_name": "RelatedNodeInfo"}}, "text": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. ", "start_char_idx": 0, "end_char_idx": 128, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "de36e662-d776-4bd7-8dc0-835d4c72d550": {"__data__": {"id_": "de36e662-d776-4bd7-8dc0-835d4c72d550", "embedding": null, "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n", "original_text": "Muktinath Temple is in just one and half hour flying \ndistance by helicopter. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "0881a8f4-0cc8-4880-882e-5c5b4acdaaf8", "node_type": "1", "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. ", "original_text": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "18bb02afde196144b894e5fe3006cbacaf488bbc4126cd8fc536922ee9a7eac3", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "30250a1b-e5eb-43e8-ba8c-12d181b2de8b", "node_type": "1", "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. ", "original_text": "The helipad is located at Ranipauwa. "}, "hash": "6da58b6fd0ea4a3641b45cc6b20d56275bb4bd0f4f3ccefe7ec6c44f69ba9a13", "class_name": "RelatedNodeInfo"}}, "text": "Muktinath Temple is in just one and half hour flying \ndistance by helicopter. ", "start_char_idx": 128, "end_char_idx": 207, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "30250a1b-e5eb-43e8-ba8c-12d181b2de8b": {"__data__": {"id_": "30250a1b-e5eb-43e8-ba8c-12d181b2de8b", "embedding": null, "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. ", "original_text": "The helipad is located at Ranipauwa. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "de36e662-d776-4bd7-8dc0-835d4c72d550", "node_type": "1", "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n", "original_text": "Muktinath Temple is in just one and half hour flying \ndistance by helicopter. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "8879531b46d5a3c25262c4d7400b7205d3ccc752eddb44a657c5f68a711f3cc1", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "7c1e72df-7ff1-4e73-987a-8c8706c5066a", "node_type": "1", "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. ", "original_text": "From here the temple can be reached via 30 minutes \nwalking. "}, "hash": "d144d0a4801d5e26e17ad9f0b576dbd56ea6bc2754bf7026f2e1bb09f7a24a34", "class_name": "RelatedNodeInfo"}}, "text": "The helipad is located at Ranipauwa. ", "start_char_idx": 207, "end_char_idx": 244, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7c1e72df-7ff1-4e73-987a-8c8706c5066a": {"__data__": {"id_": "7c1e72df-7ff1-4e73-987a-8c8706c5066a", "embedding": null, "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. ", "original_text": "From here the temple can be reached via 30 minutes \nwalking. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "30250a1b-e5eb-43e8-ba8c-12d181b2de8b", "node_type": "1", "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. ", "original_text": "The helipad is located at Ranipauwa. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "a6f5cdc9ff078b32e590699faa877f298b966bf70bdbadab78198c58b8a11e23", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "3eb503e4-29e8-4cde-bfcd-3bfbf280aafc", "node_type": "1", "metadata": {"window": "Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n", "original_text": "Perform pooja/darshan at the temple and fly back to Kathmandu. \n"}, "hash": "1a627b7f8eb28099623fa333574cd92887598848fc1ca696b75f7352883d9061", "class_name": "RelatedNodeInfo"}}, "text": "From here the temple can be reached via 30 minutes \nwalking. ", "start_char_idx": 244, "end_char_idx": 306, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "3eb503e4-29e8-4cde-bfcd-3bfbf280aafc": {"__data__": {"id_": "3eb503e4-29e8-4cde-bfcd-3bfbf280aafc", "embedding": null, "metadata": {"window": "Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n", "original_text": "Perform pooja/darshan at the temple and fly back to Kathmandu. \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "7c1e72df-7ff1-4e73-987a-8c8706c5066a", "node_type": "1", "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. ", "original_text": "From here the temple can be reached via 30 minutes \nwalking. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "442f468a2adf4ae8131caffcb2ed2f179d6fae84c957ce723258ac2b16710635", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "36121d44-18fc-4594-a21a-90e168f5082f", "node_type": "1", "metadata": {"window": "The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n", "original_text": "Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. "}, "hash": "6db6a148b24881410e36b2cd22d495aaed86301fc15d401c9f89e666094ffaae", "class_name": "RelatedNodeInfo"}}, "text": "Perform pooja/darshan at the temple and fly back to Kathmandu. \n", "start_char_idx": 306, "end_char_idx": 372, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "36121d44-18fc-4594-a21a-90e168f5082f": {"__data__": {"id_": "36121d44-18fc-4594-a21a-90e168f5082f", "embedding": null, "metadata": {"window": "The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n", "original_text": "Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "3eb503e4-29e8-4cde-bfcd-3bfbf280aafc", "node_type": "1", "metadata": {"window": "Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n", "original_text": "Perform pooja/darshan at the temple and fly back to Kathmandu. \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "659fa7abc74ab26465769fd3b2468ac72f923559b7370e4b6d83206727689842", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "89120f0b-a7fc-4534-819b-3028f03632d4", "node_type": "1", "metadata": {"window": "From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. ", "original_text": "Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. "}, "hash": "ca783b449e888396588c12bdbd55b120384f974e1a55ba107c10cecf00bb9537", "class_name": "RelatedNodeInfo"}}, "text": "Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. ", "start_char_idx": 372, "end_char_idx": 463, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "89120f0b-a7fc-4534-819b-3028f03632d4": {"__data__": {"id_": "89120f0b-a7fc-4534-819b-3028f03632d4", "embedding": null, "metadata": {"window": "From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. ", "original_text": "Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "36121d44-18fc-4594-a21a-90e168f5082f", "node_type": "1", "metadata": {"window": "The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n", "original_text": "Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "3fdd2efd79ec275240da72570d4a3ed6ffc62e62a54341c5865c18fe3baa1075", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9acb9a18-b522-4923-a80f-b5e39002b6ef", "node_type": "1", "metadata": {"window": "Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. ", "original_text": "The average walking duration are 7 to 8 hours per day. \n"}, "hash": "38b6242a5f36e9901c6cfe3d5ef08b9d976bbf9b91165356fb1d324ff7d129d4", "class_name": "RelatedNodeInfo"}}, "text": "Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. ", "start_char_idx": 463, "end_char_idx": 641, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9acb9a18-b522-4923-a80f-b5e39002b6ef": {"__data__": {"id_": "9acb9a18-b522-4923-a80f-b5e39002b6ef", "embedding": null, "metadata": {"window": "Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. ", "original_text": "The average walking duration are 7 to 8 hours per day. \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "89120f0b-a7fc-4534-819b-3028f03632d4", "node_type": "1", "metadata": {"window": "From here the temple can be reached via 30 minutes \nwalking. Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. ", "original_text": "Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "34f36d1f46c6dca05f0ce515c78a2a72a40264cac7023dc6dc04ac59cb88692b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "6801aac7-95ab-4b23-ae71-5ba8e456b7a2", "node_type": "1", "metadata": {"window": "Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). ", "original_text": "What permits are required to visit this temple? \n"}, "hash": "2ffce0fbbf5613427a23841ea27e0996751d6295dc1a49ad1199efb93f32dfee", "class_name": "RelatedNodeInfo"}}, "text": "The average walking duration are 7 to 8 hours per day. \n", "start_char_idx": 641, "end_char_idx": 699, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "6801aac7-95ab-4b23-ae71-5ba8e456b7a2": {"__data__": {"id_": "6801aac7-95ab-4b23-ae71-5ba8e456b7a2", "embedding": null, "metadata": {"window": "Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). ", "original_text": "What permits are required to visit this temple? \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9acb9a18-b522-4923-a80f-b5e39002b6ef", "node_type": "1", "metadata": {"window": "Perform pooja/darshan at the temple and fly back to Kathmandu. \n Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. ", "original_text": "The average walking duration are 7 to 8 hours per day. \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "5071fb6fc29870ef113960de6b89c7a6bde7b23d4d2dc2a2eb39aa02cad265e4", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "b5ebb767-9e90-4877-b891-cfa65ae8ac8d", "node_type": "1", "metadata": {"window": "Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n", "original_text": "Muktinath Te mple lies in conservation and trekking zone. "}, "hash": "6a72467f1563bd80d9a815a7cd4d64060d28dbe6383ba14beefef805193a82b0", "class_name": "RelatedNodeInfo"}}, "text": "What permits are required to visit this temple? \n", "start_char_idx": 699, "end_char_idx": 749, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "b5ebb767-9e90-4877-b891-cfa65ae8ac8d": {"__data__": {"id_": "b5ebb767-9e90-4877-b891-cfa65ae8ac8d", "embedding": null, "metadata": {"window": "Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n", "original_text": "Muktinath Te mple lies in conservation and trekking zone. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "6801aac7-95ab-4b23-ae71-5ba8e456b7a2", "node_type": "1", "metadata": {"window": "Option 04: By Trek - 7 nights \nMuktinath Temple can also be visited via adventurous trek. Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). ", "original_text": "What permits are required to visit this temple? \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "6ed750fe13985947ecd987fb76903957f37ac8544c40dfda0d45a669f712d763", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ee27b20c-0d1c-4eed-8b0a-ec42beb60e28", "node_type": "1", "metadata": {"window": "The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n", "original_text": "So, two permits are required to enter in this area. "}, "hash": "1c8ae5dff13e7b61bfe293f3cd03f29aae73f4e6d9871b3426a832ee17a402ff", "class_name": "RelatedNodeInfo"}}, "text": "Muktinath Te mple lies in conservation and trekking zone. ", "start_char_idx": 749, "end_char_idx": 807, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ee27b20c-0d1c-4eed-8b0a-ec42beb60e28": {"__data__": {"id_": "ee27b20c-0d1c-4eed-8b0a-ec42beb60e28", "embedding": null, "metadata": {"window": "The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n", "original_text": "So, two permits are required to enter in this area. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "b5ebb767-9e90-4877-b891-cfa65ae8ac8d", "node_type": "1", "metadata": {"window": "Fist get yourself at Pokhara and trek starts from Nayapul \n(1 hr drive) following overnight stay at Tikhedunga, Ghorepani, Tatopani, Ghasa, Marpha, Kagbeni then to \nMuktinath. The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n", "original_text": "Muktinath Te mple lies in conservation and trekking zone. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "e99e10ff030674dd44f22f5fe61175e55dd4622c420c4079f11427b5403cf837", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "ec814f94-6d0a-4f4b-b5ca-b781d48d0fa3", "node_type": "1", "metadata": {"window": "What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. ", "original_text": "One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). "}, "hash": "d9c4af45fd60e323d97d02dc6d3e326976fe9281c207466b4a02f13aaf7da0ea", "class_name": "RelatedNodeInfo"}}, "text": "So, two permits are required to enter in this area. ", "start_char_idx": 807, "end_char_idx": 860, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "ec814f94-6d0a-4f4b-b5ca-b781d48d0fa3": {"__data__": {"id_": "ec814f94-6d0a-4f4b-b5ca-b781d48d0fa3", "embedding": null, "metadata": {"window": "What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. ", "original_text": "One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ee27b20c-0d1c-4eed-8b0a-ec42beb60e28", "node_type": "1", "metadata": {"window": "The average walking duration are 7 to 8 hours per day. \n What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n", "original_text": "So, two permits are required to enter in this area. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "378b5f12f6b8d61890d7f0e5ca36197b1545e098c103ffa7590965c65b37d48e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a733a156-c4e7-4dbd-b8f7-f1daa37b4fb9", "node_type": "1", "metadata": {"window": "Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "It is restricted to enter in thi s zone without collecting these two permits. \n"}, "hash": "5d9833b9e06d9d2409ebca30592cf42f3a5277ad564e1c0e7f9e73b27f75335d", "class_name": "RelatedNodeInfo"}}, "text": "One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). ", "start_char_idx": 860, "end_char_idx": 990, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a733a156-c4e7-4dbd-b8f7-f1daa37b4fb9": {"__data__": {"id_": "a733a156-c4e7-4dbd-b8f7-f1daa37b4fb9", "embedding": null, "metadata": {"window": "Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "It is restricted to enter in thi s zone without collecting these two permits. \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "ec814f94-6d0a-4f4b-b5ca-b781d48d0fa3", "node_type": "1", "metadata": {"window": "What permits are required to visit this temple? \n Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. ", "original_text": "One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "9f511815868dbfdcbfb8e963ae16169fe4903396695a255e6476d9fdf296fd2b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9411a935-9ae7-4828-8dde-6bd65f725c38", "node_type": "1", "metadata": {"window": "So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "What are the best months to visit? \n"}, "hash": "90a3f9ac9a1a220338f8d1a23e0bcf0eb51f218cad0895c9d216a06b08a9b04f", "class_name": "RelatedNodeInfo"}}, "text": "It is restricted to enter in thi s zone without collecting these two permits. \n", "start_char_idx": 990, "end_char_idx": 1071, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9411a935-9ae7-4828-8dde-6bd65f725c38": {"__data__": {"id_": "9411a935-9ae7-4828-8dde-6bd65f725c38", "embedding": null, "metadata": {"window": "So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "What are the best months to visit? \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "a733a156-c4e7-4dbd-b8f7-f1daa37b4fb9", "node_type": "1", "metadata": {"window": "Muktinath Te mple lies in conservation and trekking zone. So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "It is restricted to enter in thi s zone without collecting these two permits. \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "870dd6bb80f1432888226877ad1689c7529d41bc59cce4995fce2ad94dff91d8", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "2da03df3-b5e4-461e-bb72-d20938ceed7c", "node_type": "1", "metadata": {"window": "One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "March, April, May, June, September, October and November are the best time to visit Muktinath. "}, "hash": "629c8c92bde47716d1a14ed1f7d42b9ed48e0a8d3807cfa603d179a91c4d1ed6", "class_name": "RelatedNodeInfo"}}, "text": "What are the best months to visit? \n", "start_char_idx": 1071, "end_char_idx": 1108, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "2da03df3-b5e4-461e-bb72-d20938ceed7c": {"__data__": {"id_": "2da03df3-b5e4-461e-bb72-d20938ceed7c", "embedding": null, "metadata": {"window": "One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "March, April, May, June, September, October and November are the best time to visit Muktinath. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9411a935-9ae7-4828-8dde-6bd65f725c38", "node_type": "1", "metadata": {"window": "So, two permits are required to enter in this area. One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "What are the best months to visit? \n", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "04acb7df4311c8fbfa241510dd155ac2ed9487f5b00d5a6742d542b89f35a82e", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "de777270-1445-4579-a17a-882d7f4653f2", "node_type": "1", "metadata": {"window": "It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. "}, "hash": "f5c9239686a9237ce54ddb6ef325a47897a1dd28655022b1182bfb82fa6eab18", "class_name": "RelatedNodeInfo"}}, "text": "March, April, May, June, September, October and November are the best time to visit Muktinath. ", "start_char_idx": 1108, "end_char_idx": 1204, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "de777270-1445-4579-a17a-882d7f4653f2": {"__data__": {"id_": "de777270-1445-4579-a17a-882d7f4653f2", "embedding": null, "metadata": {"window": "It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4", "node_type": "4", "metadata": {"page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "2da03df3-b5e4-461e-bb72-d20938ceed7c", "node_type": "1", "metadata": {"window": "One is \nAnnapurna Conservation Area Project Permit (ACAP) and another is Trekker's Information Management System \nPermit (TIMS). It is restricted to enter in thi s zone without collecting these two permits. \n What are the best months to visit? \n March, April, May, June, September, October and November are the best time to visit Muktinath. During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "original_text": "March, April, May, June, September, October and November are the best time to visit Muktinath. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "hash": "c59e40550900e2fc22f4ff52e6a9447237fb1d27f226e73d1425e2e6a19f804e", "class_name": "RelatedNodeInfo"}}, "text": "During these \nmonths weather will be clear and snowcapped mountains can be observe d closely. ", "start_char_idx": 1204, "end_char_idx": 1300, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}}, "docstore/metadata": {"6a631852-fb8e-4ca6-8cb0-1e3b7b881be0": {"doc_hash": "c9db004cc9ab78eb07e58a74000f7fc3d2cdca27ba34f95587e90df97d50a2dd", "ref_doc_id": "29dc06d4-2164-4129-868f-4a613daa06dc"}, "5494819d-a99c-4902-ac0a-ae3353796805": {"doc_hash": "0c1e588529d3bae0d528fd061a5a9dc3f9b2dddc7fd883399702036230e84383", "ref_doc_id": "29dc06d4-2164-4129-868f-4a613daa06dc"}, "29dc06d4-2164-4129-868f-4a613daa06dc": {"doc_hash": "68b2d73a90f40a008c9ada87415c99209a19d546488a12d77a906da2707908c8"}, "c2c51f1a-3c4c-4f7c-b814-4da4ef71765b": {"doc_hash": "25312ac031bbf85e5c609a68efb6c4a55685113dd97de44437b399cfb9f7752c", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "24a22607-3347-48a6-ba9e-d72156f02a9b": {"doc_hash": "b6fcb21a8700301929aede64f2efd79a6e8b948be13afd2c0a6210eee0a86a4a", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "83143d31-b3ca-4cbc-bfc9-1dab636c966a": {"doc_hash": "2d7ecf7f99882f37e92b81895a8c21ba1878600b2865ea411c2a62d734ce6c50", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "68a75094-0a21-47c5-b93e-c35a8d18d947": {"doc_hash": "da325efe8d239b789519ff565d0de03aeca8050d92293c8c00ed0914d8fadcf5", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "d0f5d94a-a64e-4cd1-b52d-9fb0f2113a21": {"doc_hash": "89d4ee84f4baf25e6f9fc47b018739f19e4dd0e68b4ad2d7b4f33386b8dbceb0", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "b02533b8-c391-4c12-b275-64526272c0bf": {"doc_hash": "52dbb0aecc850ef4db9f47d24222375320875012c354a19d1f97f0bb734cfb81", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "d028ff1f-c35d-46cc-bd7f-0ea3a655e513": {"doc_hash": "464d6b8cdfd665124655f2436a76be2e45422bd764c5ce9c15e7560b998e4933", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "83509f26-a88a-45a3-b0cd-4db3cdca12ae": {"doc_hash": "acae0459527b0607aff40a4c527a36eef213d3dcbccf957ae2e0ee30593aac19", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "45e2c9d6-f52d-456d-b335-2ff8a3efc624": {"doc_hash": "bbde829c1d50d17dcf97dacc190aa925c69275a5957aeadd6c1887a759790e00", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "f4dde1b9-a171-4ba5-84f9-f033722675e0": {"doc_hash": "61d79e3ffe5ab0eca2a40bf623590aad609dac7b1a0af41103678f5f548f9f80", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "f6e1d1a5-cf15-41ab-9d85-c1884305d548": {"doc_hash": "e6629156fb5dbe8ef3f117f664cd9933fd42646d0118e8310b4807871b130626", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "1564a509-3858-4618-8b3e-f251f2d7eb84": {"doc_hash": "24683005f42b39dc50479bef6d42bdea379084eb7d89c807118e8975b37720f9", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "866a4b6f-aee8-47d9-be5d-feaa3acad45b": {"doc_hash": "1d9421657c777a5e164b093875fecae15dc998f55f5288dc59e0dd9dc9285569", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "5250640b-2a90-4a3f-beae-e9c425b2e409": {"doc_hash": "7717c6f16a52b0e4056437bb5e01537335d3c2677da3b15f9caede87799c919f", "ref_doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}, "2f562c8e-aa95-4016-aa53-6e4bd04073a3": {"doc_hash": "de7e3702c5dffbda5a956b343e4189ecdc2ac26b115b8c9d16c42fad1561caef"}, "f09ad18b-809e-48c1-9594-08c0e7cd94e8": {"doc_hash": "13833f19f2be9b828a5e1880a8da5ded468ec814ecc3f62114d2b3b7a0ee4ebe", "ref_doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "27006bda-d38e-440b-9b44-51cb0c237139": {"doc_hash": "5582276f90152897b280ac2aab5518c724b175b0650b319156bb96b2ccd817da", "ref_doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "b83b8665-b20a-40cd-8635-744eb32f0865": {"doc_hash": "d10c2a593f4f15cc9701d25c026e4363f05befda3bc13a9715b7dd5b87e38d15", "ref_doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "cb949682-7cf9-433d-a818-d9095bc087fc": {"doc_hash": "2b857a310441fe6cfd32ca89031df61b3467c780431c406c7a953a24e1b4b9b5", "ref_doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}, "cd4d3243-a6ae-445a-b0fd-7f8b40073b34": {"doc_hash": "2bf06f11a004c44b8a39a4c3cb79d07f39634c2bf6c672885e84c14d4cf85a17"}, "e8aaccc0-ad4a-4d97-a3cc-ede7c776cbe1": {"doc_hash": "df027adec706cfe6d3bb41cfbfa51c59d1022d82ca09a6183484a4b1f78a88ba", "ref_doc_id": "7a55c287-d0bf-464b-a5e8-76a17da3deb7"}, "7a55c287-d0bf-464b-a5e8-76a17da3deb7": {"doc_hash": "5ec9e76633315901563f127fe97467a493e4dde09baa6c70e4738760a86a6f30"}, "58e7818c-f650-401b-9c01-7d3905c2407b": {"doc_hash": "d2cb81b295073cfaafd3f0709b330fad37359659f4fcb8f53d02ace1b991a3eb", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "ddec1dd2-5542-4cf6-9516-364a188cb50c": {"doc_hash": "a712d9e8a04da808da931e536fb7b645c46ad3c19f514c1437a367169d8b24c7", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "3d634f4a-6464-4604-b2ce-c9c1644b3d6e": {"doc_hash": "f04a092e1241a9d14ae192314ee71fd646fe73887be88ad5371bcefe944a98c4", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "a07eb1c6-055b-4024-b693-e46624363a24": {"doc_hash": "0b1b0db02bfcb89d33ed50dc724e719826a48684035b9b2a0d97994affc98358", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "7b7b6905-0f25-4a92-8974-653add4ae317": {"doc_hash": "884b1880557fa727c175ed0d58149fd59022b7a1c6ee8771174c0a612e8cf686", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "e1333b08-9d0d-4c3b-a8cd-f51cb20d7314": {"doc_hash": "503b46b484101752f7629c381c64338e9d22368b194faf99a6bb73b992284d12", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "4fe7d6bf-eb33-493b-8b7a-23f0c94b5153": {"doc_hash": "3d0b38232f71814b2850b23cb6705830d87aba9526e669f8fd7ba3720d60bc80", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "7da8e5a7-784b-4f29-84f7-8d458417c35e": {"doc_hash": "b1541a0262e899644211a5d86d48b9c7a45a6193742c2e123769b5ee176c0a50", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "22465b8a-248a-4772-ad2a-fbd03e55b3bf": {"doc_hash": "0a46b7241d90098790c8edfac946b44631b841ec7e86b1467dcf2c788d492653", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "0ecb0ff8-e372-4eaa-8208-e819b5a1714b": {"doc_hash": "b1dac0129ae15e9fd65bab610391fcc05630ae5bfb1fe18fa876ee1b2cbe757c", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "192d43fd-b604-4e93-accc-cc6f5d07cdf9": {"doc_hash": "f99ae9ad763535454cb405a40de269a64388738f2722b94b3d2e9f72fcfa352a", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "6f129632-3f87-44a7-989c-ec9c49d59bc6": {"doc_hash": "2ee50e5bd448fe74f700fa172f5b42426d6fa26466ed2de4590c958d8d7bd45d", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "f4706536-f8da-4795-92dc-d4c1071a07cd": {"doc_hash": "0b6d9ddbb74d42c7d39b565391950e86cb44042591c39c631c1711eb312b732d", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "cbaafd8e-06d1-4576-9bc1-d93dad3170b8": {"doc_hash": "c4b7bd9db0cf50761559b3d4ffdeff1c4cfaaa0fa3123ef5ccba8f82e4b458d3", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "5b642f65-112a-43d4-9b14-335caa53070d": {"doc_hash": "35ce3f7068cc4526211d7cb0a973757077635ef5d28792ec60fb344971e45a9e", "ref_doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}, "8cecea65-dbdf-4b0f-9abe-801a0a87f675": {"doc_hash": "fe188737fcb09df98880e1856a60088a6ebf19583bdeb172bf80ce355bf31ed5"}, "65481478-3f66-4cc5-9784-6b8c54661654": {"doc_hash": "4d4975168b6a514b10e81b220953c6585d4d8d04464c82dedd9e80f3c070b1f9", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "0026c333-d487-4ad1-82eb-c7465cb926b8": {"doc_hash": "1e96da062165bfaa6d3269cecb4b90d6873b8f11b7bffcbd611fcd8e03a222a9", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "65f5353c-1f93-436f-95b4-4aa3f60e03fc": {"doc_hash": "2a1729e07debe9a2a8e8f1ea0d16756a8a7427377a77eab2f93d322526f00cdf", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "4436eb3c-9c54-4893-8d62-32bb42cb46ef": {"doc_hash": "24bc6f9c97826aa5df8b0f8b6f7dc2891be2818d9716f46993c50c1686db2b3c", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "dbe20a2a-1fc4-47c8-b82d-8cc0d59ce39e": {"doc_hash": "159125b8d52ecdfcd80fed49d6c4edcd7c0e0f09b31884bcc5f036ba2ce91715", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "8b7b9878-5693-439a-a23e-4cc6d1493350": {"doc_hash": "447a47ccb4f049ff82ce2fed997f1d08252ea0f1aa40a1d4f1d9f4d2e07f5a10", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "95f99dab-63db-4b78-826d-696a8ff66ab9": {"doc_hash": "96c1737632bb8b6fa59f5ef5979e105bb7b60a1d44084659f81e8cafb4a349ca", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "bc64b8ee-928f-4d28-876b-fd773677e984": {"doc_hash": "a55b09f4fc8cfdd3deb3e6edc3135409ea6b65a1a3a05d62b96869ae707c3409", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "3abde7ec-f74a-4629-b17d-67475d92da1f": {"doc_hash": "f75a5ed56b1378087563e58af5d7ce8d6c53911c61437c903cbbb6883d980caf", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "7fdda8db-5310-487c-8bf5-6fa4fd27794d": {"doc_hash": "04341d88cbb3e52481bc7df9cdcecfacdd6d2d84c99e517dac1990c89d5d32e3", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "9a94a297-d0f9-4898-9f65-0144aad5c26f": {"doc_hash": "6ee0229939f6684f40292cd232a0af772296ccedf281994c1f0cc6f98ecaf4b3", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "3bc654c1-d5f3-4b58-8b5a-99a5ac5b7e07": {"doc_hash": "279d09e986cea8399a98e283d0f20fb124a678fd68a4f609603a51388b2fd620", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "cadbd380-380b-4f8e-929d-4bb1555aeb54": {"doc_hash": "0cfaeab6ce09b8797f8a3d7d7b4f293736af3d16b14aade8efa9473e10bf21cf", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "ecd2acb0-bb8e-4f4d-9780-e3281c776920": {"doc_hash": "94d9bc44c9d0cadb5d0ba9d614e76a61240a78edee7c5e4baeaa25ace424a965", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "078d64c7-eccc-4149-9a17-fb2926c65eb9": {"doc_hash": "5a531747e2d7950c8e338dd65775b7047a6fc55f809087c86faba7a3785519c4", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "69bc62b7-4d5c-452a-9b92-270911d4a0fe": {"doc_hash": "5b5a1b2b44fc4c61138335f0494eb159bc7fc53925409a23832735f19a2d68dd", "ref_doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}, "bbd5dead-2586-4fd0-a289-d0cfa542d97b": {"doc_hash": "64ad1b234b743c4636134675d9166ba2feecb6bf24ebdb1a20124298e58d9483"}, "28a8185c-f125-4827-b001-61b93cd4bcc4": {"doc_hash": "104f45bc1bda3099027ea72e0875d17bca64f86a18bcfdaac8609258ef5baef7", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "f7144879-9b5e-4f29-bbf9-386cb07ef6fa": {"doc_hash": "054e56c0760f5d47df3ff1cd43aa540fdffe8a5f50217ebdcb464793855bcfab", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "c511a92a-648f-4757-a9ad-d7f0323a2184": {"doc_hash": "de850203af4c7f840a350b5cfc1763419ee11f4e90d71923c5efdfedf0fcd336", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "1e866be3-ffe5-46cf-b4a3-8ac41f938b69": {"doc_hash": "e1239e15ecca227949e8cb9870a237315d8b9e955c4d56ca18bfd1595f15e677", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "b6af877d-2390-4bd8-a6d2-6ed4a772215d": {"doc_hash": "a79f61ff14dd91c1d5f7a31283023e9417e65c3ab5f46bc597b856a4a830eba2", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "d0b11037-1945-40ec-8ab3-47921d1fadcb": {"doc_hash": "45007da16eaff293e642bccc7dc7dc629e1e2e8eaca14c6778e72e60899fb76e", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "7fd8f050-d87e-41cc-9c63-0003e5ee1544": {"doc_hash": "d324fc68d317231c4c7fa2adab814271fbe414cf494de240bb8489ba860109b2", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "a77ba583-0f1d-46b2-8ff7-ae17479ce0fd": {"doc_hash": "2d11f6f89d6d21b2daf59888afb8f2667b218817a282021a32d8407782d54951", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "300666de-ee99-4e70-879a-f6089faafc46": {"doc_hash": "9aa98d54c47bb3556d4dc5205581df26d03acc4a7feffa37353a766bde529c7d", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "fc29303b-07ce-4727-be27-983181f9f61e": {"doc_hash": "f7f8bde444aba95be10ca69c90f4b0214c484c2317524896b0bef95c12182800", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "f8cbb712-32b8-4562-bde4-fb725b3d9205": {"doc_hash": "f971c335a9403059a6bb9f40bb5d1301509f12d556007bb38cd8933f75ebed25", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "5d9e999c-18a0-4cb2-9926-50c308eb129b": {"doc_hash": "bbba3671b4019f6872553af85442c7afd8121273b9ce253f40b2e74e9970ebdc", "ref_doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}, "3db0326d-94e3-46dd-b8ab-01401bb17d05": {"doc_hash": "6541910bb1d02237a2ff9bab27763ea3e3245dc920aabc87dd3216045b28a22b"}, "a56e9c7d-5513-45d6-a642-be7af0c2e85c": {"doc_hash": "0449b10d916f727f89549b3208a5ca5858887a37433cfaea06766f435ada902d", "ref_doc_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb"}, "6a803b57-49fc-48ca-9393-972328ee4732": {"doc_hash": "86a99f89f9c396cdbc4a629785e420c091f9c6da0b20c53b8e1011e555b302b3", "ref_doc_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb"}, "177942a4-1a57-4e01-9b0e-e8f1d76e64cb": {"doc_hash": "d0844cb03d654f72009a5fffea5cb78b8e27bdc71d759cb8424bc8c68f4562ce"}, "02ca96c4-6d09-4dc8-92cc-b544eedf62f1": {"doc_hash": "f48ee1f06dc0463c9c65f856b468b4d54f1ba6ecc5b5bab8d22ab1152a9a830d", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "ed46bb94-ddc0-496e-b660-7dc1414efb5a": {"doc_hash": "3520005de673b8a96171d610cc9fa9c0751a273987e53743fa8e790d419bcdae", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "2bad9597-31ad-4288-9dce-b385ed1aac1a": {"doc_hash": "587bf1634e63f7fc3d5eb814d57d5d2708cdea7ebcd7c95f7dc5251d7b701533", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "8ded3bcf-f8a8-461b-a4b9-9a85d82797f3": {"doc_hash": "2337fa9be7ee516f901f606a1cc988606b85ebf1fa57313e157d657d328b3ca9", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "3b9a25ca-ad51-446a-b03e-3ebd0d40242d": {"doc_hash": "e72e40696abefb5cc68236adabd3262125fd8b061b71af4687addf9100b1a024", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "58185f9d-bf2a-443c-bc76-f5bfe06ec79a": {"doc_hash": "c72327d1a9f48578cbae4496b100e1c93dbe352871149ad35dd81d560ac6cfca", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "e2622ce4-abb8-4d42-86d9-966ce0b9ca15": {"doc_hash": "f151f798f494ffbb686539bd9c445289f2cde00f2408abe5d4ec94f6f9ceebe9", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "9949ac58-0bff-4791-bb37-9b42df6977db": {"doc_hash": "02b8310f1f20399b3e821b62dff80bd67b175b2f2460f7546f1d92a83c9e072e", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "5214c1b3-9682-48b2-a25e-f4d5879a1a65": {"doc_hash": "1142ad5166987611f8e1fa281cadea4000ebc933dcb16da176301902cc77039c", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "9e2d2d43-625d-4106-8d00-c47da6bd20c3": {"doc_hash": "aaad65272a514d7bff22172d73445a982ae0ad9864ab2679ef90f6afc9dbe831", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "d6b690e6-46f0-492f-8f4b-3a7a80d07138": {"doc_hash": "f395a689be3e265b51743fd49d88e0c11c5350d62cd7b6900d3deaa6e2f84bc2", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "df93033a-8dd3-49f7-b348-763d0b48e612": {"doc_hash": "5a716a42b0f76aef6a5366348e1afa19b01fa619f07de752312190d4744ee7d9", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "5a860cda-b415-4d83-aa50-ae5b9e63b858": {"doc_hash": "a34ef25a60305e0212ace521276ee46150747400b1d83d8ceacbd81c7a51864b", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "01fe664f-3b2a-46d1-b8bb-7d45779f69f6": {"doc_hash": "b0b670cecd0e66d73d1c25dd74b8a1533da4d9bfa191d8fe399d432e2ca61746", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "bcdc7243-9dd5-445b-b2b7-358c669c8893": {"doc_hash": "8027f99d45c14e41bcac62bd186097937ff411aff05c9e5a7033cfd0d58e665a", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "966263e0-1f7b-4cc1-8815-c3f548f11def": {"doc_hash": "077d87a5950496446f7a3dc9e332f37951def6206cac4f5c8a6755315b4298f3", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "df0da444-94fc-4ca2-99eb-20c90d355490": {"doc_hash": "de32de040b882f95a1f8f9bb99e567aaaaecb5dd9a4da0bd18550073635eaba8", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "adb544e2-adb7-4b83-a8aa-cefb1f2db533": {"doc_hash": "82475dd700d83ce17f557a46295b6e56a8d852866f9f2687ec607653ad4e4a28", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "100c5e3f-39bf-4e91-8a77-6be51ab4a2a1": {"doc_hash": "2dc64656476e178f7db7fa5d7e62caa387d76bcd116140c80f3a1daf43b69da4", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "5f79533d-d369-490f-9016-5149f141ebc5": {"doc_hash": "1181596d1f4d2057b795f0ec44d98eaa634d13620a497314e4ffd154b42ba939", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "05c844be-7464-4e7c-913c-5ffbce72216d": {"doc_hash": "886fb8bb1a8eecd36bedc19933c8a6199d723a1e7ca9ee455a8b873faccd4db1", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "e1e2da1d-700d-405d-8f91-cf85a3d0298c": {"doc_hash": "ee68b11193f2f7434a0697437596d4dbec51e39fba4353b677a1f8bbc24f0c38", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "77272b59-5423-4d64-9966-838372f1baf0": {"doc_hash": "108abe8e63ef8c042b1b536c75df39ad10edbebed6313672560b4e19d62b9948", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "2e3ae5c2-1359-477f-8d03-f94011102462": {"doc_hash": "b822c488070552c772382202f987220386bc64b80f1310291b30dfb9302c0394", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "e2638c82-3b0f-4b13-bb08-7dda091f3742": {"doc_hash": "2cc36db796a77fc17e6d3365a82a138f007432d538b3ad309a823def57fe4556", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "490925cf-dc04-479d-9867-e2198bb474a1": {"doc_hash": "7c60974c896afbed455d40151375b873520ee1577b9e2a9e9d56773e941c8f82", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "b33fb72e-9070-4eae-a7b0-c567c9f6ea22": {"doc_hash": "329562f538de533ac04930a0491a1141cbe7f9c0f8b9c6be2fe3b9eebefb67ae", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "49b8caf2-6a12-493b-ad4c-0f93bcd226dd": {"doc_hash": "a08acd50b4a9337bf0ce4e1c3967ceff910e773626c4c5321f5514d57ba48476", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "95c6c4a4-fa11-42d8-9f26-8a79039a5c52": {"doc_hash": "710921ac2c79852edb4fdb31fc6d88d72723180568bd2fe2f5e5959676715456", "ref_doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}, "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1": {"doc_hash": "39dca0db520c27622ed465d1a78020c8d0dbf6277fc22c50bc1b9a5184131a9d"}, "7bd2d852-2912-49ec-a0a2-20b8af746cd7": {"doc_hash": "18e8e98407c8f16e6aaa334e101951163ad97d3efe49b41269a3b78b2e61809f", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "ce14dbf8-5e64-4a1c-ab0c-fd33f4c88197": {"doc_hash": "3eb3ef05a00318bb96c797a29ac09dc016034ae41349931ff24dbd7066420b02", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "611a01a0-1846-4956-afa8-1721c7e159c6": {"doc_hash": "3716061964c4b5f6af512bd66715130734b2396248b8651e1cb04606f4748c3e", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "dc6ba06b-d8da-41cc-9bfe-2278eea4e56a": {"doc_hash": "90a008adf8ae22855df3d111b060d60a7b802980d1a64da565e094abb21450dd", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "93c1fbbd-2699-4ae1-9962-68a0659657e4": {"doc_hash": "f8d6db3e149d187053ef4c249d7effa4514429101a242c6c0546e19bd2132d5d", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "8f813959-7893-486a-8d03-714339c68ce4": {"doc_hash": "cd0dcaacfb6502f4490696b7bcc7cebf7d856fddd51c76212bf4aff0acab93c6", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "f05a433d-ed66-4ed2-833c-2883a8db685a": {"doc_hash": "56323480fe768b48f8e0f6fe8720bde1a532252f3ca12cbc774e82e20afb0c1d", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "28408e6d-fbfd-45e2-bc90-cb420df61123": {"doc_hash": "3c4824b6be9190343060bdf4cbe8935d5ef78e25cd677cd2963766916009b551", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "6a5bd365-07fd-49c3-bbee-d97f50e051da": {"doc_hash": "373877023361fa1a68eb158e38361a5eb899cec02948dcbe57e6d55baf9dde7b", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "2ab9e166-9379-493f-928b-d89ae364ae9b": {"doc_hash": "4838b459deaa668d1395f3e2e6e98f2e692193816551bad6618107c6bc92b9f8", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "3a4ba3e0-e605-466a-9393-c37ae9f6f854": {"doc_hash": "caa6832a3a4d5a47d404927d56c17e8665f21686a32c9aa35c4a8ba838f728d4", "ref_doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}, "a1b36aea-2d3b-40a3-b0f7-db85022a4e61": {"doc_hash": "924102fdfc00896e04022a7677b6175432a5aa4978eeee134aef29f847cb12e0"}, "58bd1a0c-4caf-4aab-97b9-d69cdaf9170e": {"doc_hash": "bede8fa97a27cb58b76c32a02798b983401f65b7bec838eb6ce31c46c1d3f018", "ref_doc_id": "30351e02-9445-431c-938b-2b002ed4735e"}, "1af5f605-ca46-404d-8dc5-fc1b82de88e6": {"doc_hash": "d399de32e69df33be137fbc13c25d0aa1ee99776087aaedbc4640e948448f2e3", "ref_doc_id": "30351e02-9445-431c-938b-2b002ed4735e"}, "30351e02-9445-431c-938b-2b002ed4735e": {"doc_hash": "b8b7aa9c0fbf91ab00ed4690f69b63edb7f0ccf393bec1a7fffd927911eb2ba2"}, "0d9629cf-7213-4062-b3e8-7dbdfc05c1e6": {"doc_hash": "2e48ca1910eac25076ebe549102bc0ab1e4d3fd528f1b28f41841725f3941b01", "ref_doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "7d80ba2f-ba44-49e2-97c8-68cea22d2916": {"doc_hash": "b063a541759d5814ab052fe3d20969fa26a2e0f3797a5c91a6e2170ea5be5e63", "ref_doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "bd2cf428-3bc4-4670-a299-bf780c72bea3": {"doc_hash": "b05ca88a4aee4b0340c53c2b304232f6244b4f676dd65f1c7a7503739dd1dffd", "ref_doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "8b20bc6c-3dfb-4ebc-94c8-25ae7b3267f6": {"doc_hash": "7f7a7a670c8ea4f4e9361ea27d4e3cda133c33aba43c63e1db4a8f6c757e6318", "ref_doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}, "611b26a5-41ee-46cf-9d5a-b8a84b074f5d": {"doc_hash": "7abd0d51200b4a7168f72d83c8d6e0d2247155bc8081de0a70a34553db59b004"}, "e3c390e3-85d3-4c69-9c96-066b77f5a79a": {"doc_hash": "adb4cc5a403ae850ee709487ec7720ed0be9a4effd8de2d3930dc39af3a7398c", "ref_doc_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944"}, "332a3a26-4225-4fc5-a916-757c9d09546c": {"doc_hash": "d41b409db7458b7627a823b9ddaaa17a421a3ea10f52d33ab50413347e3f489d", "ref_doc_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944"}, "dcc276f2-8e13-49fb-b2b8-3af796d95944": {"doc_hash": "1057bb7f603993abad2c2ca50b2dcb3cbedd3f28dd8fce9b60855db1359afdee"}, "e42821bf-4fee-435b-a441-6e711f93afa8": {"doc_hash": "c9af18f24be5da74ac0cb5c291849f213838498a0aad0312be784771ccea5dad", "ref_doc_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53"}, "fba66f0c-582c-4727-a940-6fe6b399d0e8": {"doc_hash": "89ddcb74f3183481237c6bbbff1f33805a8a669017da94e1a468528f7a785cb6", "ref_doc_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53"}, "48f148f1-e6de-4ba3-b63f-9a51f934fa53": {"doc_hash": "4218310832865c7d1b174248f3c837481c38fff12ae64704852ec919001c1290"}, "0cb107c3-ba56-4017-bc47-5a0b3b692df2": {"doc_hash": "8d10ec8404907747b8cddb19e8e960fbf7b3ce2b5c5ace69e4a9a5757c28d675", "ref_doc_id": "d8135eba-3ae8-414d-b04b-af55d8891a72"}, "3b079652-a22e-4cea-aa9a-5405b1f81807": {"doc_hash": "d4d0cf5ab94bdcaa2e2298abb4c88f3d83d4e045844919ad441035c805faaa1d", "ref_doc_id": "d8135eba-3ae8-414d-b04b-af55d8891a72"}, "d8135eba-3ae8-414d-b04b-af55d8891a72": {"doc_hash": "322f1544a732019b830961650203185d6414ab73018226a6bbbac06398a32ca8"}, "ffada7bd-ed77-47e1-b51b-b578bcbabf71": {"doc_hash": "54bed24c53d9a67368bc888e05e62163b274acbf7afaeaddb94567e637458844", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "e2f56072-fc39-4e1a-bee3-73eede268aa6": {"doc_hash": "57e9c2165fbad25a93b8636f794faa2828413d582be651379daaa9cea98c0523", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "9d56e7de-e17b-4ada-a431-edb219071f49": {"doc_hash": "fb9f1f2ec4d473a6ae2542d9f586015ad26e1372410f6d23247e1f7238457e84", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "43a19927-4a33-4a89-83fd-ad58d585938e": {"doc_hash": "b73c0d9e507f3b7bb72cb3af1e508ee32e9c37b1be2f996478ddc19faaec9c59", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "200e4c3e-0cfb-43a0-809f-1ce8197f0fec": {"doc_hash": "037ff7139eb83a25ffa00848f6bf3f6696e81647094fe5384af70ed99deb6ab7", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "4e9eb35d-1e39-4c53-839f-52bec0f97536": {"doc_hash": "e97c763ec8984b3d555018c65cab0e747b9da6052ebd6ec661f74f6fc82e870b", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "979b9255-62a1-439e-98c6-433a4c37af0e": {"doc_hash": "e601390cdbbb2ab1fa260f3d517ff4a464bcb5d71f134fa14a5fe51a9ed17bc4", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "b7b4ff76-7b67-4fb9-8dca-dbd2ecf26c4d": {"doc_hash": "52ab30146a4f78bf10ee650723bdb4f22aafec24801264eb9f2e125a18a7bc91", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "e209f9bf-dda9-43e3-8c64-38517c43c14f": {"doc_hash": "95dbfa940c2b4f1b8b19d57c947746cf8eb194d6367e09ba4dccd5f881938a08", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "68602cb0-6f9d-4eec-b4dc-af904ddf9455": {"doc_hash": "fc30c6523ed44314ecbba64b0862f7d1590b18c11b6b4f2d788d56dc4f908a83", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "9203e64d-436e-40d3-864d-bc7a6970b421": {"doc_hash": "8ac8ef306acad20abf4f56defa7ce2e75c59657b0e6296b1c14e2371c1c55d8f", "ref_doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}, "b0199728-e735-498f-806f-7bd8330355e0": {"doc_hash": "eee49274899764e3bb0febb1d815bd00c081692b40a4936fbeee2bc4ab0d7caa"}, "a39ac088-9722-442e-9d9b-c0e55fc17801": {"doc_hash": "5baad9b634a835532a52fbde2c52305b69947461da5cec9b6df9f7f1ebf64962", "ref_doc_id": "f6041522-e8d0-4707-9e2e-ce505314b1b8"}, "f6041522-e8d0-4707-9e2e-ce505314b1b8": {"doc_hash": "632eeea7345a9fd1ae830f38ab1a259add1eb91b0a43caa5c19d1e3f74a48fae"}, "eca70f18-6c77-4e89-a476-fd5a9e713826": {"doc_hash": "c0eafe8cebd85018b095dbfbc4f25a01ecf3d40c852011033abcdeab47f3fabe", "ref_doc_id": "ec393c1b-18d0-4461-9c32-b75b3d9ea676"}, "ec393c1b-18d0-4461-9c32-b75b3d9ea676": {"doc_hash": "6f74ab47b81f333223d16660687746278e691bf5e0e7f7c0b8d7e3a331bed1ee"}, "36ebb5b6-c2e0-4dfe-a3dd-d3dfa9c22499": {"doc_hash": "ccb796d70f7eba75fe7ca3b28a31be9a426039ab1642fe97c36b1b5c09458d02", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "ce1cb2b5-b7f8-4dd1-a7d8-e5085cedcf6e": {"doc_hash": "5324e723627f5aa2d4d9cfb8b7d9ebb405aee39de9ad2066dbcd2fc79116feb3", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "77051c31-f841-4e14-894e-1f862021b3dd": {"doc_hash": "3e64a5ee829a171038e7a28522b21fa8c056432a6fb8310b4cbf5855e984bf4e", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "595b345e-ee63-409c-9292-68359467be4f": {"doc_hash": "ae1bcc921bf4c3444c99b21143e96ad93a8c559aea618e369ab1936f088edfa5", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "57f9f691-887d-4f71-a458-7373c780e219": {"doc_hash": "d16be90a03628e027bff26de5f3e7251000505d68032e54ce62eaaf6d2ec242f", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "e5a1e03f-b0a0-4d55-9200-b54d3c152d3e": {"doc_hash": "7b675d6d2b8705d600dff29a116f438cd1b5bbf3de556f8b643cf670d07c6fdc", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "3acecbd4-1867-4451-b65a-5dbf975bb532": {"doc_hash": "b609ac6689f1aea30b6207b3e771ca35e9c130ec10a42cb8a83792cb83ba8c47", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "0957ead3-48dd-4dba-8d5d-231ad4bf4079": {"doc_hash": "750d43580fed789a33194ce414eb228f5f7ff322e5cda1146cfbcaf44a6a549e", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "e8285ac4-67c6-465e-bb2e-bb4d232ee8b9": {"doc_hash": "d4dada52f8640a4272ecbc9a0216aff8fc10800d82841c20e5091cd29e0863f1", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "f6df0908-4d14-4b3f-89c7-0d0db1a18073": {"doc_hash": "f1865de388634766f17a55d964aa00de9ed02abfb94a8e2dde44eb80e2de5f93", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "403213cd-056c-4dd4-9f30-6c196e4b843a": {"doc_hash": "1eb3d06b0318ad82ba27bf5f659b682d0762e252589bfd7539e14841704b1862", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "763de8e3-b292-4b0f-a23d-352999b8dac3": {"doc_hash": "5e38714ad23c874b443d62c69d7d273dfd9339e70fb2106afbddf40279efe2fb", "ref_doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}, "5ca7e0e6-948d-4bf4-9917-b65984e80d3e": {"doc_hash": "af68137dc0ca85165d63ea5d37801c520fe462f8b4eed62ef677f1a933e9b49a"}, "0029fe70-8458-48fe-9867-052638f3e121": {"doc_hash": "ee14e7bd8caf31fe4377a8bec7c46b295500553936311f75e5e2d1e18063e027", "ref_doc_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e"}, "49061286-377d-4bd2-868f-9af96241cc3f": {"doc_hash": "452b71e565c18d7ebef4de8cbc7f19f9563ed232d0baddf9868e2dd0386f3256", "ref_doc_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e"}, "3d83bde6-3c0e-4f0f-b109-1c92783dc84e": {"doc_hash": "75b608b98e13777552562a8927bb2b92c622279cf1a743d873252f2b9db02d48"}, "4e9bcbd6-b2f0-4e98-b621-37cd6e2bab33": {"doc_hash": "ec154efa84d6582461a0640c6a59fd8843c7ae40c507e75618fe00eec51d36f3", "ref_doc_id": "b1ef24fa-97f3-42e0-961d-291e54170218"}, "b1ef24fa-97f3-42e0-961d-291e54170218": {"doc_hash": "782cfe9f2095292a9e843683c7526c27bdff41e0416c860ee7a6ea58f72d8fc6"}, "bfd83eea-695c-4156-b9e0-ed51488f50cd": {"doc_hash": "e52cacd66b3d079958ed96552a0991ee842493562768741a9536ea6ec4210b44", "ref_doc_id": "69dfe709-e348-45f2-98f4-f093395080a7"}, "69dfe709-e348-45f2-98f4-f093395080a7": {"doc_hash": "402ebd4e6354aed5a4aa39c11d781e9178f2907cd130a677a80c1ee1c9cfa188"}, "c52e477a-e629-4d8d-ae02-3acec463f0e5": {"doc_hash": "02f78260afa820cc0ade3d22c74fce9256a0e1f4c0036f8c3a4a03960e063957", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "528d270b-d6b7-458c-aa0c-17cfb1b7493b": {"doc_hash": "0a0a9eb63ebdff10c0ec3824a2cb3413d8263841ba6ba0374b2ca4d2bcf0a453", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "38c05c5c-78a9-41fd-b8c8-cc911b44b392": {"doc_hash": "489d01a731ac7dfc0add8da219278d231759d4376ad21137bc199d1a591fe904", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "3766a672-229d-481b-8e77-f63d9edfe42d": {"doc_hash": "31407b73a6bfe3a0b4021f6a6f425d95319c7974564b6d9c1174cd32824280af", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "88caea78-3b8c-4c50-8e40-be33f06d0a84": {"doc_hash": "89a2e04180d5376b926a8bc7780e70253037dc787981923378172f8d4e6baf47", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "79661545-c9b8-410c-a23c-7b75c28e1847": {"doc_hash": "b396656973c473fa895b968833a2d04ea1fb753fe480ddf0b3fb212655f423eb", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "4118448b-bb8b-4fd6-9f1b-e10f8247536f": {"doc_hash": "65905eb3aad57b805a38908b09374a94576166b143bdd122d31c73aec4615a8e", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "f157ec57-6d4d-4539-a463-eaef48d39eaa": {"doc_hash": "a6496350e6dff9f6fd7a3079c3a69842cb190034b2948e9fc015ccdfb636f224", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "024fedaa-e2e4-4733-80db-1770ee4be916": {"doc_hash": "3a34b1b7989b884420ff919388778673cd90e923371a50c686c6a9ef9870dce9", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "852347b8-c229-42b8-9261-bc9c6037ad24": {"doc_hash": "c032192dafd05dcbf0df051650ff1996e1de9fef55bfa9fc502b182c4b0c29c2", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "7a64fd7d-9b41-4740-a3de-2b277f852653": {"doc_hash": "842fab7c54101550930584379f36124aabd6a735f732fd11d7ff2741c8983aa6", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "a390b91f-efb8-4f77-9649-77a25276cf6b": {"doc_hash": "fdce5f93d66991d1331fb7ac119be54b8fca513f30975e6b4edeb906bf415d4c", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "48499d08-c18e-4ae7-a08e-14c6a8ce5534": {"doc_hash": "a53004908de17deaf99ca233c6d890a15c60253957db101a3dbab9ee6e923b97", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "120557fb-efb3-4afd-a575-fb950b4dde3e": {"doc_hash": "44f541cf7ae635983e318bd1cfef4730b64fc01647ec62455d3a07e020227b82", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "5d85bafc-9d1d-41e2-895a-d18e73e172ae": {"doc_hash": "4a2db50f98380e4456c0c4b2427729944cbc9d4b837ccaf6058d356856e29b22", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "2e61ba59-a7aa-4b65-926a-687ae86861e3": {"doc_hash": "d652295f9ca48154047baea3cb473524d3858f2bf2a457d1baaebe349ae2e08a", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "ca8ed9ab-36c3-4cc9-9200-a44281095748": {"doc_hash": "d6161eda480eb02564074d70154f6c50fe2444661f04342dfbd1cd50e838cfe7", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "83f784f8-1769-4a12-a9fc-e66d75ebd146": {"doc_hash": "fea781077ff161d4453d4d217465258a9ed38af5934cd6c6857d0e43bfa66705", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "d358ea6f-d726-4852-b959-6b6f02b7f626": {"doc_hash": "ea2c43ba546aa06b6c0ed00b9e9dc7b6044ee74cfd4f73f9ea1faf6639f7c012", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "77027437-a678-41be-b475-fb1d8b50057e": {"doc_hash": "05f2d6c53c550da4dfedce8a8ac03900c0028cb501c97b4d781e865c760a67dd", "ref_doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}, "00a8ff61-766b-425a-aa31-182b8d2366e6": {"doc_hash": "4484c8cf03916ab4a1905799e36f2745e453c012ae6a4fdc56aeaeb9cc21bb9b"}, "fa1fcd89-0316-4277-a96a-908337af1bcb": {"doc_hash": "76c3e44af27c645360888412a9e174e9705a284ddcbfb71b2104f94328a887b6", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "54e47b1b-5be0-423e-8358-83c8c815d142": {"doc_hash": "30f57c382cad2bc138825f88dffb71cd480cfba3f82209337aa6bac57b95f9f0", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "795741ac-cedf-4428-8f5e-165bd45b1a62": {"doc_hash": "7376fde9ea755e50ac8c2d8eeaefdb1bf6ef14633362afa6f88d47ab427f34ab", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "83547562-e8ba-4313-93f1-fc33fd2e0cd7": {"doc_hash": "10e4d9667ad200af1261002f26463b676bcff7148eb4d0e37435e32c782b233b", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "a8fddcc6-b502-48a5-957e-099fdc6d5fdc": {"doc_hash": "62acfd6a7dbc3fe5b27dae2529ade5846ba60bdb0b7379da3f6ffb753234116c", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "d158c94d-fd03-4607-b7b2-b817dc6750ac": {"doc_hash": "800e5e4928a9cd38a77b1a58441e7af7d978e9634bcf2d0550545c18e7f232c0", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "89375532-71c7-4ba7-a392-f09aaf08f2be": {"doc_hash": "53852fcbc114d0a6fd2ebc5e1001ff35697b71ec2d4fc92e2f3206f8ce1161d4", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "9b5e83f4-4d7e-48f3-b44c-e6d3b4a33367": {"doc_hash": "34033baae21bc9529481f3f098f59bbb4a3dcc28c3912476234614f1c0552cc1", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "835d2923-71e0-4163-893a-caabe716e546": {"doc_hash": "1fdaf633ea2c02ad419e2d2aa991ddd25cf20fdf5c25b464a403d5cdb692a612", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "ca32725c-6115-49db-913c-df3b07fa6beb": {"doc_hash": "e3950ba71d7da21ec97906895af109df83a7e2e9c4d6680af8e4ed585deb5a92", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "578241bd-9f23-4439-a655-d30648805018": {"doc_hash": "ebfb4da69be4cd34fd7e4498bec3d9be3284796e050a42b02f8d9d4a88105f3a", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "e14f6cb9-9e6c-4472-abf0-450c9619ec9f": {"doc_hash": "a49111566613ceccc038a55e516f3fd8769cedbfbd16076352eccd0bc3cdd1c5", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "914aa8b2-ee23-4ca1-9e6e-5654c2fb7b10": {"doc_hash": "978abf2736fa531618e5a983cb21e4b69a602ac75d0cbc0b688ed5860b29549b", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "2bd791d3-6858-47f9-865f-388dac32fac6": {"doc_hash": "54e4f25a6f715035eefce13c06889f311e743d0a2daeace7e8bf3154803f9ce3", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "c8e5d8f0-61e2-4054-9cc6-1d6bb01946ef": {"doc_hash": "52465464f0bddd4642c22bbda64a733586f8340f383b4495cb08007a0a3a535b", "ref_doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}, "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8": {"doc_hash": "b5db8b39d3696310b6d8df6fa59b76d467d2b642fb7d40400ba56e291b06b816"}, "101abeec-50d2-415c-bd60-6b01f5634c97": {"doc_hash": "7411edc15bd0d8d570f7cd497c424ba8f2c96e468695ccfd3e6815cf1b2bd081", "ref_doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "a8b43d44-7ec4-40ac-a16a-3befd53e8c65": {"doc_hash": "8d25860137579e8f3a57709e42f42ec0f05c05b6124ed958aa2ef1aac155d9e0", "ref_doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "8273a425-c99f-49b4-9db3-121013f2933d": {"doc_hash": "86c42231e1fc55d8d27c4ff71b47f9803f4076b9e528bda8f19ce6240dc83dea", "ref_doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "b88f77c1-2044-4a9f-b790-573fc3c5c12b": {"doc_hash": "3f298ff3eee7f7e9927ac6636348dafbe777250a6fbf277ef901a8d84698308e", "ref_doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "87039a66-6d37-483a-bff7-4432cc531908": {"doc_hash": "125c6770e23bca4377cb3dac926b02ed708aa3537f079fe36accb16dbd3d746e", "ref_doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "d2e036ec-ad7f-4f9c-919f-08e95b238f42": {"doc_hash": "5fed1539d01375ac7bd74057b3587020464206c8a0f55183d2a064c899b4d0fe", "ref_doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "476681b8-7b69-4a34-a6d2-809fc653b8bf": {"doc_hash": "85afad0428a2c2b9be5d3c71ee8fa159ed67a3470d803ee1853995f307b4c157", "ref_doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "b6bac391-46af-49b8-ac76-55b9ea0a3f10": {"doc_hash": "58c352aaecb8073dbe9bb55d4104f698f7ca5f435a357b398aec10eccec4b58c", "ref_doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "4e342ed1-90d4-4470-95d3-1ca6c00677d9": {"doc_hash": "f0083c92d63193d084f5285c5428714b8232dd29ef3a233e991624177d988f55", "ref_doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}, "67a8ab21-d0a6-4af5-a14e-ba8258af56fe": {"doc_hash": "84da4661822746ca0d210a81181a1f5da2ea3b3b14cde1252f704fbf2939ccdf"}, "71c4a3bc-6635-44e1-80a1-0e8deef0d767": {"doc_hash": "2f968529fdcb37420f9551c0099ea3621990ee4e40e4a3a98b2cf18139dd7b94", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "2db9c2b8-f85c-463d-9f24-ebd8e9727fd5": {"doc_hash": "6e5368dfd9b620422f9a2bcf41a29f612800b468d60542dc035700c1f9d08dcd", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "9c6d0c05-1650-4b0e-9a43-a2e793804053": {"doc_hash": "f8dcd5f11640c304fd56e68506f31f865353382097bd2f3d7c2e0474cea740ad", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "74d6bdca-a349-435b-9efe-0beaeed635a1": {"doc_hash": "c976e29d6c2aacedf8446254f7739a7b1ca8ad9bb9d87982c92a074ca2a1c596", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "a3298b90-49cf-4b41-a0d9-17cc2a67baca": {"doc_hash": "f8e14e50853f143e3bd783c500cbd11010b7c017c10fbe2743c8549c86d5032f", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "1e4b3a13-4e82-4e88-8799-8d02597cd960": {"doc_hash": "bcba13aa178d4fcc83d61f8217f39c0532a28391f45f812bfb53613c46968949", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "d72266a3-fc2b-4dc5-9db2-4f7278b30167": {"doc_hash": "ffe53fdd9b58c9b6142ccfc4d85c5ac719fd1e4b84432f1d1964ba78b8b5e363", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "797816ac-6fc2-4453-b294-c5da10cbf4ab": {"doc_hash": "7c1b6f06d8cb03688a451e248ec49223d570d9250f18c4b070125dfcdf484133", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "bca215d8-8f5d-4550-bee2-ca746b34b1c7": {"doc_hash": "af10caa4fdb999bb5d46b65fd41f4c185bb91876415c675b49ec0b7aae8c253c", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "2af8640e-5a53-47c2-a938-9f9695cd7c76": {"doc_hash": "84b178423fe2e79bb17c61155c8efafd19b7f014256d421cd1d3b36ffb954717", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "f8bf4db5-78de-4d72-a5e3-33c83fc8c734": {"doc_hash": "675fd6e0df11d0090e466910c8f3cdbfa423bf9db2b25bf306b4ce27bcc1c8d9", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "44888967-ba3f-442c-9d7b-802d7ca43e44": {"doc_hash": "82fbc8778bb9a0e62e77a24980e6b542d881f8fb0b09149395bc55a95e1515e1", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "dc28745b-ce90-456e-83b0-3718ac471b7f": {"doc_hash": "b5af45e9e2b595762af85b7de78f1529be531ff2f494b79765076f35eec98cf6", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "14eda487-be69-46a6-8dd9-740d35cc7fe3": {"doc_hash": "7a74df17335c95b8b050cc326e430199370275d363727ed1ec235f3a4c3bac48", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "6e741f83-1a55-4964-a39a-1735a998cd6d": {"doc_hash": "81d6f1bd8a030f73ff1b71c9fcea3025b1c1e4435a7eb51ecdf50207389f0515", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "40a841c0-27b9-4105-8dc6-3454da3e3bd8": {"doc_hash": "df384637610a0947a4ac62b82b8c28560579b4e70d1fe2bf22ed71d866749227", "ref_doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}, "b95327bd-847b-4a2b-8191-09ae7e15d91b": {"doc_hash": "2c17479915f2f4a43edc26a329ca98eee139d78aca441809b8ddbc8c030c7e38"}, "0e35a31b-6d8a-4f9b-8c29-5781a42f4a6a": {"doc_hash": "4d8a5039f1ed6cbf8bd48baf66aca2dff60f627c657933c688d8d70cd8a0e520", "ref_doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "4ffb13a4-79e2-4307-ae24-d806775763c3": {"doc_hash": "157228bcc5ad667038723a25d2c147a4471f522cd316216a66b001862c4bc675", "ref_doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "6be1f85e-83be-4483-8b86-92c8725356a9": {"doc_hash": "d839d5ddcc96d9afd03287aec826504ea81035d635828a34d0020cc294850a35", "ref_doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "c271474a-b01e-4dde-806e-7f88aea2f469": {"doc_hash": "b5df174732e8838de03677d1e1ef271caba80757fe8641a8d7243d5fd71bd162", "ref_doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "7c252836-73d8-4243-8506-264c8086427a": {"doc_hash": "15dce20f2c83b34b86114aea68bea86cb76c43e0c7e2bc2bc086f34e8250a5ce", "ref_doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "72335e90-0cfc-416a-bc36-58b99175d085": {"doc_hash": "6b753c1eefd1566afa98af409ae39e72fcbeeb9914e83e17c3c8b63c1672a982", "ref_doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "09bc1af2-b295-43b7-91c8-008573646a0d": {"doc_hash": "5b72baf8bcb06d24af183c70d81bc299df0b782ecf6b96eb2475ef290b69cc50", "ref_doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "468e2ecf-5ca8-4831-a045-858601970464": {"doc_hash": "ab34a7cf1594b91af8c285972253a09936655e3db4a60385c424e3606d58b6af", "ref_doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}, "e4df6583-ff3d-44e3-9497-4f8634359a67": {"doc_hash": "b3c3f502a1764aaa712bccd4a072c71515a94b9130de5cb262e7f7883f782ed6"}, "c6e72421-0c17-4c05-85ce-2010d1df2cea": {"doc_hash": "83934c98e2e0fa2df6a53e96f215621b700a92548c6c3e9bb295ec8ee4d377b0", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "603ea3c1-06dc-4f3b-944a-9c6cc9673b9d": {"doc_hash": "961779064ad21ef3ca2fd54f3b8e9a92416649729790e7b7331bab2cfa21718d", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "a0fc13ea-7924-4e50-95e1-f43f0559d329": {"doc_hash": "789f3223e6e46b32012ac95a1728aa2b9be79245287c9f9e5bdf01f91d51997e", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "b1f955b6-bde3-4187-b7ec-0ccca333c31b": {"doc_hash": "3ea62dea37699a96956b521e05f936d8eb55395d88690eefbd178aacbdd104a6", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "5b57b692-0186-4785-9cda-71e403686f43": {"doc_hash": "869f4c33f52f0c1bb5510a8825a2487b69d4a6022105bbb2bb821ec6638b4133", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "8086fd1e-b2ec-4070-975c-c2361133f6a4": {"doc_hash": "e76c5d98599a023a2223a240dbd5065d0cad8dce08d9cd269a786a6800c70592", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "ffb9a74a-b5ef-46fe-a18b-ccc6ba7da111": {"doc_hash": "3f62e18bbdcc62e790e93048b4e193537633845add096cbd39de26f611df8b26", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "bc11dbf0-462f-4bef-b531-78c07e33d133": {"doc_hash": "20e2519f881d8e1064ebb32ebf87ef072d9cc5570793edf9c28e464b5e736d99", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "0c284300-d9f9-441d-b582-6e6795221c4e": {"doc_hash": "d5a81e6a9fcc6767faae819c3ff3e37cd803656b300ca89157b4789a05eea627", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "1e759376-2456-49fa-a154-1a5e19aad3e9": {"doc_hash": "76de120a5e012548d8c1fd74801e9e9caad973e57765aa5d81b6d0b522ff2ebf", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "cf77eaa3-eda1-41a1-84ee-75ca0759b985": {"doc_hash": "4e74641a6e77a69761c54229e7b65af1a3a01a950f0511d192ce6779c2da3d63", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "5622feb7-e8d7-436c-b3da-101d0b4f4f06": {"doc_hash": "bdf5de8c6dfb83da44831757447429f3a9eaebfd979bc4fbe600a52be7c35e81", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "ff3e9c00-eb71-4900-9413-b6deada6e561": {"doc_hash": "0a9c50b3c75c464abb3fc88b5b539759ebd8d9d9bac1530730d131ef1fc0e2fb", "ref_doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}, "969c4445-d2dd-42b9-a7a2-12b6f64e1700": {"doc_hash": "b3adc2a1ab5e3da948baab15d3449f56fd993703b576da5ab7f04d268f293bb4"}, "32da5209-b7d2-4eb3-8d14-ef013b8d4938": {"doc_hash": "7adcf5857543a7ef972bb4df8de54f47bca7c343265c37c498a861943f83c876", "ref_doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "f5793231-5cbd-4197-a8f7-0eeb8fb4c6c1": {"doc_hash": "084bc82d83027f7ce83998b95b6b62fc237a7d62cc2cd1c4c5b411b417fe45fe", "ref_doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "8847a2eb-c347-4971-94f1-45a7f1688aac": {"doc_hash": "827d83689f32c53615e4d764a5ca96d1b191397a85ad5fed5210fe5e80efa997", "ref_doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "9c608428-da65-4cb9-bb75-fbc5c66ccd01": {"doc_hash": "88634c83876f2bf004c51edabbe4d8f1e4b7cffa015e9dbdbab2351023b887b9", "ref_doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "e3f05e59-fcfb-46c1-8e98-1e1783599004": {"doc_hash": "b94041ccd6f9ea8cecb791f73b99fb55b4e0f812b1ebfb5193aaf48235105f83", "ref_doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}, "5ed8c97a-1c6c-4afb-b66d-efdd481672be": {"doc_hash": "9f00ef0cd92cdc37b15d3c18b87090808cdec56e7142dfc31604b063370431ba"}, "f24a6dc4-2427-4dd3-9bb8-61fe621a59cb": {"doc_hash": "299f146ae3ad1b00f87cdb9c7ed94a029d7512674f8efdd380f0fa8c7c3f3d7b", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "df0cb8c7-a553-454b-ba68-82ec87b30299": {"doc_hash": "c8a6042f70c5da68ceab1fc20bce02a413f12def583ea1a591819bc216f61efb", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "413faf23-1ff4-4f8e-a48b-d9509c3d23ae": {"doc_hash": "bccb94968e8dcf617476362fbaf44ce68f36bcb1131cbd764d794a0df94933f5", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "9e5d2a5d-d5f2-4612-a45c-8e15a890ceb2": {"doc_hash": "a702d359d36a1e5917105a9e044c88bd28520a67aeddc631cebb29bef3c1b6ca", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "b9707183-c73e-4aee-8864-fee85b148ec9": {"doc_hash": "2b205092467c1ef9df24f984af27d297aa5ac6f8019d2c143a2f67fa7d7dffda", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "90e148e7-14d9-4881-861d-0786b910c721": {"doc_hash": "5dca85609cb96aed433b1b962275e03b43d4ee7583c4345b904bd649e25f8134", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "c85b5a7b-c07c-456c-b67e-041c52a49a9c": {"doc_hash": "5080ed4315173fddd9c014f727d36f766efd6b3cccfbf6fb25d0ddc89c847dcf", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "8fa24c22-6fbd-4ab5-a8df-d0043157c950": {"doc_hash": "d029e425b79140f42085ebf942dabbb49db3e1ebc31aacaf69970bba9bbd39d9", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "d7f0868b-795a-4340-8ac3-625b21cf4b6f": {"doc_hash": "ccf9f753bc3935210a66e31ebffed716844d689adc6c881d08c8473b38c3ba63", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "7c5c4726-bc4f-48d9-9331-ad444749d3ae": {"doc_hash": "04ae7163c72c4938ebec2c1307d6d4ab798c907d15d7f61d181a24e45702ca84", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "aec64413-f360-4c95-891e-294655fa24f5": {"doc_hash": "a8749d9cbed98e6fb5eb8bfa0d70820b7a9b1011aea46a63306bae466ea83232", "ref_doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}, "c1f6107a-8ecb-45d2-bf5d-e5768bef3455": {"doc_hash": "b546b431119809e4d549aa43edd00b90498c98467e5c7cae1ea5f91578692de8"}, "47be1383-b4c3-4b46-b1bb-612f115cb5cd": {"doc_hash": "c1f898de4d34f2aca0e856db29fc849b3df20423e5a762819f659de907913e00", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "46cb1d52-0f0b-4b17-8e1f-3432aae4826c": {"doc_hash": "0ed019a61a969dd225a7dfc44580580ba02320bd86af4986565128c266fe4342", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "778b8bd0-445d-4c66-8804-9c1e37888ea4": {"doc_hash": "fde14e3c37db5eb898835853897f71d7146ad61734dd69a4c09617883221aced", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "8acd8464-081a-4d21-a2d8-811bc8a41922": {"doc_hash": "b24f546ed7b09e7099f7ffc7fd312c923ba29f8bdf91c1c0e0954750714d5b0e", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "c895e787-7815-4877-a7df-afab66f0636a": {"doc_hash": "7b7b0ad58124d3185e6b052afa7479563d0297d93785e1d40c8d3db9f6197e9b", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "296c8197-079b-4c2d-b812-f74780c73c32": {"doc_hash": "b3431f39305ad838bf3265cce86777e4406bd3654c77037d8d1f5c185c2984d1", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "a80953f0-5fd7-434d-8fc0-cfd43266c141": {"doc_hash": "423c5becb47d1b8e58be98d9873dd5f498b7c535c9c2aa46915bdd148cd2a713", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "2a7e0776-0b2c-48ed-a2cc-258375452620": {"doc_hash": "144fe5b59ef441c688594ee29a3ef25df0aeb10d5e0088c86626bd585809133c", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "faa27de2-ed4c-48b4-8317-fc0e869a4a36": {"doc_hash": "47f0f153b061c3e5dd36a40062e5230982b86dfdbe6c054ef7747f87b203fa64", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "463072b0-0ada-437e-bb65-bf0976ef72b3": {"doc_hash": "1b0f9ac013c5921c626da62eddb015b1d59fed9d6397dfb692804f29895cf702", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "4e248107-2035-4199-bc08-c74b49d5fcc6": {"doc_hash": "b2e87703a576cb5025c86c021e61bc3ac39df29a311a53f52fe8ddf0003ef12b", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "cfdfad83-3486-47fc-9d06-18e966e50b7c": {"doc_hash": "739aa80fbb3f30c8a3f26c7d953eea945383b13d8bdbe6e3f2f913d565777f2f", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "50e9c42c-bb86-4291-a2a7-bd60a71a466e": {"doc_hash": "9a042f5439b02e92fe6dbc1fcb24691649030dd63f5e49ae5b995bafb81aa20d", "ref_doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}, "b85e2633-a0dd-4abd-8398-c44410232847": {"doc_hash": "6b783116217c332cf8a6fb48ea4c0b1ba9084a5691beee7eb3f0bbd91f3b83b5"}, "5fb9c9ec-1b0e-4967-aceb-2b86d57f22fd": {"doc_hash": "f58b80df674ffadaeedc902ee5e325938b656cff18f5c66ad4da4011f1e2d34a", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "ff25c099-aa59-464c-a08c-fdb3791ab5dd": {"doc_hash": "bc817c10f349d28c6967092ea63de75380786f59f481feef4f2ef326c8d63b8a", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "ea4724d4-0293-4e1e-a176-0bea52a3e5f3": {"doc_hash": "7434b46d6f4f0b6e5140c0bae14452c940d48937055a6b05faac156db4d8be11", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "f9cc2420-88fe-404c-b7dc-a64dc68fa7ec": {"doc_hash": "8e0bfb2b085e8a9db71ba4d6699c894f001c986c429ad7846c64b8822c53ba03", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "860c4228-3dfe-4204-8555-d3f93f30e982": {"doc_hash": "56d29f02341b564b00d3a685520266feccbefb85090b7a670128d3d6b8fb37e6", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "6a65d6cc-b8ef-4b49-a1b9-06501f385281": {"doc_hash": "4d0e167d71da749cb2db24953bf46cdb4af819afd87eb2bc7dfeeea658ec0345", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "deb4207f-47b8-4363-ac6c-c00cf633e9a3": {"doc_hash": "3ae0818aa5ff701096fa6277e98097174dc6a23b185f289b0dbb2267de689e54", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "70207f0b-28b6-4000-9af1-a9751ec388a1": {"doc_hash": "50678376707b5cdfd4690c9239d10b6615cbb80f5876bbf85bc48031aa4dadb8", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "35b30ee3-83d7-4c50-a533-590b75092687": {"doc_hash": "0f1754efe777306273a97e08fbbb26ac925766a1d97987f2999a43a89fdc8664", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "b74e5b1c-365c-4a04-b58e-ca8df2f2a812": {"doc_hash": "036a5e5453361fc2d6e7e901e87b0f7848037464f9a2110aa9353c6d8303c604", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "dac79022-37f6-466c-99fe-255aa9a4aff6": {"doc_hash": "5facd7e1c475fcb6307734838a08efafed9e44a6723edcf7d8f21d45eafe0631", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "a684faf2-d6e7-4094-a1f5-3073e3010969": {"doc_hash": "676dcae8e012e17905d0bc217a4c912cc91ee8fe4e3bbe85e6b7986ef771db8d", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "b71e453e-c24c-4ddf-9f76-8f1d2c3f59e5": {"doc_hash": "bb67ac6a4c26dc6dd2873f827794219820c1af6488be8638e341807f9f69b7df", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "09d878c5-7b5f-43df-b2fc-17349c286eb7": {"doc_hash": "e6ad553dff83d0bba8b060dc67683698c54ba914d2925fc130f0e43a17844c1a", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "e369201a-c028-456e-b33f-5a823cd04c4b": {"doc_hash": "ba2e4f545fc0da42c7de6141d39b31f669643c56e6e13ae1283184a9d6d49a7c", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "0862dba7-c437-419d-a67c-a7a19278ee37": {"doc_hash": "136842cf6b999bce94a1b933fcae447b93d4d15c0c594e9a53b78c79a4b549f3", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "8a6a3656-e862-4e1e-9566-98904db6b57b": {"doc_hash": "a35f429fd01aba5766690419c620c7b7aa0ea52f7847120c89e0157bd62d8b2f", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "a0f8d230-720d-442f-ae36-25a8a54cfa97": {"doc_hash": "d2435dc634df89c741d8a23bded79045472186c1378b8daa06fe82ba31b8ed41", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "058fd3d4-efa5-4488-a1c3-74bf09781e86": {"doc_hash": "afd5fa490c17f81817de559bf656fa579dd2fff374c5b43439872a42a89b3d5a", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "9f902caa-3c8a-4c05-b46c-1e1f1df83834": {"doc_hash": "028eb7c4d1e5efe269e9618bae80a9f78f7116ac1b5af0193e602e5fc4a7fec3", "ref_doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}, "2be49d31-8552-4227-ab21-3c4a73e2771f": {"doc_hash": "882d48ce231bcbdd05e6b9ea90d70c63c42299f821887c8bc0acb6c8a125dc79"}, "15997e69-4974-4fe1-9800-c562eec9b258": {"doc_hash": "9780836a5389814b0ac0e577d48832f9f012d129e2d96fca90f526b22905ca1a", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "76601a4c-5955-4f68-8fe0-2347f76e0d83": {"doc_hash": "6a3a75cfcd3e247a9635d534e5232b52ffe32724a4f93984c7099ca1d8d9c646", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "78a03d23-9f82-4414-be59-a73782dee41c": {"doc_hash": "82ea7697092c3e679536bec56eed4201e55f8677640dba58ab256ef3fd72492f", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "97d1c507-fc21-47f4-9eb4-f7321a4c0a77": {"doc_hash": "c4be4fe7a9d755b625126fa4123295fff07572292119cae88012ab980e921691", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "b4423dab-675c-4491-9cea-c5384fd18e2b": {"doc_hash": "1a9cb1d10f977e528ed4252be6856e3184594bd17e7da2d7ab3046ff17a58a0f", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "5c8c1f58-f167-4b77-aa0e-61d47a8039d7": {"doc_hash": "6fb214cd98e7d026d0a2fba0b3760c89d45a3995283089ee3298298c5e90b819", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "7e34500c-dbfa-4e84-8d64-3d1163dd5c48": {"doc_hash": "f0d66ca9cf9882a06dd3a8362bc1b533e39f0ef91a3ece3684b8ae247bbb390c", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "a8f88646-e5af-4381-8a33-f2d66d538ffd": {"doc_hash": "9e730b48f8e9974e1c23e33fd6ccddf1bd9df4d7a24bbd0187656cba973de93c", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "2604e495-b5e9-41b6-bcac-c29ffed09f4c": {"doc_hash": "72cd57c042bad1442faf9b1320cf5adf173a9811c663ce7f3bff88be648dfa1b", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "8ab04d40-d2ca-4185-9bab-b4c745a49c48": {"doc_hash": "be3a2ba52f8e1555f142939de9b8713ccbad45245917b2a2d0a6d2f83937e84a", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "5285e0af-31bb-4297-9b85-74f17d7939e9": {"doc_hash": "165979e70a4def2b1a562b3600fa5e5dc2fcbcbdc0ebe0f683a888e01cf1fee5", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "8fbe5691-8155-4aee-a535-dfeb2a06cf9b": {"doc_hash": "3d2fc8b68e6499147b4eb7489bf5af1633b910b352979f5908f2ddc7f0ef3532", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "032cec94-aeb3-436e-a40f-60f21acda04f": {"doc_hash": "534d914a71474b2193d9320cf2d810e26cd9368d1d08942b7abe7b0ae573aacc", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "6b7d8b5b-95aa-4bb5-bc55-174503dd4e62": {"doc_hash": "b0f90c94587148745035d00ca265d6bdeebfa31ffeba88047e635c50ab5db2cf", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "274dcbca-d18d-4650-a190-c0911bb99942": {"doc_hash": "6395d06f6d001b793eaaff25401c00a71feea2641bd75ebb49336588d4b15cb1", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "4dea95ae-199c-4134-af0a-d58ebfff00f9": {"doc_hash": "1ed7de659f41c9665f2faad34f9c65bb9db7dc2b847f19825f2eb82b879fa2c0", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "ebec4eac-8275-4125-8b61-3c7cbd201d55": {"doc_hash": "ce44801f0ccc4757d2aba00d3f8336754f33bf609d0fed9b03815d59861821eb", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "50b32ea2-6fc6-481c-865a-980bec925996": {"doc_hash": "60c483adf9d5e49f88488ebb7c6480573d49e4d7f75195e6f2b18e2fdd72b147", "ref_doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}, "7c666861-61bc-4a7d-83a3-c9da6eafba87": {"doc_hash": "fee92f8cac5926523386a4b40f5ca7fb16e679efeb17761b0b39de4bd28b6c7c"}, "f2cbf011-bc22-410f-b36e-05f7c6edc459": {"doc_hash": "75a978c1fe9930d4d0a18cc55db59bff3924cd266c32fd62c327f30562134fb9", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "346aa99f-bb2b-4cf7-a7ae-2aaea8ebb785": {"doc_hash": "0d7faac7e4d8b355690934a1fe45be0de87a674b75361b3b00b0f57a428eb540", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "1c75b713-6f92-4ec8-9218-3bb3e58c4e03": {"doc_hash": "438bc7899d1d8c31b3e6ecb7e5aa37fe52ace425b2bea667f06025ac151ca933", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "ccc440cc-471f-40a5-a4b4-2fe156a969fc": {"doc_hash": "e64f141b7d0b5c9a431f7e3c000dbb2db897c952c4d7ff2c249569d4bc862dd9", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "33b8bf66-a163-4af4-8f34-974afdb37833": {"doc_hash": "7677e7410873480fc82ceac96b37f305c1c6b239fdc387adf828ceac046dfd31", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "364f57dc-fe18-47a9-816d-ea654a4b2b7c": {"doc_hash": "cdae1ddf4860b6dc1d13bafd3edc84d7020cd6f96ef7e67a3bee603c60e3b38e", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "cdc234c5-6d40-4b9a-8a6b-aed34b6c6ed7": {"doc_hash": "21167a34a88d035df091ca4ccd67a8f2ec1f4b76d0b59fc2962ef98b0f7be3c6", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "d42c8120-3255-4b13-83d4-eb2cad0d73c0": {"doc_hash": "43f8416631906832793478bc417a721277ddadd4d695d5e7fb3cc068930f4caf", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "0a61de61-47dd-42cd-94be-4467bdc87028": {"doc_hash": "81d865b4556b59012dfd43daac2f32862320e2870b53203393e9486fca0a932d", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "a11f6bc2-d45c-4302-9f93-15f941acefa1": {"doc_hash": "2b3abf47ee3cd5dc38e32248c644fccd7b4a72464fe809b5dde7f7640bd34f01", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "b20c38b6-59e4-43a9-9b10-8ef6127ecb04": {"doc_hash": "b6f36ca627cf7e84694d347087ca88e1082e539c090f5905519a74845c09f556", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "ed17db20-b032-4c05-a08d-760554d40e33": {"doc_hash": "aee2534fcd883105310fbe50825173ca78290332d7f0b40498f28d8a76625d53", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "6e13df71-09d7-4d1e-9790-ff7ffdf84823": {"doc_hash": "b5d3bca70a9e6331dfad8754bf5b27fa31b5663100f8d565ccb96c9632d38698", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "d51236fd-2a0c-4de1-b447-a5aca9c8206b": {"doc_hash": "3de3bc72eef775cb508526b721b02127b55c8cb1daef6afcbb65d4cab173bfe6", "ref_doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}, "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144": {"doc_hash": "bde32099cec2ca61344ea8333f85ae482c3902b5f973382803956d221f46723d"}, "464b1f97-e2e7-4c08-831e-26f486e2c433": {"doc_hash": "02e28f5e73af5bcae466349c7a3759b42a185cae137065ff39cf4e4d6602ddb6", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "58ab7dd7-68b1-4ed3-b40f-38b076c70908": {"doc_hash": "c47c8e3498b239ec055ed47a301781f20fac29ae4222978c600da940fed1c40f", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "ae0078e0-7d33-47a4-b481-d98e71589dce": {"doc_hash": "e26ac95ac00334f5fa658eda6ad5e78c411489022f35196eb87cd7e229f8fd66", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "3f6a626d-e8cb-4481-a77f-848c263aa0a7": {"doc_hash": "01888d24ffa10098021a41d22f8a35849376ef6396572f08ced8df8a70d493de", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "412c18f5-2adf-4945-acb2-777ae502bdc3": {"doc_hash": "600098c8ba65dbbae615f7ec47be29e85678f2fb4ae0fc7650b5f0a775fa9172", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "ef4cefad-0d6b-47c8-9cb9-039fb64b5457": {"doc_hash": "d6a9ecdead0ca450c57d8e12e759330c3d898abb78064c83144b3038532ec54b", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "5ccf1886-586d-469b-9c5d-0edcc27c58c9": {"doc_hash": "9c2fe9cc57cc9bf5f9bc82eb1b84e210ae00cc3c69a8a7801cfe03de8958e830", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "fb5057d6-151f-45f4-94e3-0b72ee4db0b1": {"doc_hash": "c23ef482206981ec3502af07f886465ee2c9a08989d84a7f46d4bcf2ca8bf23f", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "6876f76e-e347-4f20-ac56-af1923c786a1": {"doc_hash": "79086401a1a120cb2df81faa95cf6497d5ba625db795490e0e86382f804d8ae3", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "d1479bee-44ae-4a44-93f5-f3792b1cd94a": {"doc_hash": "e51ab9174588d00a7bf07d9f658e4ef17da91ce149615531edf4b2ab24a7f277", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "405fb950-67ab-482b-9e74-48979480e5c4": {"doc_hash": "45d403fca5ad4e471cfc803b831f9bc5eddd6404dc43d19d1cb5d2394953308e", "ref_doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}, "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a": {"doc_hash": "4408c3ea2736d04b9f0157e0f8cf08b07b0e5f390769dde4871d48b12a99e6f0"}, "8d404377-1b77-4704-b523-3dcbd4c8b233": {"doc_hash": "562a33ef462b973382b86da2c3b9afa107d234a40a3d9ef53c1d566c73a3955a", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "4d66d061-fd5a-497c-ba1e-a14318f7f516": {"doc_hash": "0aea4f762993e9a5a1c5ae51aec093cb9d9852ce941baef776bc4904f426018b", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "0120a2e9-c4f5-4f6a-8d8c-56e844c24f0e": {"doc_hash": "b699dfd27cdc502561eaa3a841173f9e5357e1af0a6a82e4b08ce8205eaff1a4", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "71b50d05-a9dd-4398-b6af-ea4c37803aef": {"doc_hash": "cd1dee0bdfeb4c43bcf359369a42f75bfa334e14141515335cb30c506360aa53", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "60b16a6e-e240-4685-8033-5110a9e2662e": {"doc_hash": "a52a10bda3ba98a08d7816270359e84c330ca31e90a3fdcf26426fcebd44a625", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "5293cdfc-2093-4688-848c-c294e9d766ea": {"doc_hash": "07e6bf2415889dfeb6ec3f0ced3aed22d366912b4168f3708a208423ed0c64ae", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "c71e7e12-cedf-4542-b14b-231a8ddcb334": {"doc_hash": "93f85d829f378896e743a0dfdc28bd4ece3a65ef67bf7e450e253aa4a9b7a68f", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "c575058c-205e-4995-955e-14e1968bfa57": {"doc_hash": "8336f2d91ebe482aca5dfd71ca672c566aff1d6f3bd85288efa7c6ca4b5e854b", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "d72190e5-f2aa-44a6-b790-d25e61ac052d": {"doc_hash": "ae01cb59e21d08bab10876ac87e1f023155149bbbeb3bd06be76842f326773a3", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "b4288da3-3532-4958-8cbb-5f314e568859": {"doc_hash": "3bae29179ac14484b7b4b74c716b207d61c59529b3d1632390f7dce7f2074c6b", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "d1691c76-81d3-42d2-8b4b-13216c91266d": {"doc_hash": "bdf08961c8ec71eac50612989ba2a674b2347b63bbc96137fffd868c6aff9bd4", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "81ec9bf4-9a1f-4c66-ab51-9c83014d037b": {"doc_hash": "ac6acf763f4f39eedc025fa21ba2d3c555c1aed2df8672105d501c2ffeb5e1c3", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "480985cf-845c-4498-9784-3795b988ffbe": {"doc_hash": "9ae27bf91081f5b8bc5fc437e7d28b1227e30cd2c6581185eafc067b825bc7ff", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "8c831ae1-636c-4638-a199-e71f19d1a116": {"doc_hash": "1ec582358184bed81eedaa8881024f5f857849129c66c11419a8af1495c7f542", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "b3304b34-b04b-4c3d-bef5-a595f990cd6a": {"doc_hash": "0ab28035efc3eab1f49937d0f78b77408b09a199c55174a1dcb4986250290292", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "35050b70-c5a7-48cf-b9e2-650bd0ae7363": {"doc_hash": "28526ac118cf0c9f62bca70f5ee4a78abb2d67025506741d9f475114d83beba3", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "c4ed859d-65f6-4952-9136-e2168eaa364b": {"doc_hash": "0257a5fb9bf94d42110711f37ffe5d53aee71921ff4fa1413607ac0efb21e59a", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "3ee50f81-fa6a-4edb-847c-6ca85593d6a1": {"doc_hash": "c5ed17e38d5d3aa121d4fcd4721cf1d2c2fc13774516a80ff454d7fa54f970a1", "ref_doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}, "502b9490-cdda-420f-a8bb-6e31ce16b38f": {"doc_hash": "886830f640f7bcbf3dad0d623bcd9b2eca67d9ffd0d259d5ec6d58478f16a3c0"}, "280c0e76-41c0-4264-8a9c-9da2abc3c6ec": {"doc_hash": "44c633a033b7b07f52b20d8ae9a8ff8138e76cfe92211fd0b89aeed37d904169", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "ca6cb905-f47c-401a-bf43-e3a31a4f55da": {"doc_hash": "ebcd4c2681c6325acee93ca62294187c4eff023b761b1c7499edbba2a17ec790", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "90d1ef37-a2f9-4e2d-ae8d-9e949b3099ef": {"doc_hash": "57f9e2bbfb139c0ea695eb7908399eae7b7a8c740df653903cf16c6ab1fbb322", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "d64e91df-5c26-4967-b652-9ae074915b33": {"doc_hash": "3320e932b0e9fe4cb116d0604b294e232a50e12deff99bcf81b904713872081d", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "6b49d114-f4f4-485d-b910-70d6d6180da0": {"doc_hash": "87032d558930ca6e89e8e2dbb7c5cb884b7fe4f5d2146d0c3f750938197a3746", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "44a95309-3132-4d05-80d1-c46a5678b3dc": {"doc_hash": "2cba5a4a776ca48238eca3669733a2384bf6df4e3e736cf28eae2f9773a089e8", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "1fef1573-f066-4242-a6eb-2564da31ff53": {"doc_hash": "ce5c25e2349a0efa0196194b6e6dc82d44e7a0edf3eeba10375206e660042f83", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "ad7f3325-40a7-4edc-849c-1cf0a687bd08": {"doc_hash": "9699a6a598f96ab093c310648ca863a620bfeb32177118689b5451ffa0f1d03b", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "87a116ae-c397-4230-8e39-fae765e6d4dd": {"doc_hash": "b9f0c4f8e8077386c877d98ea276d1bf5cbba0a2066e12f7e83558f0fd2a2827", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "d343ff63-7653-4429-a4f9-d48a41df1b27": {"doc_hash": "b0e13b58a1b8d468669389534b6741b56c7c8ee6ed7b844ddb770c90c640aaca", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "8390024f-9a10-4c45-8477-8f43e6cc772d": {"doc_hash": "073a17614bc20e3d0ad5b18da82547fdc2674b15b177e11363f5c799c0240e37", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "a172593c-f4f9-4d7b-b0ab-e683c8f21c70": {"doc_hash": "d3c913b33b90c6da152d852667db028fd951ef31371474b91eec78bf80ab006c", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "2a580198-957b-4937-9cbc-9c634ba3c008": {"doc_hash": "96eb95d71c74a4c23faa3df6baf72e1873627267a04edc4bcb64ab59bc64d723", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "e138bd74-d5de-4d81-9ef5-5c4c15f03829": {"doc_hash": "c1d0f567440f86c4ae9bbf2e7ec431e63365842abbccbc537ad3cfc5b4e01744", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "7d06288f-71e6-4cb6-a44f-6c4a982fc775": {"doc_hash": "a5b4b7994e63632686e815edc5300dc227d5506a4bb9681a2bb059941457611f", "ref_doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}, "4611b91d-64b2-439e-af0e-f2cc8face9e5": {"doc_hash": "855afab4f70cc3bf7f0b8ef9509c83093546b444f828a12ed87f8c5875e80c9d"}, "87cdb9f9-6443-4de6-805e-60fa79892b8c": {"doc_hash": "de766231e5d2f472534f8fbfaa2651a906da18b43f7faaa45ab1cbf35838b009", "ref_doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "5b089c73-d94f-4170-9d23-00175b148dff": {"doc_hash": "dc7e2ed9ba5e642ef0706bc01de70fd8e2e5748ce68ed9191324aaafc87d058c", "ref_doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "2bedf45a-a532-4f34-af89-5e54ebbb3360": {"doc_hash": "b24ff48429e1563cc2602d2fe0953863932bc418c559fbf457d1d4b146a0ab90", "ref_doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "c4a882e3-5baf-45de-a850-58acb66aaf09": {"doc_hash": "a511034d0ce65a6b4234914925c60d3943452618f2665152447bf6810a0c280c", "ref_doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "efa844fa-c6b3-49df-bf77-56953f9df462": {"doc_hash": "376b6cf67d92c8672c1f17409e23995a3c63c9548f654bee1eebf167e67ca63a", "ref_doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "79183a94-0bfd-4e26-b2ac-01b4844777d6": {"doc_hash": "ac67a01513aa6b04a79587473a54bba3daa5d6173c8d596b09ca81a9b200de2d", "ref_doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "b90b3dfd-a42f-4419-b97f-f89f1c08ab54": {"doc_hash": "acec8e64c5703579df84193925f644273222c43a052b52a6cfd1b3436a2f903d", "ref_doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}, "d6c01188-7f8d-4980-8314-4ed1d637bb69": {"doc_hash": "c44a222b03b0a13cabbeb2d2c2afb58d8c4f9bdf94ae578bf28b53470b01b3b1"}, "4e3e7b84-0d91-4cf7-b805-b232c8b649ba": {"doc_hash": "8f32526d1a72129d8e73c550f89378cae51b0e5a9b9c4f8f51ef0de510332d7a", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "81d50026-2523-41c6-9b77-902190f43f7b": {"doc_hash": "f8d24a0ac6b5d2a132d606c2b93a75d34a27083208e69ac1d3977f8d4cb53cf4", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "05dec978-9706-4716-ac11-f33bae44ea0b": {"doc_hash": "a0d7fe3c315da66f649ce70aea6a59f499f144c6f2048bde3f9d672167b1c93c", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "713a8421-fb21-41ba-ab14-183e576edcf8": {"doc_hash": "00b8ff37c5994e35d93e3b9bd6cb1247726c7af7b0789c272e7d66ba17ffccac", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "fe545f00-c6d3-4531-9c21-45cdddb63c6b": {"doc_hash": "49b0892f056934945aaff9507d51a474952a9ed4824b2c8fd10c4a01ddad8be2", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "fb3649b3-a0a1-4bf8-a6fb-31d6cb3e4f3a": {"doc_hash": "0a830bf94b1a7d73a7d1ad6cd2f10170e377814c2d2cd4f8ba4feff066a88da3", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "9dead0bc-0207-435a-ae20-ce09bcfe8f58": {"doc_hash": "96a84d390c70ad522a7948b71a522abf3b8de6685f05f35bb69f3fd33193444b", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "c7c5137c-0629-4b93-86d0-e670c9f67a27": {"doc_hash": "b2b10c78b48acd400fa4c09ce7802cdddeb43b03fb46cbc9a1bba6d10f897b2e", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "8757f6b1-ae55-499f-b25f-de05ab6dda08": {"doc_hash": "5fdde89194f989c4e29c79fdb2972ac45a6e7398e2268617e58391cafe5517fc", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "f40f7e2e-0b7f-4b3e-a2b9-23ed6bc639b7": {"doc_hash": "d09e6e27360177622b8e3e0f80c31f219bf20082d76746e23d3504e4051a47a9", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "d1a21348-e334-4cfd-bec4-dd62abb6f17e": {"doc_hash": "0737112ef83730ad8aac8e07487d73fbcb70c1e088eeb2c1560daa6467f6afcb", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "e04b7813-1ac3-41bd-9d76-1989880984cd": {"doc_hash": "e22d8bd28c049277f91f9c276f73962246678d0a3908c66ff2ffa6a5402da309", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "4d438801-b2bf-411f-977d-f82dd9f153ee": {"doc_hash": "30d893e981f757373995323cef7c2c3136ad8d75a84a76946ba5e3939ba81528", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "d906a6e3-7a82-4967-b953-b0fdc66a6e47": {"doc_hash": "4b64dc5da6e65af5d141e6cc2d1e3ed4eb02f3b7f15f019d40e026bf60f0168e", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "9b99d183-9a8b-43db-b957-6e4913e35169": {"doc_hash": "17c5ab16c85d573e0a46ce72a854fdee537ff4d3a42f9fa170d1c365cff78f3f", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "329fa215-36f6-4ca9-9ab5-f4cbbc2dd9b4": {"doc_hash": "28d4b7f05a697ba96255c1bb7a8f8be975dd6350ec81a7c2ec7441c168a43bfa", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "bc7ed399-c799-4a22-a1b6-e1f003dd5610": {"doc_hash": "910978dee79dec751575b489260c17c1d0ede680f0bb711c0c8412a983623ba7", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "67b55cd7-f8e1-469b-ad4b-03fa99f217a6": {"doc_hash": "16017dbc6d6fd1f26f1ff7e6d29741dd465409b4f81cd430a2facedd47d45548", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "418bdbeb-1337-428f-9947-64b09fbb11d2": {"doc_hash": "f40c5a56a2d07a4f84de0c2eb574efa0a68207a9e07f71554cde4b02ba647474", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "f3fd52ab-6701-4e46-bc50-334d434e5506": {"doc_hash": "25a0f90bf4e679e653dede701ac50c384e478fa9450de48ecdc9b98a75eba4b9", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "9b6eccff-e7af-41e1-9e66-b386cde7c1c0": {"doc_hash": "056125f791a2b974fedb50b690018838496f51f52be2e2d93de9de3f9e960cdc", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "19e66bab-9c92-4328-9ef0-c968ba87545d": {"doc_hash": "082fbed411c4e004222c0790103ae180651c07e033c1384215ac3e44b0a2d5c7", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "ab51dd03-4549-42e0-8ce6-c7bec4f90dea": {"doc_hash": "1073f27d6742f8686db30b8c3eac613477120f4adfcf1cdc615a9cf9ff2e5568", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "a3543077-dc63-462e-bdde-45a63f52b730": {"doc_hash": "cf62113c691ed50a9697f541b127420173b0ea77ac8a451ebf71119fb1004e07", "ref_doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}, "c15b2c9d-6a7a-4146-813f-f7a124131ae9": {"doc_hash": "492343c9973b4cf9731aab0b57526cc42fa75a84a91269dd05bf3f807f9e5cb3"}, "e53f0119-da24-4204-88c5-936fab297322": {"doc_hash": "5ef346c5b111f5000e916192b9264f33f0945eccf592917e831227a702503f48", "ref_doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "4f2cb7ba-803b-414c-8fad-e09bf904bef8": {"doc_hash": "0e944ca4d47335f4a1c8385114817b4a39ece8f1824387d1bede70a6ffd3db57", "ref_doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "bd03b071-a4f2-47be-8f28-d03f6308a455": {"doc_hash": "641b7e9ebc8166af7d8fd692300635c8c6ca6d1d68f1d535202188ec0775d910", "ref_doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "65cd9328-4671-4d36-8c75-e84b8a97fced": {"doc_hash": "df764cc070aec6ef62bebed8b9806ce755ad5fcd10a5e8e17f551b2aa3646dfd", "ref_doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "cfb22927-a751-4cd7-bdd6-cfd0ba9ab7ae": {"doc_hash": "3845ce808065ded1c03174f8beed88ef38c38784c36d362e659176463c81c5b8", "ref_doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "0200d07e-ac4a-4836-a687-85bceb36acac": {"doc_hash": "5dfca20b68183342611cfe9069787660c0ede5c2de44b128fbb26ac543b56cdd", "ref_doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "216c6559-336b-4dad-9799-4b97091755cc": {"doc_hash": "efcdae973ba8907037a88970407c1e90b1498aa58ff83d9415b67c050376cf98", "ref_doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "22c2f1c7-5c1e-488c-8bac-d5aa917d73ad": {"doc_hash": "e56eb18ba0a93758a9a0eb56a902328dd550d45670a3e073ba7e233fb94e824a", "ref_doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}, "05b0d101-74b5-47fc-9c9e-9f2badf69460": {"doc_hash": "74d4e276c5a0df0efb6151fd6cde663f294b70f6efc69505b0b6565dff909170"}, "5cb2ca77-8c68-4eca-ba7b-09fd6f940847": {"doc_hash": "f37706b970bedeee6b4225daea7500c8fca15fc4a41053ba3971a4f9e6872240", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "c570b9fd-00b6-44cc-9eb6-3e013d8cdd0a": {"doc_hash": "0f4e5132065c998224653a1d34bc57cae145933ac2b2dd5fba6bbdb1ecc01f0b", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "a5d51abe-ea19-4749-aac1-0b15fde47d8c": {"doc_hash": "efc708c64b315bcbf4c9bdf59bfe550ff1fd622271fea106caa830466c23be9f", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "8035ab1f-a41e-4fe9-bf09-ec5ca904acef": {"doc_hash": "df556fe1797ff33507c1547629aacd380d6bf4bae61cbb066ff7bee560450556", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "a23ebbe3-906f-4680-b1f3-a8fb40303f61": {"doc_hash": "ff2acf7fc74dfe85dcb9771f86b4e1250a372234e1e530fed053afa71b4827c8", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "27461456-384c-47b7-b8c8-98d570467a6d": {"doc_hash": "012e647de435bb3f13844aee3aebc169fdd956caf396095c32bc44ad557e1b50", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "aee00e79-c56b-4bd1-8a78-2057cc30c0e8": {"doc_hash": "7fd8e5569856b39e7d6eb7230c6256310d67a5ea1d1ebd115ade27f81046129a", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "724f31c2-5a6e-477f-a1ea-1e3edaeb4b4a": {"doc_hash": "3a0b8b7aaee2895f9384b00f022727b352e8ffcb31eb694184be11affd78ab21", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "892abaa6-8499-4327-bb96-06284025b901": {"doc_hash": "df30e3153197a6884286473b00a7ba8288beab4dd5e786e192774f947dd29c0c", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "04b9e023-54a9-48bd-b155-eb593f297bdd": {"doc_hash": "2b0ec05aee5469185e1fd6e0ca5ccb786124bce1368f9b6acc3f787556b67127", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "20cb6038-10f9-4d16-b107-1cd06e1e0e6a": {"doc_hash": "9ddd767af19477adf8a031f6827e2ae4495827219c06425dc3a8c2a0ca6f481b", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "33b4d705-5b0e-44ba-9e0d-a823990bf169": {"doc_hash": "80ee31de8b8e329accfd865f893be3da3040a98a3521700a6dca797a872b96aa", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "c887158b-3381-4c4b-acfc-233bf64aebaf": {"doc_hash": "b2c80f86e741f5aaa3c64b0b616bdc8849fbbf3681e72dd9d7d19dda0417c2b1", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "180e4ce0-e01b-4b8f-bfaf-14189430a48f": {"doc_hash": "564473797358b6e98f97225f52f0c6b14358a30e459f4429415d24f07b21b50c", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "cae614fa-03f8-4886-b62d-3b8e05d62d75": {"doc_hash": "57baa1ba9f98a8dfc99ad8fa7730398757622a403adb9d69345d6479839ead10", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "39cc9373-6da8-4f5a-95c4-4e81f0f83b35": {"doc_hash": "8e3355355baff555e513426d914a9000b73def3295a00bd37d3f2b306fddc16c", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "50f9afff-32fd-4345-a9e5-fb54e7ec2c63": {"doc_hash": "28a72341e8770a6f026a95a5a2079c5d4808426ef75cf76208f58569a92a59c3", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "f8f8b6e1-b323-41fd-85ba-6a4b6e29e8c1": {"doc_hash": "da7f25f0522425390ccf3a0fe630142f359cb11210de1ab84c21b4d3475d5a2a", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "7160204a-9bae-4def-be19-1aaa04593075": {"doc_hash": "58b311db4267c193f6fa55b9203f8116944bb205e003bc9be29afa0bd0d789d5", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "c030132a-f9b1-4ad7-a328-18b6530adb71": {"doc_hash": "f4f3b91cec7c46862fa6fd29de17303c0db5479c4fe64bde0a86b6d9d170408f", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "04023cc9-dc58-42e3-b4e5-535bcabfb7a5": {"doc_hash": "715b5dfae804c34d4d3b4b900fd8ce6e111af8424e09c6a0e50c27932514d68d", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "968e9f84-ce3e-43c7-9e73-52ae72a4f8bb": {"doc_hash": "a8488dff08195275bac7c51bf0437b35f1f5c944c810140dc43fb59101684d2b", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "1cbea5fc-1a4e-42d4-9d8f-c0f5ad4a4885": {"doc_hash": "7eabbe1ac34f2d8fc463cf59421f5f7e237867d33dbd16fbb8cfda9dd5fc25dd", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "2d5ff229-5b86-4a90-b589-649b7320c30a": {"doc_hash": "45d93388c570edc6d8d34cef67649b180b5173b54d4a39ea5602c0e97a8f1e11", "ref_doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}, "9917c9ce-5007-41c0-a3da-0c22199145ca": {"doc_hash": "7078d3307fcf21e72fb7acf53b6a30b53ddaf883a8df5f9f61fe4330dccf8f66"}, "961c0993-1414-4237-9fcd-5e18abbc1f27": {"doc_hash": "6e1104de9cb6168fdb98653d6e3070113d3d8f134d4ce2d69bf094868dd706bb", "ref_doc_id": "a2935351-6da3-4318-a839-4ee3ea5fc91d"}, "a2935351-6da3-4318-a839-4ee3ea5fc91d": {"doc_hash": "beeeb201d4c460874c61cf9bb322ce5033e518cb809f30eb8ea7ba3a1ecdeff6"}, "5020b73f-8873-4bc9-a860-984ff814f4ea": {"doc_hash": "171bccf26b353dcd675eb0c1d3948607f86cf0cc3972bc5bc9977d32992cf90d", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "8e2e6e89-ded8-4515-9f9c-53a543c290d3": {"doc_hash": "6bc4ffbfc3180d48abf2d582e29d5434fc34e9104db783f7f567aaf94eec65d1", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "a3e6ae4f-aa90-49a5-9bf0-9721d367ab6d": {"doc_hash": "4931308f32678b311ee8ab917a4f022f70fb5ac4b7efb85ed5c2e973c89a40ed", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "e5f227b2-6b9f-4596-bd0e-9efb449a11f1": {"doc_hash": "32e0b95cc8b7365a5feb36772e44f0d04450d852250a8eef1b0ccade6d2708cd", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "8648d275-f562-4f15-8b2f-98dbc599a3eb": {"doc_hash": "3f7d92ed1318202fbf9fef807915e80e5bce455b38ca078f5859b9d012f2e3ae", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "9cc69d8d-10c3-4775-a835-b59bc19029c3": {"doc_hash": "b8ca607de6618148d9f7e4d81d499b8ecfe1fa43fafbe70b279359f5677b69d7", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "2eee2bd9-d3c6-42b6-a5ba-161c3140627e": {"doc_hash": "d02c83cd7bd3ba32e8b788615a46b394170784591fbdd5cb26bebb19b4a165a9", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "c676c70a-da45-43e0-bd7b-5cdd29aaddac": {"doc_hash": "996143074f7723abb71f2138cdecb5a7243effd6e0e8f950e72d0cbc6119781e", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "323d4d8a-4832-4fba-a5f6-fbc36be4955f": {"doc_hash": "0e758ef37a324a08a6c6a2f2ea11271b8d3f09f20e7a55cdf900edc6d3a62d84", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "627f64b5-cc0a-44f2-878d-1f6b1b555992": {"doc_hash": "7d8eb1db48c0263b43bbea6b7400ad96874bf174e266c567ca7cd292c496a0a7", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "2c18f16c-acca-4b17-af67-b8012d776564": {"doc_hash": "578932a44c38de1d5de0aea630d8ac8319f70938314b20fe882254edd8f4b5ff", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "4806f4d4-e0a6-42fe-bab5-a09a31869025": {"doc_hash": "18b41d448637a63a5417658120a41c979cbef78652c2b2942c3b68c53e8c56f4", "ref_doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}, "3239c021-9a3d-4f87-97b2-25fd74e9946d": {"doc_hash": "720644f758b8bf4d11ba341c38db11fd80fca49b1d68c9d3f04011701e556a7d"}, "1dcaf295-e021-4a46-a0b2-b702b52a6625": {"doc_hash": "08971e8286ca2c89dfdf94e96dcab00a0952064ae831280b46e77daaa5c61938", "ref_doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "6c2e21a2-b490-4b89-bb56-136d64d5176b": {"doc_hash": "cc1f5865c5ee736039a76889e75ff9a4219c68d9bc18f368f8a7f7e3cafcfbc4", "ref_doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "419073dd-6053-457f-883a-053dd428f9b1": {"doc_hash": "dbe0188ad4a10fe88fd8eacccd21b0ad9ad0bee4f5d20f424e8d2054a0928f17", "ref_doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "f3d8f307-1cf9-473e-8720-8f1edb18be2d": {"doc_hash": "27dee72b94c18ccda025c57038b293569cb0f2e534f9097158cbc2a5ed107dfc", "ref_doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "6c34ca18-ab01-4b0b-bef7-c148cf014e89": {"doc_hash": "9da867d47798ef725a7821d78606a518dac4264a25d8501e00d12905906c1a10", "ref_doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "b7aa2bd3-f6ff-4969-a34b-b9b2e6a66431": {"doc_hash": "b8e33cb242afc0bf324dbe4bbe2ffbbd779f9a2cb2556c61fee45123b6bcb840", "ref_doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "163dc7ca-a294-44fb-9218-c6ed5185d210": {"doc_hash": "57d6cbe58cd78370025349ac5e1fa7c023e9600f1c83c6869e66312b18df58db", "ref_doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "ce3ebbf7-81a2-47f4-ae0d-f5862aa6836e": {"doc_hash": "e9118e8a7c940fac9b4e1f4a0e3556ee52076c8e6b397cd0cdd21cecd00d7b35", "ref_doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "2b2ffcc6-21f2-472a-938b-b1df7e9515a0": {"doc_hash": "c56b46c47c668bb19de07df6b9da151a6cd1de896969aca62788311f2707a24d", "ref_doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}, "ae456982-10e2-4b03-bc74-eb8b4ba0750a": {"doc_hash": "4eb5fec7f965efd4b119a6d2f8e21ddc517990bd2fc81c024d61a90b36548c62"}, "028f2cbc-d5a3-4c41-9cd7-ac718eca0b12": {"doc_hash": "3e3c38153796a12fa0a95f3b807a3b89cd7b2d069596db01d0e3ee4996217ed2", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "7d9ec202-c582-4890-b9d4-401a2ad0db07": {"doc_hash": "8d2444ffc2b7d5052ab66978a253658c15483471be30c952865cd8ef647d2083", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "30b0ca3e-2620-4fe1-b097-72c110d705d1": {"doc_hash": "091b791d1a78b55c5bf850ea58f54be697ccc88ac7827810d4e3cb1b10184bc0", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "0a2374ea-14df-444e-b8fc-a813df7bfa17": {"doc_hash": "ce014399d2295a62538abcedfea5d49202aa8024a59b73ff31319cf0ef700ed5", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "70372725-dd90-49e5-ac9c-37f51dff536c": {"doc_hash": "2c24f0f3c729b1fe69b23b2ecb720f80c63c127dc518b2cc0375ba6869c0f712", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "c03e3b07-6ad9-43e6-8e1f-341a64b1b1a9": {"doc_hash": "cf762f965b766980c5d48cbbb7e7f7a8ea5b58f423d04e2c9d4e6523e746d7e6", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "907087b0-4704-4abb-bf94-b06d63fc3627": {"doc_hash": "0e4043e6968130ffab7a959adacdc0546005aa637b350284e51a46190edcedbd", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "17304c45-6861-4e54-9145-85d48955a89a": {"doc_hash": "0abf361bed70d5f2ba4ad4ea885a1da836a696140baf70406d8efbbc74c057e3", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "6b970b7f-58be-4c41-be0a-d7d9b07203f0": {"doc_hash": "b003464e8657744d07be36312c652d0324869c50062afe7a5292af012a3fd255", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "d69726f7-c633-4f58-9ce2-20dabee28f66": {"doc_hash": "c64bc3abc11463707f6283132d4cc46f896df7bb802d79669510f9184387dca8", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "2fd2ca3c-d471-42c6-ba5e-259b29a4768b": {"doc_hash": "d8e28f03b8daebd423614014fa7e1fa07fe5faa9b11a53b4f086909afe899469", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "9389dd14-1645-4a0c-b5b3-61df42c6bf08": {"doc_hash": "7403a1c604c475c28bccf27cf5e193efee4d1b91f6b30ca61dcf84ff02c97f5c", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "f350b3ab-7bc7-440a-9d8e-81046830991c": {"doc_hash": "e4db01873a27005c41a35cb3ae354fe4ef8ab054ab12170db3ddbda91d28af4a", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "be0bce66-2562-4787-9f85-5fd437201f25": {"doc_hash": "a7dc25dd9d1e54a2e780d793b97978f014e7423b3eeb887959bc9fe065f2c2cb", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "0ed5e479-952d-4459-8e88-ecb54e9a8345": {"doc_hash": "e763b45ae6bdb7668ed004a0f90ffade53be9f902a4a11dcb0325b566d3566ff", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "14f74901-ad84-493d-98ef-f6e18569dc84": {"doc_hash": "1dc944efdc3783d9085573746a0f2dc55db15150f582007532ac03682a76f80b", "ref_doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}, "dc918cd6-dee0-4419-98db-4d7543ec8c3e": {"doc_hash": "a8f7382050ba84025beffeba5eaa5906a4cc197e08e2a130d081b48846d3f801"}, "0881a8f4-0cc8-4880-882e-5c5b4acdaaf8": {"doc_hash": "18bb02afde196144b894e5fe3006cbacaf488bbc4126cd8fc536922ee9a7eac3", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "de36e662-d776-4bd7-8dc0-835d4c72d550": {"doc_hash": "8879531b46d5a3c25262c4d7400b7205d3ccc752eddb44a657c5f68a711f3cc1", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "30250a1b-e5eb-43e8-ba8c-12d181b2de8b": {"doc_hash": "a6f5cdc9ff078b32e590699faa877f298b966bf70bdbadab78198c58b8a11e23", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "7c1e72df-7ff1-4e73-987a-8c8706c5066a": {"doc_hash": "442f468a2adf4ae8131caffcb2ed2f179d6fae84c957ce723258ac2b16710635", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "3eb503e4-29e8-4cde-bfcd-3bfbf280aafc": {"doc_hash": "659fa7abc74ab26465769fd3b2468ac72f923559b7370e4b6d83206727689842", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "36121d44-18fc-4594-a21a-90e168f5082f": {"doc_hash": "3fdd2efd79ec275240da72570d4a3ed6ffc62e62a54341c5865c18fe3baa1075", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "89120f0b-a7fc-4534-819b-3028f03632d4": {"doc_hash": "34f36d1f46c6dca05f0ce515c78a2a72a40264cac7023dc6dc04ac59cb88692b", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "9acb9a18-b522-4923-a80f-b5e39002b6ef": {"doc_hash": "5071fb6fc29870ef113960de6b89c7a6bde7b23d4d2dc2a2eb39aa02cad265e4", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "6801aac7-95ab-4b23-ae71-5ba8e456b7a2": {"doc_hash": "6ed750fe13985947ecd987fb76903957f37ac8544c40dfda0d45a669f712d763", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "b5ebb767-9e90-4877-b891-cfa65ae8ac8d": {"doc_hash": "e99e10ff030674dd44f22f5fe61175e55dd4622c420c4079f11427b5403cf837", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "ee27b20c-0d1c-4eed-8b0a-ec42beb60e28": {"doc_hash": "378b5f12f6b8d61890d7f0e5ca36197b1545e098c103ffa7590965c65b37d48e", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "ec814f94-6d0a-4f4b-b5ca-b781d48d0fa3": {"doc_hash": "9f511815868dbfdcbfb8e963ae16169fe4903396695a255e6476d9fdf296fd2b", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "a733a156-c4e7-4dbd-b8f7-f1daa37b4fb9": {"doc_hash": "870dd6bb80f1432888226877ad1689c7529d41bc59cce4995fce2ad94dff91d8", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "9411a935-9ae7-4828-8dde-6bd65f725c38": {"doc_hash": "04acb7df4311c8fbfa241510dd155ac2ed9487f5b00d5a6742d542b89f35a82e", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "2da03df3-b5e4-461e-bb72-d20938ceed7c": {"doc_hash": "c59e40550900e2fc22f4ff52e6a9447237fb1d27f226e73d1425e2e6a19f804e", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "de777270-1445-4579-a17a-882d7f4653f2": {"doc_hash": "5699cdb5fc5a52dd47543f6efaae03cbbd5274f367cd560f7a8d926a9fec1522", "ref_doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}, "20a359f2-e80e-47aa-8cb4-56bba4e6cef4": {"doc_hash": "09ea608da5dfb2c3fd42c714427ede8b912722b2f3a3e872928d62ee633450ff"}}, "docstore/ref_doc_info": {"29dc06d4-2164-4129-868f-4a613daa06dc": {"node_ids": ["6a631852-fb8e-4ca6-8cb0-1e3b7b881be0", "5494819d-a99c-4902-ac0a-ae3353796805"], "metadata": {"window": "Slavery\nHow did the Abolition Acts of 1807 \nand 1833 affect the slave trade?\n Key Stages 3-4 | Empire and Industry 1750-1850\nLesson pack\n", "original_text": "Slavery\nHow did the Abolition Acts of 1807 \nand 1833 affect the slave trade?\n", "page_label": "1", "file_name": "slavery.pdf", "doc_id": "29dc06d4-2164-4129-868f-4a613daa06dc"}}, "2f562c8e-aa95-4016-aa53-6e4bd04073a3": {"node_ids": ["c2c51f1a-3c4c-4f7c-b814-4da4ef71765b", "24a22607-3347-48a6-ba9e-d72156f02a9b", "83143d31-b3ca-4cbc-bfc9-1dab636c966a", "68a75094-0a21-47c5-b93e-c35a8d18d947", "d0f5d94a-a64e-4cd1-b52d-9fb0f2113a21", "b02533b8-c391-4c12-b275-64526272c0bf", "d028ff1f-c35d-46cc-bd7f-0ea3a655e513", "83509f26-a88a-45a3-b0cd-4db3cdca12ae", "45e2c9d6-f52d-456d-b335-2ff8a3efc624", "f4dde1b9-a171-4ba5-84f9-f033722675e0", "f6e1d1a5-cf15-41ab-9d85-c1884305d548", "1564a509-3858-4618-8b3e-f251f2d7eb84", "866a4b6f-aee8-47d9-be5d-feaa3acad45b", "5250640b-2a90-4a3f-beae-e9c425b2e409"], "metadata": {"window": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n Images from copyright holders other than the National Archives may not be reproduced for any purposes without the \npermission of the copyright holder. Every reasonable effort has been made to trace copyright but the National Archives \nwelcomes any information that clarifies the copyright ownership of any unattributed material displayed.Key stage 3:\nIdeas, political \npower, industry \nand empire: Britain, \n1745-1901Britain\u2019s \ntransatlantic slave \ntrade: its effects and \nits eventual abolition\nKey stage 4:\nAQA GCSE History: \nBritain: Migration, \nempires and the \npeople: c790 to the \npresent day\nOCR GCSE History: \nPolitical and social \nimpact of empire on \nBritain 1688\u2013c.1730KS 3 - 4\nEmpire and Industry \n1750-1850\nConnections to the \nCurriculum:Suitable for:\nTime period:As soon as Europeans began to settle in America, in the early \n16th century, they imported enslaved Africans to work for them. \n As European settlement grew, so did the demand for enslaved \npeople. ", "original_text": "This resource was produced using documents from the collections of The National Archives and other copyright holders. \n", "page_label": "2", "file_name": "slavery.pdf", "doc_id": "2f562c8e-aa95-4016-aa53-6e4bd04073a3"}}, "cd4d3243-a6ae-445a-b0fd-7f8b40073b34": {"node_ids": ["f09ad18b-809e-48c1-9594-08c0e7cd94e8", "27006bda-d38e-440b-9b44-51cb0c237139", "b83b8665-b20a-40cd-8635-744eb32f0865", "cb949682-7cf9-433d-a818-d9095bc087fc"], "metadata": {"window": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. However, \nslavery continued in other areas of the British Empire including the territories run by the \nEast India Company, Ceylon (modern day Sri Lanka) and St Helena. Between 1808 and \n1869 the Royal Navy\u2019s West Africa Squadron seized over 1,600 slave ships and freed about \n150,000 Africans but, despite this, it is estimated that a further 1 million people were \nenslaved and transported throughout the 19th century. Use this lesson to explore original \ncourt records from Dominica, a British colony and photographs from HMS Daphne, a British \nnaval ship later used to prevent the transportation of enslaved people.Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "3Introduction\na further act to abolish slavery in the British West Indies, Canada and the Cape of Good \nHope (southern Africa), meaning that it was now illegal to buy or own a person. ", "page_label": "3", "file_name": "slavery.pdf", "doc_id": "cd4d3243-a6ae-445a-b0fd-7f8b40073b34"}}, "7a55c287-d0bf-464b-a5e8-76a17da3deb7": {"node_ids": ["e8aaccc0-ad4a-4d97-a3cc-ede7c776cbe1"], "metadata": {"window": "4Contents\nIntroduction Page 2\nContents Page 4\nTeacher\u2019s notes Page 5\nBackground Page 6\nExternal links Page 8\nTasks Page 9\nSource 1 Page 11\nSource 2a Page 13\nSource 2b Page 14\nSource 2c Page 15Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "4Contents\nIntroduction Page 2\nContents Page 4\nTeacher\u2019s notes Page 5\nBackground Page 6\nExternal links Page 8\nTasks Page 9\nSource 1 Page 11\nSource 2a Page 13\nSource 2b Page 14\nSource 2c Page 15Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "page_label": "4", "file_name": "slavery.pdf", "doc_id": "7a55c287-d0bf-464b-a5e8-76a17da3deb7"}}, "8cecea65-dbdf-4b0f-9abe-801a0a87f675": {"node_ids": ["58e7818c-f650-401b-9c01-7d3905c2407b", "ddec1dd2-5542-4cf6-9516-364a188cb50c", "3d634f4a-6464-4604-b2ce-c9c1644b3d6e", "a07eb1c6-055b-4024-b693-e46624363a24", "7b7b6905-0f25-4a92-8974-653add4ae317", "e1333b08-9d0d-4c3b-a8cd-f51cb20d7314", "4fe7d6bf-eb33-493b-8b7a-23f0c94b5153", "7da8e5a7-784b-4f29-84f7-8d458417c35e", "22465b8a-248a-4772-ad2a-fbd03e55b3bf", "0ecb0ff8-e372-4eaa-8208-e819b5a1714b", "192d43fd-b604-4e93-accc-cc6f5d07cdf9", "6f129632-3f87-44a7-989c-ec9c49d59bc6", "f4706536-f8da-4795-92dc-d4c1071a07cd", "cbaafd8e-06d1-4576-9bc1-d93dad3170b8", "5b642f65-112a-43d4-9b14-335caa53070d"], "metadata": {"window": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n This lesson offers graphic evidence of the cruelty on which enslavement was based. The \nCourt Records from Dominica reveal all kinds of details about the way enslaved African \nsociety worked. Most of all, however, it shows the punishments meted out to enslaved \npeople, in all its brutality. ", "original_text": "5This lesson has a video starter activity based on one of our documents to \u2018hook\u2019 students \ninto the lesson tasks that follow.\n", "page_label": "5", "file_name": "slavery.pdf", "doc_id": "8cecea65-dbdf-4b0f-9abe-801a0a87f675"}}, "bbd5dead-2586-4fd0-a289-d0cfa542d97b": {"node_ids": ["65481478-3f66-4cc5-9784-6b8c54661654", "0026c333-d487-4ad1-82eb-c7465cb926b8", "65f5353c-1f93-436f-95b4-4aa3f60e03fc", "4436eb3c-9c54-4893-8d62-32bb42cb46ef", "dbe20a2a-1fc4-47c8-b82d-8cc0d59ce39e", "8b7b9878-5693-439a-a23e-4cc6d1493350", "95f99dab-63db-4b78-826d-696a8ff66ab9", "bc64b8ee-928f-4d28-876b-fd773677e984", "3abde7ec-f74a-4629-b17d-67475d92da1f", "7fdda8db-5310-487c-8bf5-6fa4fd27794d", "9a94a297-d0f9-4898-9f65-0144aad5c26f", "3bc654c1-d5f3-4b58-8b5a-99a5ac5b7e07", "cadbd380-380b-4f8e-929d-4bb1555aeb54", "ecd2acb0-bb8e-4f4d-9780-e3281c776920", "078d64c7-eccc-4149-9a17-fb2926c65eb9", "69bc62b7-4d5c-452a-9b92-270911d4a0fe"], "metadata": {"window": "6Racism\nEnslavement is both a result and a cause of racism. A belief that certain people were racially \ninferior allowed Europeans to set up the trade in African enslaved people in the 1520s. \n It encouraged whites to believe that the cruelty of the capture of enslaved people, the \ninhuman conditions on the slave-ships and the incredibly harsh treatment the enslaved \nreceived in the Americas were somehow justified. Source 2 is just another example of this. \n", "original_text": "6Racism\nEnslavement is both a result and a cause of racism. ", "page_label": "6", "file_name": "slavery.pdf", "doc_id": "bbd5dead-2586-4fd0-a289-d0cfa542d97b"}}, "3db0326d-94e3-46dd-b8ab-01401bb17d05": {"node_ids": ["28a8185c-f125-4827-b001-61b93cd4bcc4", "f7144879-9b5e-4f29-bbf9-386cb07ef6fa", "c511a92a-648f-4757-a9ad-d7f0323a2184", "1e866be3-ffe5-46cf-b4a3-8ac41f938b69", "b6af877d-2390-4bd8-a6d2-6ed4a772215d", "d0b11037-1945-40ec-8ab3-47921d1fadcb", "7fd8f050-d87e-41cc-9c63-0003e5ee1544", "a77ba583-0f1d-46b2-8ff7-ae17479ce0fd", "300666de-ee99-4e70-879a-f6089faafc46", "fc29303b-07ce-4727-be27-983181f9f61e", "f8cbb712-32b8-4562-bde4-fb725b3d9205", "5d9e999c-18a0-4cb2-9926-50c308eb129b"], "metadata": {"window": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. From the 17th century, gangs of runaways \u2013 called \u2018Maroons\u2019 in Jamaica \u2013 set \nup independent, permanent communities which resisted all efforts of the white owners and \nsoldiers to crush them. Sometimes this broke out into open conflict, such as the Maroon \nWars of 1730-1740 and 1795-6. There were also slave revolts, in Antigua in 1735, Tacky\u2019s \nrevolt in Jamaica in 1760, Kofi\u2019s revolt in Guyana in 1763, in Granada in 1795-7, and so on.\n", "original_text": "7African songs, games, stories and religion helped to maintain the enslaveds\u2019 belief in \nthemselves. ", "page_label": "7", "file_name": "slavery.pdf", "doc_id": "3db0326d-94e3-46dd-b8ab-01401bb17d05"}}, "177942a4-1a57-4e01-9b0e-e8f1d76e64cb": {"node_ids": ["a56e9c7d-5513-45d6-a642-be7af0c2e85c", "6a803b57-49fc-48ca-9393-972328ee4732"], "metadata": {"window": "8Son of the South1\nA useful site with lots of enslavement related images and resources.\n International Slavery Museum2\nInternational slavery museum collections at Liverpool Museum\nOlaudah Equiano3\nThe life of the 18th century writer and abolitionist Olaudah Equiano, with the Equiano \nSociety and Birmingham Museum and Art Gallery\nWhat is modern slavery?4\nWhat is modern slavery today?External links\n1 https://www.sonofthesouth.net/slavery/index.html\n2 https://www.liverpoolmuseums.org.uk/international-slavery-museum\n3 https://equiano.uk/\n4 https://www.antislavery.org/slavery-today/modern-slavery/Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "8Son of the South1\nA useful site with lots of enslavement related images and resources.\n", "page_label": "8", "file_name": "slavery.pdf", "doc_id": "177942a4-1a57-4e01-9b0e-e8f1d76e64cb"}}, "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1": {"node_ids": ["02ca96c4-6d09-4dc8-92cc-b544eedf62f1", "ed46bb94-ddc0-496e-b660-7dc1414efb5a", "2bad9597-31ad-4288-9dce-b385ed1aac1a", "8ded3bcf-f8a8-461b-a4b9-9a85d82797f3", "3b9a25ca-ad51-446a-b03e-3ebd0d40242d", "58185f9d-bf2a-443c-bc76-f5bfe06ec79a", "e2622ce4-abb8-4d42-86d9-966ce0b9ca15", "9949ac58-0bff-4791-bb37-9b42df6977db", "5214c1b3-9682-48b2-a25e-f4d5879a1a65", "9e2d2d43-625d-4106-8d00-c47da6bd20c3", "d6b690e6-46f0-492f-8f4b-3a7a80d07138", "df93033a-8dd3-49f7-b348-763d0b48e612", "5a860cda-b415-4d83-aa50-ae5b9e63b858", "01fe664f-3b2a-46d1-b8bb-7d45779f69f6", "bcdc7243-9dd5-445b-b2b7-358c669c8893", "966263e0-1f7b-4cc1-8815-c3f548f11def", "df0da444-94fc-4ca2-99eb-20c90d355490", "adb544e2-adb7-4b83-a8aa-cefb1f2db533", "100c5e3f-39bf-4e91-8a77-6be51ab4a2a1", "5f79533d-d369-490f-9016-5149f141ebc5", "05c844be-7464-4e7c-913c-5ffbce72216d", "e1e2da1d-700d-405d-8f91-cf85a3d0298c", "77272b59-5423-4d64-9966-838372f1baf0", "2e3ae5c2-1359-477f-8d03-f94011102462", "e2638c82-3b0f-4b13-bb08-7dda091f3742", "490925cf-dc04-479d-9867-e2198bb474a1", "b33fb72e-9070-4eae-a7b0-c567c9f6ea22", "49b8caf2-6a12-493b-ad4c-0f93bcd226dd", "95c6c4a4-fa11-42d8-9f26-8a79039a5c52"], "metadata": {"window": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. Read Source 1. Look at the names on the document.\n \u2022 These enslaved people originated in Africa. ", "original_text": "9History Hook \u2013 Starter Activity\nWatch History Hook: Slavery here.1\n1. ", "page_label": "9", "file_name": "slavery.pdf", "doc_id": "306a6f2a-8db9-4115-8bbc-26c63ebc9ea1"}}, "a1b36aea-2d3b-40a3-b0f7-db85022a4e61": {"node_ids": ["7bd2d852-2912-49ec-a0a2-20b8af746cd7", "ce14dbf8-5e64-4a1c-ab0c-fd33f4c88197", "611a01a0-1846-4956-afa8-1721c7e159c6", "dc6ba06b-d8da-41cc-9bfe-2278eea4e56a", "93c1fbbd-2699-4ae1-9962-68a0659657e4", "8f813959-7893-486a-8d03-714339c68ce4", "f05a433d-ed66-4ed2-833c-2883a8db685a", "28408e6d-fbfd-45e2-bc90-cb420df61123", "6a5bd365-07fd-49c3-bbee-d97f50e051da", "2ab9e166-9379-493f-928b-d89ae364ae9b", "3a4ba3e0-e605-466a-9393-c37ae9f6f854"], "metadata": {"window": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. These \nphotographs were taken about 1868, off the east coast of Africa. They form part of a Report \nfrom John Armstrong Challice, a Lieutenant in the Royal Navy, working to abolish slavery in \nZanzibar. Zanzibar did not abolish slavery until 1897.\n", "original_text": "10Having been the largest slaving nation, Britain became a determined abolitionist \npower after 1833, using the Royal Navy to stop ships suspected of being slavers. ", "page_label": "10", "file_name": "slavery.pdf", "doc_id": "a1b36aea-2d3b-40a3-b0f7-db85022a4e61"}}, "30351e02-9445-431c-938b-2b002ed4735e": {"node_ids": ["58bd1a0c-4caf-4aab-97b9-d69cdaf9170e", "1af5f605-ca46-404d-8dc5-fc1b82de88e6"], "metadata": {"window": "Source 1: Court records from Dominica, a British colony in the \nLeeward Islands, January 1814 . Catalogue Ref: CO 71/51Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 1: Court records from Dominica, a British colony in the \nLeeward Islands, January 1814 . ", "page_label": "11", "file_name": "slavery.pdf", "doc_id": "30351e02-9445-431c-938b-2b002ed4735e"}}, "611b26a5-41ee-46cf-9d5a-b8a84b074f5d": {"node_ids": ["0d9629cf-7213-4062-b3e8-7dbdfc05c1e6", "7d80ba2f-ba44-49e2-97c8-68cea22d2916", "bd2cf428-3bc4-4670-a299-bf780c72bea3", "8b20bc6c-3dfb-4ebc-94c8-25ae7b3267f6"], "metadata": {"window": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. Body hanged on a \nGibbet, 16 Jan[uar]y 1814\n15 & 16 Peter Hillsbro\u2019 \nEstateditto Exiting a Mutiny among \n20 Negroes of the \nEstate & harvesting \nthem with provisions & \nwhile runawayTo be hanged Hanged. Head cut off & put \non a pole. Body hanged on a \nGibbet 18 Jan[uar]y 1814\n16 Hector Mr Lionne ditto Runaway To receive 100 \nlashes & to be \nworked in chains \n6 monthsReceived 100 lashes 16 Jan \n1814 & sold 21st April\nRachel Mr Grano ditto ditto To receive 30 \nlashes & to be \nworked in chains \n3 monthsReceived 30 lashes & \ndelivered to owner 16th April \n1814\n22 Dick & \nDanielHillsbro\u2019 \nEstateditto ditto To receive 100 \nlashesRec[eived] 100 lashes each, & \nreleased to owners att[ention] \n22nd Jan 1814\nSarah ditto ditto ditto To receive 50 \nlashesPardoned & released 30th \nJan[uar]y\nHetty, \nPenny & \nPlacideditto ditto ditto To receive 40 \nlashes eachReceived 40 lashes each \n& returned to owner\u2019s \natt[ention] 22nd Jan[uar]y\n28 Joseph Mr \nDubocqditto supplying Runaways \nwith salt & with \nprovisionsNot guilty Discharged\nPierre Mr Polus \nEstateditto Encouraging the \nNeg[roe]s upon that \nestates who had \nabsconded to stay \nawayTo receive 100 \nlashes & to be \nworked in chains \n6 monthsRec[eived] 100 lashes & died \nin Jail 6 aprilTranscript: Source 1Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "1814\nJan[uar]\ny 15John \nPierreMr Grano 1814\nJan[uar]y 15 John \nPierre Mr Grano \nCo[ur]t MartialAttempting to return \nto the Runaways with \nProvisions & having \nbeen runaway 2 \nMonthsTo be hanged Hanged : Head cut off & put \non a Pole. ", "page_label": "12", "file_name": "slavery.pdf", "doc_id": "611b26a5-41ee-46cf-9d5a-b8a84b074f5d"}}, "dcc276f2-8e13-49fb-b2b8-3af796d95944": {"node_ids": ["e3c390e3-85d3-4c69-9c96-066b77f5a79a", "332a3a26-4225-4fc5-a916-757c9d09546c"], "metadata": {"window": "Source 2a: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 2a: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "page_label": "13", "file_name": "slavery.pdf", "doc_id": "dcc276f2-8e13-49fb-b2b8-3af796d95944"}}, "48f148f1-e6de-4ba3-b63f-9a51f934fa53": {"node_ids": ["e42821bf-4fee-435b-a441-6e711f93afa8", "fba66f0c-582c-4727-a940-6fe6b399d0e8"], "metadata": {"window": "Source 2b: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 2b: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "page_label": "14", "file_name": "slavery.pdf", "doc_id": "48f148f1-e6de-4ba3-b63f-9a51f934fa53"}}, "d8135eba-3ae8-414d-b04b-af55d8891a72": {"node_ids": ["0cb107c3-ba56-4017-bc47-5a0b3b692df2", "3b079652-a22e-4cea-aa9a-5405b1f81807"], "metadata": {"window": "Source 2c: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . Catalogue Ref: FO 84/1310Slavery How did the Abolition Acts of 1807 and 1833 affect the slave trade?", "original_text": "Source 2c: East African enslaved people released from a dhow by \nHMS Daphne, 1 November 1868 . ", "page_label": "15", "file_name": "slavery.pdf", "doc_id": "d8135eba-3ae8-414d-b04b-af55d8891a72"}}, "b0199728-e735-498f-806f-7bd8330355e0": {"node_ids": ["ffada7bd-ed77-47e1-b51b-b578bcbabf71", "e2f56072-fc39-4e1a-bee3-73eede268aa6", "9d56e7de-e17b-4ada-a431-edb219071f49", "43a19927-4a33-4a89-83fd-ad58d585938e", "200e4c3e-0cfb-43a0-809f-1ce8197f0fec", "4e9eb35d-1e39-4c53-839f-52bec0f97536", "979b9255-62a1-439e-98c6-433a4c37af0e", "b7b4ff76-7b67-4fb9-8dca-dbd2ecf26c4d", "e209f9bf-dda9-43e3-8c64-38517c43c14f", "68602cb0-6f9d-4eec-b4dc-af904ddf9455", "9203e64d-436e-40d3-864d-bc7a6970b421"], "metadata": {"window": "Why do our hyperlinks come with footnotes?\n Our resources are designed to be printed and used in classrooms, which means hyperlinks \naren\u2019t always accessible digitally. We include the full link at the bottom of the page so that \nyou can type in the address without distracting from the main text of the lesson materials.\n Did you know? \n", "original_text": "Why do our hyperlinks come with footnotes?\n", "page_label": "16", "file_name": "slavery.pdf", "doc_id": "b0199728-e735-498f-806f-7bd8330355e0"}}, "f6041522-e8d0-4707-9e2e-ce505314b1b8": {"node_ids": ["a39ac088-9722-442e-9d9b-c0e55fc17801"], "metadata": {"window": " \n \n \n \n \n \n Anti-Money Laundering / \nCounter Financing of Terrorism \nPolicy \n(AML / CFT POLICY) \n \n \n \n \n \n \n \n \n \n \nRevised: January 2023 \n \nAPPROVED BY 416TH BOD MEETING DATED 4TH JAN 2023 \n \n \n \n", "original_text": " \n \n \n \n \n \n Anti-Money Laundering / \nCounter Financing of Terrorism \nPolicy \n(AML / CFT POLICY) \n \n \n \n \n \n \n \n \n \n \nRevised: January 2023 \n \nAPPROVED BY 416TH BOD MEETING DATED 4TH JAN 2023 \n \n \n \n", "page_label": "1", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "f6041522-e8d0-4707-9e2e-ce505314b1b8"}}, "ec393c1b-18d0-4461-9c32-b75b3d9ea676": {"node_ids": ["eca70f18-6c77-4e89-a476-fd5a9e713826"], "metadata": {"window": "i Contents \n \nVERSION CONTROL iii \nABBREVIATIONS iv \nCHAPTER 1: INTRODUCTION 1 \n1.1 Background 1 \n1.2 Definitions of key terms 1 \n1.2.1 Money Laundering 1 \n1.2.2 Financing of Terrorism 2 \n1.2.3 Proliferation Financing 2 \n1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) 2 \n1.2.5 Trade based money laundering 2 \n1.2.6 Customers 2 \n1.2.7 Shell bank and shell entity 2 \n1.2.8 Beneficial owner 3 \n1.2.9 Tipping Off 3 \n1.3 Objective 3 \n1.4 Governance Structure 3 \n1.4.1 Board of Dire ctors 3 \n1.4.2 Senior management 4 \n1.4.3 AML/CFT Unit 4 \n1.4.4 Asset (Mo ney) Laundering Prevention Committee 4 \n1.4.5 AML/CFT Committee 4 \n1.4.6 Three -line-of-defense 5 \nCHAPTER 2: CUSTOMER IDENTIFICATION AND DUE DILIGENCE 8 \n2.1 Know Your Customer 8 \n2.2 KYC Elements 8 \n2.2.1 Customer Identification Procedures 8 \n2.2.2 Risk Management 9 \n2.2.3 Customer Acceptance Policy 10 \n2.2.4 Monitoring of Transactions 12 \n2.3 Customer Due Diligence 12 \n2.3.1 Types of CDD based on customer risk rating 13 \nCHAPTER 3: MONITORING AND REPORTING 14 \n3.1 Transaction monitoring 14 ", "original_text": "i Contents \n \nVERSION CONTROL iii \nABBREVIATIONS iv \nCHAPTER 1: INTRODUCTION 1 \n1.1 Background 1 \n1.2 Definitions of key terms 1 \n1.2.1 Money Laundering 1 \n1.2.2 Financing of Terrorism 2 \n1.2.3 Proliferation Financing 2 \n1.2.4 Anti-Money Laundering (AML)/Counter -Financing of Terrorism (CFT) 2 \n1.2.5 Trade based money laundering 2 \n1.2.6 Customers 2 \n1.2.7 Shell bank and shell entity 2 \n1.2.8 Beneficial owner 3 \n1.2.9 Tipping Off 3 \n1.3 Objective 3 \n1.4 Governance Structure 3 \n1.4.1 Board of Dire ctors 3 \n1.4.2 Senior management 4 \n1.4.3 AML/CFT Unit 4 \n1.4.4 Asset (Mo ney) Laundering Prevention Committee 4 \n1.4.5 AML/CFT Committee 4 \n1.4.6 Three -line-of-defense 5 \nCHAPTER 2: CUSTOMER IDENTIFICATION AND DUE DILIGENCE 8 \n2.1 Know Your Customer 8 \n2.2 KYC Elements 8 \n2.2.1 Customer Identification Procedures 8 \n2.2.2 Risk Management 9 \n2.2.3 Customer Acceptance Policy 10 \n2.2.4 Monitoring of Transactions 12 \n2.3 Customer Due Diligence 12 \n2.3.1 Types of CDD based on customer risk rating 13 \nCHAPTER 3: MONITORING AND REPORTING 14 \n3.1 Transaction monitoring 14 ", "page_label": "2", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "ec393c1b-18d0-4461-9c32-b75b3d9ea676"}}, "5ca7e0e6-948d-4bf4-9917-b65984e80d3e": {"node_ids": ["36ebb5b6-c2e0-4dfe-a3dd-d3dfa9c22499", "ce1cb2b5-b7f8-4dd1-a7d8-e5085cedcf6e", "77051c31-f841-4e14-894e-1f862021b3dd", "595b345e-ee63-409c-9292-68359467be4f", "57f9f691-887d-4f71-a458-7373c780e219", "e5a1e03f-b0a0-4d55-9200-b54d3c152d3e", "3acecbd4-1867-4451-b65a-5dbf975bb532", "0957ead3-48dd-4dba-8d5d-231ad4bf4079", "e8285ac4-67c6-465e-bb2e-bb4d232ee8b9", "f6df0908-4d14-4b3f-89c7-0d0db1a18073", "403213cd-056c-4dd4-9f30-6c196e4b843a", "763de8e3-b292-4b0f-a23d-352999b8dac3"], "metadata": {"window": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. Training 17 \n4.2. Confidentiality and Tipping off 17 \n4.3. Non-Compliance 17 \n4.4. ", "original_text": "ii 3.2 Reporting 15 \n3.2.1 Resubmission Policy 15 \n3.2.2 Failure to Report 15 \n3.2.3 Sanctions and Name Screening 15 \n3.2.4 PEP and adverse screening 16 \n3.2.5 Reporting Obligations 16 \n3.3 Record Keeping 16 \nCHAPTER 4: AWARENESS AND TRAINING 17 \n4.1. ", "page_label": "3", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ca7e0e6-948d-4bf4-9917-b65984e80d3e"}}, "3d83bde6-3c0e-4f0f-b109-1c92783dc84e": {"node_ids": ["0029fe70-8458-48fe-9867-052638f3e121", "49061286-377d-4bd2-868f-9af96241cc3f"], "metadata": {"window": "iii VERSION CONTROL \nVersion Control No. Date Remarks \nVersion 1 July 2012 \nVersion 2 August 2015 Revised \nVersion 3 December 2017 Revised \nVersion 4 December 2018 Revised \nVersion 5 February 2020 Revised \nVersion 6 January 2023 Revised \n ", "original_text": "iii VERSION CONTROL \nVersion Control No. ", "page_label": "4", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "3d83bde6-3c0e-4f0f-b109-1c92783dc84e"}}, "b1ef24fa-97f3-42e0-961d-291e54170218": {"node_ids": ["4e9bcbd6-b2f0-4e98-b621-37cd6e2bab33"], "metadata": {"window": "iv \nABBREVIATIONS \n \nAML Anti-Money Laundering \nALPA Asset (Money) Laundering Prevention Act, 2064 \nAPG Asia/Pacific Group on Money Laundering \nBOD Board of Directors \nCDD Customer Due Diligence \nCCO Chief Compliance Officer \nCOCO Chief of Country Operations \nCEO Chief Executive Officer \nCOO Chief Operating Officer \nCFT Counter -Financing of Terrorism \nECDD Enhanced Customer Due Diligence \nEU European Union \nFATF Financial Action Task Force \nFIU Financial Intelligence Unit \nHMT Her Majesty\u2019s Treasury, United Kingdom \nHRD Human Resource Department \nKYC Know Your Customer \nKYE Know Your Employee \nML Money Laundering \nMLRO Money Laundering Reporting Officer \nML/TF Money Laundering and/or Terrorist Financing \nNRB Nepal Rastra Bank \nOFAC Office of Foreign Assets Control \nPEP Politically Exposed Person \nRules Asset (Money) Laundering Prevention Rules 2073 \nSTR Suspicious Transaction Report \nTBML Trade Based Money Laundering \nTF Terrorist Financing \nThe Policy Anti-Money Laundering / Counter Financing of Terrorism Policy of the Bank \nTTR Threshold Transaction Report \nUN United Nations ", "original_text": "iv \nABBREVIATIONS \n \nAML Anti-Money Laundering \nALPA Asset (Money) Laundering Prevention Act, 2064 \nAPG Asia/Pacific Group on Money Laundering \nBOD Board of Directors \nCDD Customer Due Diligence \nCCO Chief Compliance Officer \nCOCO Chief of Country Operations \nCEO Chief Executive Officer \nCOO Chief Operating Officer \nCFT Counter -Financing of Terrorism \nECDD Enhanced Customer Due Diligence \nEU European Union \nFATF Financial Action Task Force \nFIU Financial Intelligence Unit \nHMT Her Majesty\u2019s Treasury, United Kingdom \nHRD Human Resource Department \nKYC Know Your Customer \nKYE Know Your Employee \nML Money Laundering \nMLRO Money Laundering Reporting Officer \nML/TF Money Laundering and/or Terrorist Financing \nNRB Nepal Rastra Bank \nOFAC Office of Foreign Assets Control \nPEP Politically Exposed Person \nRules Asset (Money) Laundering Prevention Rules 2073 \nSTR Suspicious Transaction Report \nTBML Trade Based Money Laundering \nTF Terrorist Financing \nThe Policy Anti-Money Laundering / Counter Financing of Terrorism Policy of the Bank \nTTR Threshold Transaction Report \nUN United Nations ", "page_label": "5", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b1ef24fa-97f3-42e0-961d-291e54170218"}}, "69dfe709-e348-45f2-98f4-f093395080a7": {"node_ids": ["bfd83eea-695c-4156-b9e0-ed51488f50cd"], "metadata": {"window": "v WMD Weapons of Mass Destruction ", "original_text": "v WMD Weapons of Mass Destruction ", "page_label": "6", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "69dfe709-e348-45f2-98f4-f093395080a7"}}, "00a8ff61-766b-425a-aa31-182b8d2366e6": {"node_ids": ["c52e477a-e629-4d8d-ae02-3acec463f0e5", "528d270b-d6b7-458c-aa0c-17cfb1b7493b", "38c05c5c-78a9-41fd-b8c8-cc911b44b392", "3766a672-229d-481b-8e77-f63d9edfe42d", "88caea78-3b8c-4c50-8e40-be33f06d0a84", "79661545-c9b8-410c-a23c-7b75c28e1847", "4118448b-bb8b-4fd6-9f1b-e10f8247536f", "f157ec57-6d4d-4539-a463-eaef48d39eaa", "024fedaa-e2e4-4733-80db-1770ee4be916", "852347b8-c229-42b8-9261-bc9c6037ad24", "7a64fd7d-9b41-4740-a3de-2b277f852653", "a390b91f-efb8-4f77-9649-77a25276cf6b", "48499d08-c18e-4ae7-a08e-14c6a8ce5534", "120557fb-efb3-4afd-a575-fb950b4dde3e", "5d85bafc-9d1d-41e2-895a-d18e73e172ae", "2e61ba59-a7aa-4b65-926a-687ae86861e3", "ca8ed9ab-36c3-4cc9-9200-a44281095748", "83f784f8-1769-4a12-a9fc-e66d75ebd146", "d358ea6f-d726-4852-b959-6b6f02b7f626", "77027437-a678-41be-b475-fb1d8b50057e"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. The Bank is committed towards providing entire \ncommercial banking products and services. The Bank\u2019s shares are publicly traded in the \nNepal Stock Exchange. \n The Bank is well aware of the importance of preventing money laundering and terrorist \nfinancing activities and is fully committed towards the implementation of the highest \nstandards of anti -money laundering and counter financing of terrorism (AML/CFT). ", "original_text": "Global IME Bank Limited AML / CFT Policy \n1 CHAPTER 1: INTRODUCTION \n \n1.1 Background \nGlobal IME Bank Limited, herein after referred to as the \u201cBank\u201d, is Nepal Rastra Bank ( NRB ) \nlicensed \u201cA\u201d Class commercial bank. ", "page_label": "7", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "00a8ff61-766b-425a-aa31-182b8d2366e6"}}, "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8": {"node_ids": ["fa1fcd89-0316-4277-a96a-908337af1bcb", "54e47b1b-5be0-423e-8358-83c8c815d142", "795741ac-cedf-4428-8f5e-165bd45b1a62", "83547562-e8ba-4313-93f1-fc33fd2e0cd7", "a8fddcc6-b502-48a5-957e-099fdc6d5fdc", "d158c94d-fd03-4607-b7b2-b817dc6750ac", "89375532-71c7-4ba7-a392-f09aaf08f2be", "9b5e83f4-4d7e-48f3-b44c-e6d3b4a33367", "835d2923-71e0-4163-893a-caabe716e546", "ca32725c-6115-49db-913c-df3b07fa6beb", "578241bd-9f23-4439-a655-d30648805018", "e14f6cb9-9e6c-4472-abf0-450c9619ec9f", "914aa8b2-ee23-4ca1-9e6e-5654c2fb7b10", "2bd791d3-6858-47f9-865f-388dac32fac6", "c8e5d8f0-61e2-4054-9cc6-1d6bb01946ef"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. Financing of Terrorism involves the \nsolicitation, collection or provisions of funds with the intention that they may be \nused to support terrorist acts or o rganizations. Funds may stem from both licit and \nillicit sources. More precisely, according to the International Convention for the \nSuppression of the Financing of Terrorism, a person commits the crime of financing \nof terrorism \u201cif the person by any means, directly or indirectly, unlawfully and \nwillfully, provides or collects funds with the intention that they should be used or in \nthe knowledge that they are to be used, in full or in part, in order to carry out\u201d an \noffense within the scope of the Convention . ", "original_text": "Global IME Bank Limited AML / CFT Policy \n2 1.2.2 Financing of Terrorism \nFinancing of Terrorism mea ns financial support to any form of terrorism or to those \nwho encourage plan or engage in terrorism. ", "page_label": "8", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c33d88c6-a1cf-4eb7-9daa-f00a5b87fba8"}}, "67a8ab21-d0a6-4af5-a14e-ba8258af56fe": {"node_ids": ["101abeec-50d2-415c-bd60-6b01f5634c97", "a8b43d44-7ec4-40ac-a16a-3befd53e8c65", "8273a425-c99f-49b4-9db3-121013f2933d", "b88f77c1-2044-4a9f-b790-573fc3c5c12b", "87039a66-6d37-483a-bff7-4432cc531908", "d2e036ec-ad7f-4f9c-919f-08e95b238f42", "476681b8-7b69-4a34-a6d2-809fc653b8bf", "b6bac391-46af-49b8-ac76-55b9ea0a3f10", "4e342ed1-90d4-4470-95d3-1ca6c00677d9"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n 1.2.8 Beneficial owner \nBeneficial owner is natural person (s) who has /have ultimate control over the funds \nthrough ownership or other means and/or who are the ultimate source of funds for \nthe account. Individuals who have control over an account/fund or having 10% or \nmore shareholding in case of a legal entity shall be considere d as beneficial owner. \n 1.2.9 Tipping Off \nTipping off refers to disclosing information to the parties who are not related to the \ninvestigation of the suspicions or directly alerting a customer that a suspicious \ntransaction report (STR) , suspicious activity report (SAR), threshold transaction \nreport (TTR) has been filed or sharing any other information from which it could be \nreasonably inferred that the bank has submitted or is required to submit an STR2. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n3 presence.1 Shell entity is an entity that has no assets or doe s not have active \nbusiness operati on. \n", "page_label": "9", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "67a8ab21-d0a6-4af5-a14e-ba8258af56fe"}}, "b95327bd-847b-4a2b-8191-09ae7e15d91b": {"node_ids": ["71c4a3bc-6635-44e1-80a1-0e8deef0d767", "2db9c2b8-f85c-463d-9f24-ebd8e9727fd5", "9c6d0c05-1650-4b0e-9a43-a2e793804053", "74d6bdca-a349-435b-9efe-0beaeed635a1", "a3298b90-49cf-4b41-a0d9-17cc2a67baca", "1e4b3a13-4e82-4e88-8799-8d02597cd960", "d72266a3-fc2b-4dc5-9db2-4f7278b30167", "797816ac-6fc2-4453-b294-c5da10cbf4ab", "bca215d8-8f5d-4550-bee2-ca746b34b1c7", "2af8640e-5a53-47c2-a938-9f9695cd7c76", "f8bf4db5-78de-4d72-a5e3-33c83fc8c734", "44888967-ba3f-442c-9d7b-802d7ca43e44", "dc28745b-ce90-456e-83b0-3718ac471b7f", "14eda487-be69-46a6-8dd9-740d35cc7fe3", "6e741f83-1a55-4964-a39a-1735a998cd6d", "40a841c0-27b9-4105-8dc6-3454da3e3bd8"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n 1.4.2 Senior management \nSenior management is responsible to ensure that the procedures, and \nmechanisms related with prevention of ML/TF activities are formulated as per The \nPolicy and are effectively implemented. Senior management must ensure that such \nprocedures and mechanisms are appropriate in a manner where risk management \nand controls are effective and authority and responsibility have been clearly \ncommunicated to all staffs . \n 1.4.3 AML/CFT Unit \nThe Bank shall have a dedicated AML/CFT Unit under Risk Department; A \nManagerial level staff shall be the Chief of the unit3 as Manager AML/CFT . ", "original_text": "Global IME Bank Limited AML / CFT Policy \n4 The BOD shall be timely repo rted with relevant information on ML/TF to make the \ninformed decision on mitigating ML /TF risks. \n", "page_label": "10", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b95327bd-847b-4a2b-8191-09ae7e15d91b"}}, "e4df6583-ff3d-44e3-9497-4f8634359a67": {"node_ids": ["0e35a31b-6d8a-4f9b-8c29-5781a42f4a6a", "4ffb13a4-79e2-4307-ae24-d806775763c3", "6be1f85e-83be-4483-8b86-92c8725356a9", "c271474a-b01e-4dde-806e-7f88aea2f469", "7c252836-73d8-4243-8506-264c8086427a", "72335e90-0cfc-416a-bc36-58b99175d085", "09bc1af2-b295-43b7-91c8-008573646a0d", "468e2ecf-5ca8-4831-a045-858601970464"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . The meeting shall be held at least once \nin every 3 months or as required. \n Senior Deputy Chief Executive Officer shall be coordinator of the committee. In \nabsence of the Coordinator, Deputy Chief Execut ive Officer shall conduct the \nmeeting as Coordinator and in the absence of Deputy Chief Executive Officer , \nremaining members shall decide as required. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n5 c. To evaluate and strengthen the AML control so as to mitigate the ML/TF \nrisks, \nThe Committee shall also review the AML/CFT related reports and forward the \nreport to Asset (Money) Laundering Prevention Committee with necessary \nrecommendations, if deemed necessary . ", "page_label": "11", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "e4df6583-ff3d-44e3-9497-4f8634359a67"}}, "969c4445-d2dd-42b9-a7a2-12b6f64e1700": {"node_ids": ["c6e72421-0c17-4c05-85ce-2010d1df2cea", "603ea3c1-06dc-4f3b-944a-9c6cc9673b9d", "a0fc13ea-7924-4e50-95e1-f43f0559d329", "b1f955b6-bde3-4187-b7ec-0ccca333c31b", "5b57b692-0186-4785-9cda-71e403686f43", "8086fd1e-b2ec-4070-975c-c2361133f6a4", "ffb9a74a-b5ef-46fe-a18b-ccc6ba7da111", "bc11dbf0-462f-4bef-b531-78c07e33d133", "0c284300-d9f9-441d-b582-6e6795221c4e", "1e759376-2456-49fa-a154-1a5e19aad3e9", "cf77eaa3-eda1-41a1-84ee-75ca0759b985", "5622feb7-e8d7-436c-b3da-101d0b4f4f06", "ff3e9c00-eb71-4900-9413-b6deada6e561"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n a. Branch Manag ers / Branch In -charge shall be responsible for \nensuring and executing the task related to their branch in compliance \nto The Policy . \n \n b. Department Heads in Corporate Office and Province Heads should \nimplement ongoing employee training to adequately train all of the \nstaffs in their departments, offices, and branches as per employee\u2019s \nspecific responsibility to ensure effective implementation of this \npolicy. Province Head shall facilitate implementation of this policy and \nmonitor activities performed in all areas in line with this policy in their \nrespective jurisdictions. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n6 1.4.6.1 First line of defense : Business units / front line staff \nThe first line of defense shall identify, asses, and manage the ML/TF risks \narising from the business/accounts in which they are involved, and are \nresponsible for having controls in place to mitigate the risk and promoting \nAML/CFT principles. \n", "page_label": "12", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "969c4445-d2dd-42b9-a7a2-12b6f64e1700"}}, "5ed8c97a-1c6c-4afb-b66d-efdd481672be": {"node_ids": ["32da5209-b7d2-4eb3-8d14-ef013b8d4938", "f5793231-5cbd-4197-a8f7-0eeb8fb4c6c1", "8847a2eb-c347-4971-94f1-45a7f1688aac", "9c608428-da65-4cb9-bb75-fbc5c66ccd01", "e3f05e59-fcfb-46c1-8e98-1e1783599004"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . This officer shall report to the MLRO or the \nAML/CFT Unit. \n 1.4.6.3 Third line of defense : internal audit function. \n The Third Line of Defense will be performed by internal audit. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n7 \ne. Branch /Department AML Officer (Operations In -charge or an official \ndesignated by MLRO in consultation with AML/CFT Committee) shall \nensure that norms of AML/CFT are fulfilled in the \nbranches /departments . ", "page_label": "13", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "5ed8c97a-1c6c-4afb-b66d-efdd481672be"}}, "c1f6107a-8ecb-45d2-bf5d-e5768bef3455": {"node_ids": ["f24a6dc4-2427-4dd3-9bb8-61fe621a59cb", "df0cb8c7-a553-454b-ba68-82ec87b30299", "413faf23-1ff4-4f8e-a48b-d9509c3d23ae", "9e5d2a5d-d5f2-4612-a45c-8e15a890ceb2", "b9707183-c73e-4aee-8864-fee85b148ec9", "90e148e7-14d9-4881-861d-0786b910c721", "c85b5a7b-c07c-456c-b67e-041c52a49a9c", "8fa24c22-6fbd-4ab5-a8df-d0043157c950", "d7f0868b-795a-4340-8ac3-625b21cf4b6f", "7c5c4726-bc4f-48d9-9331-ad444749d3ae", "aec64413-f360-4c95-891e-294655fa24f5"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. The purpose of \nunderstanding its customers is to verify the identity of its customers to safeguard the bank \nfrom being used by criminal elements for ML/TF activities. \n 2.2 KYC Elements \nThe Bank shall incorporate the following four key elements required for KYC: \na. Customer Identification Procedures \nb. Risk Management \nc. Customer Acceptance Policy \nd. Monitoring of transactions \n \n2.2.1 Customer Identification Procedures \nThe bank shall perform customer identification procedures to identify its customers \nwhile onboarding a new customer and throughout the banking relationship with the \ncustomer. The bank shall \na. Obtain all required information necessary to establish the identi ty of a new \ncustomer and the purpose of the transaction with the bank. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n8 CHAPTER 2: CUSTOMER IDENTIFICATION AND DUE \nDILIGENCE \n \n \n2.1 Know Your Customer \nTo m anage ML/TF risks effectively, B ank must understand its customers. ", "page_label": "14", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c1f6107a-8ecb-45d2-bf5d-e5768bef3455"}}, "b85e2633-a0dd-4abd-8398-c44410232847": {"node_ids": ["47be1383-b4c3-4b46-b1bb-612f115cb5cd", "46cb1d52-0f0b-4b17-8e1f-3432aae4826c", "778b8bd0-445d-4c66-8804-9c1e37888ea4", "8acd8464-081a-4d21-a2d8-811bc8a41922", "c895e787-7815-4877-a7df-afab66f0636a", "296c8197-079b-4c2d-b812-f74780c73c32", "a80953f0-5fd7-434d-8fc0-cfd43266c141", "2a7e0776-0b2c-48ed-a2cc-258375452620", "faa27de2-ed4c-48b4-8317-fc0e869a4a36", "463072b0-0ada-437e-bb65-bf0976ef72b3", "4e248107-2035-4199-bc08-c74b49d5fcc6", "cfdfad83-3486-47fc-9d06-18e966e50b7c", "50e9c42c-bb86-4291-a2a7-bd60a71a466e"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n9 ii. Obtain senior management approval for establishing or continuing \nsuch relationships. \n iii. Take reasonable measures to establish the source of wealth and \nsource of fu nds \niv. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n9 ii. ", "page_label": "15", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "b85e2633-a0dd-4abd-8398-c44410232847"}}, "2be49d31-8552-4227-ab21-3c4a73e2771f": {"node_ids": ["5fb9c9ec-1b0e-4967-aceb-2b86d57f22fd", "ff25c099-aa59-464c-a08c-fdb3791ab5dd", "ea4724d4-0293-4e1e-a176-0bea52a3e5f3", "f9cc2420-88fe-404c-b7dc-a64dc68fa7ec", "860c4228-3dfe-4204-8555-d3f93f30e982", "6a65d6cc-b8ef-4b49-a1b9-06501f385281", "deb4207f-47b8-4363-ac6c-c00cf633e9a3", "70207f0b-28b6-4000-9af1-a9751ec388a1", "35b30ee3-83d7-4c50-a533-590b75092687", "b74e5b1c-365c-4a04-b58e-ca8df2f2a812", "dac79022-37f6-466c-99fe-255aa9a4aff6", "a684faf2-d6e7-4094-a1f5-3073e3010969", "b71e453e-c24c-4ddf-9f76-8f1d2c3f59e5", "09d878c5-7b5f-43df-b2fc-17349c286eb7", "e369201a-c028-456e-b33f-5a823cd04c4b", "0862dba7-c437-419d-a67c-a7a19278ee37", "8a6a3656-e862-4e1e-9566-98904db6b57b", "a0f8d230-720d-442f-ae36-25a8a54cfa97", "058fd3d4-efa5-4488-a1c3-74bf09781e86", "9f902caa-3c8a-4c05-b46c-1e1f1df83834"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. The Bank \nshall pay special attention to the ML/TF threats arising from new or \ndeveloping technologies . \n 2.2.2.2 Assessment of internal controls \nThe Bank shall ensure that the process and practices to manage the \ninherent risks identified are proper. For this, the Bank shall rely on internal \naudit and internal compliance testing. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n10 d. Products and services offered \nThe Bank shall identify the High-risk product and delivery channels and \napply appropriate measures to mitigate the risk of ML/TF. ", "page_label": "16", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "2be49d31-8552-4227-ab21-3c4a73e2771f"}}, "7c666861-61bc-4a7d-83a3-c9da6eafba87": {"node_ids": ["15997e69-4974-4fe1-9800-c562eec9b258", "76601a4c-5955-4f68-8fe0-2347f76e0d83", "78a03d23-9f82-4414-be59-a73782dee41c", "97d1c507-fc21-47f4-9eb4-f7321a4c0a77", "b4423dab-675c-4491-9cea-c5384fd18e2b", "5c8c1f58-f167-4b77-aa0e-61d47a8039d7", "7e34500c-dbfa-4e84-8d64-3d1163dd5c48", "a8f88646-e5af-4381-8a33-f2d66d538ffd", "2604e495-b5e9-41b6-bcac-c29ffed09f4c", "8ab04d40-d2ca-4185-9bab-b4c745a49c48", "5285e0af-31bb-4297-9b85-74f17d7939e9", "8fbe5691-8155-4aee-a535-dfeb2a06cf9b", "032cec94-aeb3-436e-a40f-60f21acda04f", "6b7d8b5b-95aa-4bb5-bc55-174503dd4e62", "274dcbca-d18d-4650-a190-c0911bb99942", "4dea95ae-199c-4134-af0a-d58ebfff00f9", "ebec4eac-8275-4125-8b61-3c7cbd201d55", "50b32ea2-6fc6-481c-865a-980bec925996"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n11 terminated. The cu stomer acceptance policy shall take a risk-based approach to \nunderstand and mitigate risk. \n 2.2.3.1 Prohibition of relationship \nThe Bank shall not accept or maintain relationship with the following \nperson/entities: \na. Anonymous or Fictitious customer /accounts. \n Bank shall ensure that no anonymous accounts or accounts that are in \nthe name of fictitious persons are opened or maintained. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n11 terminated. ", "page_label": "17", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "7c666861-61bc-4a7d-83a3-c9da6eafba87"}}, "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144": {"node_ids": ["f2cbf011-bc22-410f-b36e-05f7c6edc459", "346aa99f-bb2b-4cf7-a7ae-2aaea8ebb785", "1c75b713-6f92-4ec8-9218-3bb3e58c4e03", "ccc440cc-471f-40a5-a4b4-2fe156a969fc", "33b8bf66-a163-4af4-8f34-974afdb37833", "364f57dc-fe18-47a9-816d-ea654a4b2b7c", "cdc234c5-6d40-4b9a-8a6b-aed34b6c6ed7", "d42c8120-3255-4b13-83d4-eb2cad0d73c0", "0a61de61-47dd-42cd-94be-4467bdc87028", "a11f6bc2-d45c-4302-9f93-15f941acefa1", "b20c38b6-59e4-43a9-9b10-8ef6127ecb04", "ed17db20-b032-4c05-a08d-760554d40e33", "6e13df71-09d7-4d1e-9790-ff7ffdf84823", "d51236fd-2a0c-4de1-b447-a5aca9c8206b"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n i. Those who deal with arma ments. \n The Bank shall not involve in any transactions related with purchase or \nsale of arms. \n \n j. The customers involved in activities prohibited under Nepalese \njurisdiction. \n \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n12 \nh. Those who deal with crypto currency.7 \nThe Bank shall not establish relationship with a customer who deals \nwith crypto currency as there is limited identification and verification of \nparticipants as well as lack of a proper regulator for supervision and \nlegal enforcement regarding crypto currency. \n \n", "page_label": "18", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "23ca9ab8-96d8-4d9a-bdb5-7c2cb8e88144"}}, "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a": {"node_ids": ["464b1f97-e2e7-4c08-831e-26f486e2c433", "58ab7dd7-68b1-4ed3-b40f-38b076c70908", "ae0078e0-7d33-47a4-b481-d98e71589dce", "3f6a626d-e8cb-4481-a77f-848c263aa0a7", "412c18f5-2adf-4945-acb2-777ae502bdc3", "ef4cefad-0d6b-47c8-9cb9-039fb64b5457", "5ccf1886-586d-469b-9c5d-0edcc27c58c9", "fb5057d6-151f-45f4-94e3-0b72ee4db0b1", "6876f76e-e347-4f20-ac56-af1923c786a1", "d1479bee-44ae-4a44-93f5-f3792b1cd94a", "405fb950-67ab-482b-9e74-48979480e5c4"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n g. Each transaction c onducted by high-risk customers \nh. Other provision as prescribed by the Regulator. \n 2.3.1 Types of CDD based on c ustomer risk rating \nThe Bank shall assign customer risk ratings to determine the level of controls \nneeded to be employed to manage the risk, including the type of ongoing \nsuspicious activity monitoring. Following customer due diligence will be applied to \nthe customers categorized under high risk, medium risk, and low risk as per ALPA, \nRules, and NRB directive . \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n13 f. There is suspicion of money laundering or terrorist financing. \n", "page_label": "19", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "20a0e792-3e85-45c2-97ea-cb8bbbb0ef7a"}}, "502b9490-cdda-420f-a8bb-6e31ce16b38f": {"node_ids": ["8d404377-1b77-4704-b523-3dcbd4c8b233", "4d66d061-fd5a-497c-ba1e-a14318f7f516", "0120a2e9-c4f5-4f6a-8d8c-56e844c24f0e", "71b50d05-a9dd-4398-b6af-ea4c37803aef", "60b16a6e-e240-4685-8033-5110a9e2662e", "5293cdfc-2093-4688-848c-c294e9d766ea", "c71e7e12-cedf-4542-b14b-231a8ddcb334", "c575058c-205e-4995-955e-14e1968bfa57", "d72190e5-f2aa-44a6-b790-d25e61ac052d", "b4288da3-3532-4958-8cbb-5f314e568859", "d1691c76-81d3-42d2-8b4b-13216c91266d", "81ec9bf4-9a1f-4c66-ab51-9c83014d037b", "480985cf-845c-4498-9784-3795b988ffbe", "8c831ae1-636c-4638-a199-e71f19d1a116", "b3304b34-b04b-4c3d-bef5-a595f990cd6a", "35050b70-c5a7-48cf-b9e2-650bd0ae7363", "c4ed859d-65f6-4952-9136-e2168eaa364b", "3ee50f81-fa6a-4edb-847c-6ca85593d6a1"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. Transaction monitoring is targeted towards informing the Bank \nto unusual activities in meeting the Bank\u2019s statutory obligations with respect to reporting \npotentially suspicious transactions. \n The Bank shall monitor the transactions based on risk-based approach through an \nautomated system in addition to the exception reports developed internally by the Bank. \n For transaction monitoring, the Bank shall consider customer risk profiles and information \ncollected during the CDD process. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n14 CHAPTER 3: MONITORING AND REPORTING \n \n \n3.1 Transaction monitoring \nTransaction monitoring involves analyzing transactions of the customers of the Bank based \non defined parameters to determine whether such transactions are as per the Bank\u2019s \nknowledge of the customer. ", "page_label": "20", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "502b9490-cdda-420f-a8bb-6e31ce16b38f"}}, "4611b91d-64b2-439e-af0e-f2cc8face9e5": {"node_ids": ["280c0e76-41c0-4264-8a9c-9da2abc3c6ec", "ca6cb905-f47c-401a-bf43-e3a31a4f55da", "90d1ef37-a2f9-4e2d-ae8d-9e949b3099ef", "d64e91df-5c26-4967-b652-9ae074915b33", "6b49d114-f4f4-485d-b910-70d6d6180da0", "44a95309-3132-4d05-80d1-c46a5678b3dc", "1fef1573-f066-4242-a6eb-2564da31ff53", "ad7f3325-40a7-4edc-849c-1cf0a687bd08", "87a116ae-c397-4230-8e39-fae765e6d4dd", "d343ff63-7653-4429-a4f9-d48a41df1b27", "8390024f-9a10-4c45-8477-8f43e6cc772d", "a172593c-f4f9-4d7b-b0ab-e683c8f21c70", "2a580198-957b-4937-9cbc-9c634ba3c008", "e138bd74-d5de-4d81-9ef5-5c4c15f03829", "7d06288f-71e6-4cb6-a44f-6c4a982fc775"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n f. Payable -through Accounts or Pass -through Accounts \nThe Bank shall not allow its customers to directly access the correspondent account to \nconduct business on their own behalf. \n \n g. Use of p ersonal accounts f or business purposes \nThe Bank shall discourage use of personal saving accounts to be used for business \npurposes. \n 3.2 Reporting \n3.2.1 Resubmission Policy \nBank shall not attempt to resubmit any transaction that has already been rejected \ndue to the concern over Sanctions or ML/TF. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n15 e. Downstream Correspondent Banking (Nested Account): The Bank shall not allow \ndown stream correspondent banking service and nested account activities to other \nfinancial institutions. \n \n", "page_label": "21", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "4611b91d-64b2-439e-af0e-f2cc8face9e5"}}, "d6c01188-7f8d-4980-8314-4ed1d637bb69": {"node_ids": ["87cdb9f9-6443-4de6-805e-60fa79892b8c", "5b089c73-d94f-4170-9d23-00175b148dff", "2bedf45a-a532-4f34-af89-5e54ebbb3360", "c4a882e3-5baf-45de-a850-58acb66aaf09", "efa844fa-c6b3-49df-bf77-56953f9df462", "79183a94-0bfd-4e26-b2ac-01b4844777d6", "b90b3dfd-a42f-4419-b97f-f89f1c08ab54"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n 3.2.5 Reporting Obligations \nBank shall generate AML/CFT related reports as per the NRB Directive in \nprescribed format/system and submit the same t o the Regulator, for which the B ank \nshall have effective reporting system so that reports are g enerated and reported on \ntime. \n \n Bank shall develop and implement guidelines on the identification of suspicious \ntransaction based on STR Guidelines issued by FIU, National and International risk \nassessment, and the Bank\u2019s Annual Risk assessment reports so that all staffs - \nespecially dedicated Branch /Department AML Officer - shall be able to identify and \nreport suspicious/unusual transactions to the MLRO or AML/CFT Unit. However, \nthis shall not limit any staff member to speak up and directly report \nsuspicious/unusual transactions to the MLRO . ", "original_text": "Global IME Bank Limited AML / CFT Policy \n16 3.2.4 PEP and adverse screening \nBank shall adopt appropriate mechanism to screen the customer against PEP and \nadverse media list, while establishing and maintaining the relationship, so that the \nenhanced customer due diligence could be performed. \n", "page_label": "22", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "d6c01188-7f8d-4980-8314-4ed1d637bb69"}}, "c15b2c9d-6a7a-4146-813f-f7a124131ae9": {"node_ids": ["4e3e7b84-0d91-4cf7-b805-b232c8b649ba", "81d50026-2523-41c6-9b77-902190f43f7b", "05dec978-9706-4716-ac11-f33bae44ea0b", "713a8421-fb21-41ba-ab14-183e576edcf8", "fe545f00-c6d3-4531-9c21-45cdddb63c6b", "fb3649b3-a0a1-4bf8-a6fb-31d6cb3e4f3a", "9dead0bc-0207-435a-ae20-ce09bcfe8f58", "c7c5137c-0629-4b93-86d0-e670c9f67a27", "8757f6b1-ae55-499f-b25f-de05ab6dda08", "f40f7e2e-0b7f-4b3e-a2b9-23ed6bc639b7", "d1a21348-e334-4cfd-bec4-dd62abb6f17e", "e04b7813-1ac3-41bd-9d76-1989880984cd", "4d438801-b2bf-411f-977d-f82dd9f153ee", "d906a6e3-7a82-4967-b953-b0fdc66a6e47", "9b99d183-9a8b-43db-b957-6e4913e35169", "329fa215-36f6-4ca9-9ab5-f4cbbc2dd9b4", "bc7ed399-c799-4a22-a1b6-e1f003dd5610", "67b55cd7-f8e1-469b-ad4b-03fa99f217a6", "418bdbeb-1337-428f-9947-64b09fbb11d2", "f3fd52ab-6701-4e46-bc50-334d434e5506", "9b6eccff-e7af-41e1-9e66-b386cde7c1c0", "19e66bab-9c92-4328-9ef0-c968ba87545d", "ab51dd03-4549-42e0-8ce6-c7bec4f90dea", "a3543077-dc63-462e-bdde-45a63f52b730"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. Training \nBank staffs, BOD , and shareholders holding 2% and above shares shall be made aware \nof the statutor y and regulatory obligations on AML/CFT in coordination with HRD . The Bank \nshall refresh employees\u2019 knowledge on the practices of ML/TF from time to time with \nindications to t he recognition of suspicious transactions. Awareness on prevention of \nmoney laundering & financing of terrorism shall be raised through a periodic and regular \ntraining to all the staff members including new recruits of the bank about what money \nlaundering & financing of terrorism is, the identification of suspicious transactions, the \nregulatory requirements on prevention of money laundering and financing of terrorism, the \nBank\u2019s policy, procedure , and controls for prevention of money laundering & financing of \nterrorism. \n", "original_text": "Global IME Bank Limited AML / CFT Policy \n17 CHAPTER 4: AWARENESS AND TRAINING \n \n4.1. ", "page_label": "23", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "c15b2c9d-6a7a-4146-813f-f7a124131ae9"}}, "05b0d101-74b5-47fc-9c9e-9f2badf69460": {"node_ids": ["e53f0119-da24-4204-88c5-936fab297322", "4f2cb7ba-803b-414c-8fad-e09bf904bef8", "bd03b071-a4f2-47be-8f28-d03f6308a455", "65cd9328-4671-4d36-8c75-e84b8a97fced", "cfb22927-a751-4cd7-bdd6-cfd0ba9ab7ae", "0200d07e-ac4a-4836-a687-85bceb36acac", "216c6559-336b-4dad-9799-4b97091755cc", "22c2f1c7-5c1e-488c-8bac-d5aa917d73ad"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n Similarly, HRD shall conduct Know Your Employee (KYE) procedure and maintain up -to-\ndate information of each employee of the Bank . It shall also monitor the transaction of the \nemployees and if any suspicious nature of activities related to ML/TF is observed it shall \nbe notified/ reported to MLRO (or as designated). \n 4.6. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n18 activiti es shall not be kept hidden and as per the Whistle -blowing Policy of the Bank, it shall \nbe informed to the competent authority. \n", "page_label": "24", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "05b0d101-74b5-47fc-9c9e-9f2badf69460"}}, "9917c9ce-5007-41c0-a3da-0c22199145ca": {"node_ids": ["5cb2ca77-8c68-4eca-ba7b-09fd6f940847", "c570b9fd-00b6-44cc-9eb6-3e013d8cdd0a", "a5d51abe-ea19-4749-aac1-0b15fde47d8c", "8035ab1f-a41e-4fe9-bf09-ec5ca904acef", "a23ebbe3-906f-4680-b1f3-a8fb40303f61", "27461456-384c-47b7-b8c8-98d570467a6d", "aee00e79-c56b-4bd1-8a78-2057cc30c0e8", "724f31c2-5a6e-477f-a1ea-1e3edaeb4b4a", "892abaa6-8499-4327-bb96-06284025b901", "04b9e023-54a9-48bd-b155-eb593f297bdd", "20cb6038-10f9-4d16-b107-1cd06e1e0e6a", "33b4d705-5b0e-44ba-9e0d-a823990bf169", "c887158b-3381-4c4b-acfc-233bf64aebaf", "180e4ce0-e01b-4b8f-bfaf-14189430a48f", "cae614fa-03f8-4886-b62d-3b8e05d62d75", "39cc9373-6da8-4f5a-95c4-4e81f0f83b35", "50f9afff-32fd-4345-a9e5-fb54e7ec2c63", "f8f8b6e1-b323-41fd-85ba-6a4b6e29e8c1", "7160204a-9bae-4def-be19-1aaa04593075", "c030132a-f9b1-4ad7-a328-18b6530adb71", "04023cc9-dc58-42e3-b4e5-535bcabfb7a5", "968e9f84-ce3e-43c7-9e73-52ae72a4f8bb", "1cbea5fc-1a4e-42d4-9d8f-c0f5ad4a4885", "2d5ff229-5b86-4a90-b589-649b7320c30a"], "metadata": {"window": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. AML/CFT Guidelines \nA separate Guidelines document shall supplement this Policy. The Guidelines shall be \nreviewed by the MLRO at least on an annual basis or as and when required and may be \namended/revised as per the requirement with approval of the CEO through AML/CFT \nCommittee. \n 5.2. ", "original_text": "Global IME Bank Limited AML / CFT Policy \n19 CHAPTER 5: MISCELLANEOUS \n \n \n5.1. ", "page_label": "25", "file_name": "AML_CFT_POLICY_20232_5d9dd862d0.pdf", "doc_id": "9917c9ce-5007-41c0-a3da-0c22199145ca"}}, "a2935351-6da3-4318-a839-4ee3ea5fc91d": {"node_ids": ["961c0993-1414-4237-9fcd-5e18abbc1f27"], "metadata": {"window": " \n \n \nMuktinath Temple (Chumig Gyatsa) \nDistrict : Mustang Country : Nepal \nAltitude : 3710 meter Distance : 406 km from Kathmandu \nNearest Airport : Jomsom 200 km from Pokhara \nName in Hindu : Mukti K shetra Name in B uddhist : Chumig Gyatsa \nDivya Desam (premium \ntemples) 106th Shakti Peethams 51st \nGod Worshipped Vishnu \nMuktinath Temple \n\"The holiest of holy Vishnu temple in Mustang \nDistrict of Nepal\" ", "original_text": " \n \n \nMuktinath Temple (Chumig Gyatsa) \nDistrict : Mustang Country : Nepal \nAltitude : 3710 meter Distance : 406 km from Kathmandu \nNearest Airport : Jomsom 200 km from Pokhara \nName in Hindu : Mukti K shetra Name in B uddhist : Chumig Gyatsa \nDivya Desam (premium \ntemples) 106th Shakti Peethams 51st \nGod Worshipped Vishnu \nMuktinath Temple \n\"The holiest of holy Vishnu temple in Mustang \nDistrict of Nepal\" ", "page_label": "1", "file_name": "muktinath.pdf", "doc_id": "a2935351-6da3-4318-a839-4ee3ea5fc91d"}}, "3239c021-9a3d-4f87-97b2-25fd74e9946d": {"node_ids": ["5020b73f-8873-4bc9-a860-984ff814f4ea", "8e2e6e89-ded8-4515-9f9c-53a543c290d3", "a3e6ae4f-aa90-49a5-9bf0-9721d367ab6d", "e5f227b2-6b9f-4596-bd0e-9efb449a11f1", "8648d275-f562-4f15-8b2f-98dbc599a3eb", "9cc69d8d-10c3-4775-a835-b59bc19029c3", "2eee2bd9-d3c6-42b6-a5ba-161c3140627e", "c676c70a-da45-43e0-bd7b-5cdd29aaddac", "323d4d8a-4832-4fba-a5f6-fbc36be4955f", "627f64b5-cc0a-44f2-878d-1f6b1b555992", "2c18f16c-acca-4b17-af67-b8012d776564", "4806f4d4-e0a6-42fe-bab5-a09a31869025"], "metadata": {"window": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. Hindu \nbelieves that lord Vishnu got salvation from curse of Brinda (wife of Jalandhar) here. Therefore he is worshipped as \nMuktinath (Lit. the lord of salvation). ", "original_text": " \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nIntroduction: \nMuktinath Temple (Chumig Gyatsa) is symbol of the religious symbiosis between both Hindus and Buddhists. ", "page_label": "2", "file_name": "muktinath.pdf", "doc_id": "3239c021-9a3d-4f87-97b2-25fd74e9946d"}}, "ae456982-10e2-4b03-bc74-eb8b4ba0750a": {"node_ids": ["1dcaf295-e021-4a46-a0b2-b702b52a6625", "6c2e21a2-b490-4b89-bb56-136d64d5176b", "419073dd-6053-457f-883a-053dd428f9b1", "f3d8f307-1cf9-473e-8720-8f1edb18be2d", "6c34ca18-ab01-4b0b-bef7-c148cf014e89", "b7aa2bd3-f6ff-4969-a34b-b9b2e6a66431", "163dc7ca-a294-44fb-9218-c6ed5185d210", "ce3ebbf7-81a2-47f4-ae0d-f5862aa6836e", "2b2ffcc6-21f2-472a-938b-b1df7e9515a0"], "metadata": {"window": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. This temple is covered in one of the famous t rekking route \nof Annapurna Circuit. \n Travel Access: \nOption 01: By Road - 2 nights (Kathmandu - Pokhara - Jomsom - Muktinath) \nMuktinath Temple can be accessed by road way from Kathmandu to Pokhara following the Prithivi Highway after \nthat crossing Beni, Tatopani, Ghasa, Marpha, Jomsom and Kagbeni. \n First halt: Muktinath Yatra via road begins from Pokhara and will be the good idea to spend one overnight which is \n206 km far from Kathmandu, 910 meters above sea level and journey takes around 7 hours. ", "original_text": " \n \n \nLocation: \nMuktinath Temple is located at the laps of snowcapped mountains at Thorong -La mountain pass at an altitude of \n3710 meters above sea level in Mustang district of Nepal. ", "page_label": "3", "file_name": "muktinath.pdf", "doc_id": "ae456982-10e2-4b03-bc74-eb8b4ba0750a"}}, "dc918cd6-dee0-4419-98db-4d7543ec8c3e": {"node_ids": ["028f2cbc-d5a3-4c41-9cd7-ac718eca0b12", "7d9ec202-c582-4890-b9d4-401a2ad0db07", "30b0ca3e-2620-4fe1-b097-72c110d705d1", "0a2374ea-14df-444e-b8fc-a813df7bfa17", "70372725-dd90-49e5-ac9c-37f51dff536c", "c03e3b07-6ad9-43e6-8e1f-341a64b1b1a9", "907087b0-4704-4abb-bf94-b06d63fc3627", "17304c45-6861-4e54-9145-85d48955a89a", "6b970b7f-58be-4c41-be0a-d7d9b07203f0", "d69726f7-c633-4f58-9ce2-20dabee28f66", "2fd2ca3c-d471-42c6-ba5e-259b29a4768b", "9389dd14-1645-4a0c-b5b3-61df42c6bf08", "f350b3ab-7bc7-440a-9d8e-81046830991c", "be0bce66-2562-4787-9f85-5fd437201f25", "0ed5e479-952d-4459-8e88-ecb54e9a8345", "14f74901-ad84-493d-98ef-f6e18569dc84"], "metadata": {"window": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. Roads upt o Beni \u2013 100 km are blacktop and comfortable for the journey \nwhereas next 70 km upto Jomsom are off road. It might take 8/9 hours to reach at Jomsom. Please do not expect for \nthe star hotel here. ", "original_text": " \n \n \nSecond halt: Pokhara to Muktinath by road might needs one night stop at Jomsom which is located at an altitude of \n2734 meters and 170 km far from Pokhara. ", "page_label": "4", "file_name": "muktinath.pdf", "doc_id": "dc918cd6-dee0-4419-98db-4d7543ec8c3e"}}, "20a359f2-e80e-47aa-8cb4-56bba4e6cef4": {"node_ids": ["0881a8f4-0cc8-4880-882e-5c5b4acdaaf8", "de36e662-d776-4bd7-8dc0-835d4c72d550", "30250a1b-e5eb-43e8-ba8c-12d181b2de8b", "7c1e72df-7ff1-4e73-987a-8c8706c5066a", "3eb503e4-29e8-4cde-bfcd-3bfbf280aafc", "36121d44-18fc-4594-a21a-90e168f5082f", "89120f0b-a7fc-4534-819b-3028f03632d4", "9acb9a18-b522-4923-a80f-b5e39002b6ef", "6801aac7-95ab-4b23-ae71-5ba8e456b7a2", "b5ebb767-9e90-4877-b891-cfa65ae8ac8d", "ee27b20c-0d1c-4eed-8b0a-ec42beb60e28", "ec814f94-6d0a-4f4b-b5ca-b781d48d0fa3", "a733a156-c4e7-4dbd-b8f7-f1daa37b4fb9", "9411a935-9ae7-4828-8dde-6bd65f725c38", "2da03df3-b5e4-461e-bb72-d20938ceed7c", "de777270-1445-4579-a17a-882d7f4653f2"], "metadata": {"window": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. Muktinath Temple is in just one and half hour flying \ndistance by helicopter. The helipad is located at Ranipauwa. From here the temple can be reached via 30 minutes \nwalking. ", "original_text": " \n \nOption 03: By Helicopter - 1:30 hours (Kathmandu - Muktinath) \nMuktinath Yatra by helicopter is operated from Kathmandu. ", "page_label": "5", "file_name": "muktinath.pdf", "doc_id": "20a359f2-e80e-47aa-8cb4-56bba4e6cef4"}}}} \ No newline at end of file +{"docstore/data": {"1b9357d6-4c8e-40b1-bc5b-d13f4c07db7d": {"__data__": {"id_": "1b9357d6-4c8e-40b1-bc5b-d13f4c07db7d", "embedding": null, "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n", "original_text": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47", "node_type": "4", "metadata": {"page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "5a922b98e496146e0a4495d5fc9a94add5d91347d5153a2a52b544e21860f6ac", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9a7dd336-5118-472f-b99d-c4c0fa26c21c", "node_type": "1", "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n", "original_text": "conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n"}, "hash": "f78cab245a11b6dfe302816daeb082980396e1a21cb490e78d2b4daa47e125a6", "class_name": "RelatedNodeInfo"}}, "text": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n", "start_char_idx": 0, "end_char_idx": 504, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9a7dd336-5118-472f-b99d-c4c0fa26c21c": {"__data__": {"id_": "9a7dd336-5118-472f-b99d-c4c0fa26c21c", "embedding": null, "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n", "original_text": "conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47", "node_type": "4", "metadata": {"page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "5a922b98e496146e0a4495d5fc9a94add5d91347d5153a2a52b544e21860f6ac", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "1b9357d6-4c8e-40b1-bc5b-d13f4c07db7d", "node_type": "1", "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n", "original_text": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "6db682965a2f34a93d6424d0872559f122811b0492c1d9efe0b7c8d60f9624e9", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "8e356062-c915-43f4-8410-08a1b8c52ee3", "node_type": "1", "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n"}, "hash": "7db31c48b2f80ccbc458576e9bf1ec8faf5e95640bb49d096664b6034c1b0d2a", "class_name": "RelatedNodeInfo"}}, "text": "conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n", "start_char_idx": 504, "end_char_idx": 558, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "8e356062-c915-43f4-8410-08a1b8c52ee3": {"__data__": {"id_": "8e356062-c915-43f4-8410-08a1b8c52ee3", "embedding": null, "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47", "node_type": "4", "metadata": {"page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "5a922b98e496146e0a4495d5fc9a94add5d91347d5153a2a52b544e21860f6ac", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9a7dd336-5118-472f-b99d-c4c0fa26c21c", "node_type": "1", "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n", "original_text": "conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "fef942eb48215271c9121fb4306eced65050ad0906bbc358ff2f87f7b6a12aaa", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "719212ab-2bff-4581-b60d-e36578236552", "node_type": "1", "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n"}, "hash": "a637474e8674bb10e663833a89d454be5fce5678486012bf89171714e80ff63d", "class_name": "RelatedNodeInfo"}}, "text": "setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n", "start_char_idx": 558, "end_char_idx": 694, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "719212ab-2bff-4581-b60d-e36578236552": {"__data__": {"id_": "719212ab-2bff-4581-b60d-e36578236552", "embedding": null, "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47", "node_type": "4", "metadata": {"page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "5a922b98e496146e0a4495d5fc9a94add5d91347d5153a2a52b544e21860f6ac", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "8e356062-c915-43f4-8410-08a1b8c52ee3", "node_type": "1", "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "e72786bbca13e53c5ffbd2825f1c8e18ced4f5e857b9115e18f6836bb53ea659", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "759232c4-9bd4-48ed-a2ad-f970920ceeec", "node_type": "1", "metadata": {"window": "conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n"}, "hash": "6cf1ca041ba8562c923da23d84567c5586da0c22f068d964f5eddc2d4c2c4d84", "class_name": "RelatedNodeInfo"}}, "text": "update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n", "start_char_idx": 694, "end_char_idx": 738, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "759232c4-9bd4-48ed-a2ad-f970920ceeec": {"__data__": {"id_": "759232c4-9bd4-48ed-a2ad-f970920ceeec", "embedding": null, "metadata": {"window": "conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47", "node_type": "4", "metadata": {"page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "5a922b98e496146e0a4495d5fc9a94add5d91347d5153a2a52b544e21860f6ac", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "719212ab-2bff-4581-b60d-e36578236552", "node_type": "1", "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "41051abd04d53412dd43e6b427488739dcf055bcd4ba7fc9ed2c72080444e09b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "67cb5d79-a63d-4b93-a85f-9f897a4ff177", "node_type": "1", "metadata": {"window": "setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "autodiscover_tasks\n()"}, "hash": "72bf3087ac1f5eef01f581dcce2ecc62d4410663bb875dfffa846511fd0c40ac", "class_name": "RelatedNodeInfo"}}, "text": "config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n", "start_char_idx": 738, "end_char_idx": 864, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "67cb5d79-a63d-4b93-a85f-9f897a4ff177": {"__data__": {"id_": "67cb5d79-a63d-4b93-a85f-9f897a4ff177", "embedding": null, "metadata": {"window": "setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "autodiscover_tasks\n()", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47", "node_type": "4", "metadata": {"page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "5a922b98e496146e0a4495d5fc9a94add5d91347d5153a2a52b544e21860f6ac", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "759232c4-9bd4-48ed-a2ad-f970920ceeec", "node_type": "1", "metadata": {"window": "conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n autodiscover_tasks\n()", "original_text": "config_from_object\n(\n'django.conf:settings'\n,\nnamespace\n=\n\"CELERY\"\n)\n#\nCELERY\nBEAT\nSettings\napp.conf.beat_schedule\n=\n{\n}\napp.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "hash": "de300c2170be72597677511cbe9c3b4ead9570dc6b8dbb165160a3636033260f", "class_name": "RelatedNodeInfo"}}, "text": "autodiscover_tasks\n()", "start_char_idx": 864, "end_char_idx": 885, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "bf21b013-39f4-4eba-afc8-a33d85670371": {"__data__": {"id_": "bf21b013-39f4-4eba-afc8-a33d85670371", "embedding": null, "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n", "original_text": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d70f2fe5-84f2-47be-a540-e8180a49557a", "node_type": "4", "metadata": {"page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "hash": "dc0ed81528890b847a99e19a61f039a8f4cbf3f9e6585739e16121a91d576f7b", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "968920d7-bd82-4952-95a6-68a06af2bda0", "node_type": "1", "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "request\nimport\nRequest\nfrom\n.\n"}, "hash": "3efed4ebac097a32eb7e92cb21671c90170c4355e5046e136b218331bfc76623", "class_name": "RelatedNodeInfo"}}, "text": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n", "start_char_idx": 0, "end_char_idx": 126, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "968920d7-bd82-4952-95a6-68a06af2bda0": {"__data__": {"id_": "968920d7-bd82-4952-95a6-68a06af2bda0", "embedding": null, "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "request\nimport\nRequest\nfrom\n.\n", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d70f2fe5-84f2-47be-a540-e8180a49557a", "node_type": "4", "metadata": {"page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "hash": "dc0ed81528890b847a99e19a61f039a8f4cbf3f9e6585739e16121a91d576f7b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "bf21b013-39f4-4eba-afc8-a33d85670371", "node_type": "1", "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n", "original_text": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "hash": "f82942014fce47a0bd3b7470230155c2e732ae7c56a26b42241061fec2cdc3be", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "73bcd66c-2e87-4ade-be00-4d5267a0e495", "node_type": "1", "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n"}, "hash": "f2ec36861067eaebe42146719811d784c45f0f87efb954e2382370ac588dcb9a", "class_name": "RelatedNodeInfo"}}, "text": "request\nimport\nRequest\nfrom\n.\n", "start_char_idx": 126, "end_char_idx": 156, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "73bcd66c-2e87-4ade-be00-4d5267a0e495": {"__data__": {"id_": "73bcd66c-2e87-4ade-be00-4d5267a0e495", "embedding": null, "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d70f2fe5-84f2-47be-a540-e8180a49557a", "node_type": "4", "metadata": {"page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "hash": "dc0ed81528890b847a99e19a61f039a8f4cbf3f9e6585739e16121a91d576f7b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "968920d7-bd82-4952-95a6-68a06af2bda0", "node_type": "1", "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "request\nimport\nRequest\nfrom\n.\n", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "hash": "cad720b4c5d46ddb33947d761a5e213351f6835643e38f446a0864eb58e72ebc", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "9d9af823-92b9-4c61-89b6-9c5c1109e8b0", "node_type": "1", "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n"}, "hash": "826019468a9103f5dde1084398d5ef26e6e85ae44e632096bde2268697f77a7f", "class_name": "RelatedNodeInfo"}}, "text": "models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n", "start_char_idx": 156, "end_char_idx": 212, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "9d9af823-92b9-4c61-89b6-9c5c1109e8b0": {"__data__": {"id_": "9d9af823-92b9-4c61-89b6-9c5c1109e8b0", "embedding": null, "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d70f2fe5-84f2-47be-a540-e8180a49557a", "node_type": "4", "metadata": {"page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "hash": "dc0ed81528890b847a99e19a61f039a8f4cbf3f9e6585739e16121a91d576f7b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "73bcd66c-2e87-4ade-be00-4d5267a0e495", "node_type": "1", "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "hash": "993100d902c282d7e6653c2857aa7bbd2349ab671fb9ac7e87b1742b25c98aed", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "c0f29056-12b9-452a-ba99-b205d18c30d5", "node_type": "1", "metadata": {"window": "request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo"}, "hash": "1c08f23c650725e1649148c00f5ac7e6f90d830bc3ba85ba2f618a6527099bde", "class_name": "RelatedNodeInfo"}}, "text": "getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n", "start_char_idx": 212, "end_char_idx": 325, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "c0f29056-12b9-452a-ba99-b205d18c30d5": {"__data__": {"id_": "c0f29056-12b9-452a-ba99-b205d18c30d5", "embedding": null, "metadata": {"window": "request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "d70f2fe5-84f2-47be-a540-e8180a49557a", "node_type": "4", "metadata": {"page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "hash": "dc0ed81528890b847a99e19a61f039a8f4cbf3f9e6585739e16121a91d576f7b", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "9d9af823-92b9-4c61-89b6-9c5c1109e8b0", "node_type": "1", "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "original_text": "getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "hash": "257aac1d4575b3ae518724c761c83d5f0cd93a87c4d6d2e96c9691faed839d85", "class_name": "RelatedNodeInfo"}}, "text": "info\n(\nf\n'Total\nsum:\n{\nresult\n}\n'\n)\nreturn\nx\n+\ny\napp/view .py\nresult\n=\nadd\n.delay(\n4\n,\n4\n)\nCommands:\ncelery\n-A\npricetracker\nworker\n--pool=solo\n-l\ninfo\ncelery\n-A\npricetracker\nbeat\n-l\ninfo", "start_char_idx": 325, "end_char_idx": 511, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "243b2cae-0971-452c-aa04-1d071f92fa18": {"__data__": {"id_": "243b2cae-0971-452c-aa04-1d071f92fa18", "embedding": null, "metadata": {"window": "In\nWSL\nsudo\napt-get\ninstall\nredis-server\nsudo\nservice\nredis-server\nstatus\nsudo\nservice\nredis-server\nstart\nsudo\nservice\nredis-server\nstop\nBasic\nCommands\nSET\nkeyname\n\u201cvalue\u201d\nGET\nkeyname\nDEL\nKeyname\nMSET\nkey1\nvalue1\nkey2\nvalue2\nkey3\nvalue3\nMGET\nkey1\nkey2\nkey3\nGETRANGE\nkey\n0\n3\nGETRANGE\nkey\n-3\n-1\nSETRANGE\nkey\n2\nabc\nDECR\nkey1\nINCRBY\nkey\n5\nDECRBY\nkey\n5\nKEY\n*\nSet\nkey\nvalue\nget\n", "original_text": "In\nWSL\nsudo\napt-get\ninstall\nredis-server\nsudo\nservice\nredis-server\nstatus\nsudo\nservice\nredis-server\nstart\nsudo\nservice\nredis-server\nstop\nBasic\nCommands\nSET\nkeyname\n\u201cvalue\u201d\nGET\nkeyname\nDEL\nKeyname\nMSET\nkey1\nvalue1\nkey2\nvalue2\nkey3\nvalue3\nMGET\nkey1\nkey2\nkey3\nGETRANGE\nkey\n0\n3\nGETRANGE\nkey\n-3\n-1\nSETRANGE\nkey\n2\nabc\nDECR\nkey1\nINCRBY\nkey\n5\nDECRBY\nkey\n5\nKEY\n*\nSet\nkey\nvalue\nget\n", "page_label": "1", "file_name": "Redis.pdf", "doc_id": "9a84f96c-b223-4b26-8ccf-6dc9515ce9ed"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "9a84f96c-b223-4b26-8ccf-6dc9515ce9ed", "node_type": "4", "metadata": {"page_label": "1", "file_name": "Redis.pdf", "doc_id": "9a84f96c-b223-4b26-8ccf-6dc9515ce9ed"}, "hash": "47df0dceffab5a6e1f129f9a60b9aa0f1b5b3257b7aac31292b90d4821dd3db1", "class_name": "RelatedNodeInfo"}}, "text": "In\nWSL\nsudo\napt-get\ninstall\nredis-server\nsudo\nservice\nredis-server\nstatus\nsudo\nservice\nredis-server\nstart\nsudo\nservice\nredis-server\nstop\nBasic\nCommands\nSET\nkeyname\n\u201cvalue\u201d\nGET\nkeyname\nDEL\nKeyname\nMSET\nkey1\nvalue1\nkey2\nvalue2\nkey3\nvalue3\nMGET\nkey1\nkey2\nkey3\nGETRANGE\nkey\n0\n3\nGETRANGE\nkey\n-3\n-1\nSETRANGE\nkey\n2\nabc\nDECR\nkey1\nINCRBY\nkey\n5\nDECRBY\nkey\n5\nKEY\n*\nSet\nkey\nvalue\nget\n", "start_char_idx": 0, "end_char_idx": 372, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "7e60c684-f896-4dea-9bd7-7d27c5f299a8": {"__data__": {"id_": "7e60c684-f896-4dea-9bd7-7d27c5f299a8", "embedding": null, "metadata": {"window": "Sets\nSadd\nSrem\nSunion\nkey1\nkey2\nSismember\nkey\nvalue\nTypes\nSet\nList\nHash\nHSET\nbooks:1\nauthor\n\u201cauthorname\u201d\nHSET\nbooks:1\ntitle\n\u201ctitlename\u201d\nHset\nbooks:2\nfield\nvalue\nfield\nvalue\nSorted\nZADD\nbooks\n7\n\"dasf\"\n2\n\"dasv\"\n9\n'fasdfdas'\nJSON\nJSON.SET\nauthors:1\n$\u2019{\n\u201cName\u201d:\u201ddsadsvaf\u201d,\n\u201cAge\u201d:\u201ddsaf\u201d,\n\u2018Books\u2019:[\n{\n\u201cTitle\u201d:\u201ddsav\u201d,\n\u2018rating\u2019:\u2019vdsfdv\u2019,\n},\n{\n\u201cTitle\u201d:\u201ddsav\u201d,", "original_text": "Sets\nSadd\nSrem\nSunion\nkey1\nkey2\nSismember\nkey\nvalue\nTypes\nSet\nList\nHash\nHSET\nbooks:1\nauthor\n\u201cauthorname\u201d\nHSET\nbooks:1\ntitle\n\u201ctitlename\u201d\nHset\nbooks:2\nfield\nvalue\nfield\nvalue\nSorted\nZADD\nbooks\n7\n\"dasf\"\n2\n\"dasv\"\n9\n'fasdfdas'\nJSON\nJSON.SET\nauthors:1\n$\u2019{\n\u201cName\u201d:\u201ddsadsvaf\u201d,\n\u201cAge\u201d:\u201ddsaf\u201d,\n\u2018Books\u2019:[\n{\n\u201cTitle\u201d:\u201ddsav\u201d,\n\u2018rating\u2019:\u2019vdsfdv\u2019,\n},\n{\n\u201cTitle\u201d:\u201ddsav\u201d,", "page_label": "2", "file_name": "Redis.pdf", "doc_id": "a6f214f7-4ed5-4554-9667-3a05dd0a7a69"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "a6f214f7-4ed5-4554-9667-3a05dd0a7a69", "node_type": "4", "metadata": {"page_label": "2", "file_name": "Redis.pdf", "doc_id": "a6f214f7-4ed5-4554-9667-3a05dd0a7a69"}, "hash": "afbf53b165a2246eefb31f80e9648ae8cc23a6a31ca3a92be8e683ccc5c1f66c", "class_name": "RelatedNodeInfo"}}, "text": "Sets\nSadd\nSrem\nSunion\nkey1\nkey2\nSismember\nkey\nvalue\nTypes\nSet\nList\nHash\nHSET\nbooks:1\nauthor\n\u201cauthorname\u201d\nHSET\nbooks:1\ntitle\n\u201ctitlename\u201d\nHset\nbooks:2\nfield\nvalue\nfield\nvalue\nSorted\nZADD\nbooks\n7\n\"dasf\"\n2\n\"dasv\"\n9\n'fasdfdas'\nJSON\nJSON.SET\nauthors:1\n$\u2019{\n\u201cName\u201d:\u201ddsadsvaf\u201d,\n\u201cAge\u201d:\u201ddsaf\u201d,\n\u2018Books\u2019:[\n{\n\u201cTitle\u201d:\u201ddsav\u201d,\n\u2018rating\u2019:\u2019vdsfdv\u2019,\n},\n{\n\u201cTitle\u201d:\u201ddsav\u201d,", "start_char_idx": 0, "end_char_idx": 350, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "95c10e98-6535-4758-ac9c-cdce1ed37540": {"__data__": {"id_": "95c10e98-6535-4758-ac9c-cdce1ed37540", "embedding": null, "metadata": {"window": "\u2018rating\u2019:\u2019vdsfdv\u2019,\n}\n]\n}\u2019\nJSON.GET\nauthors:1\n$.name", "original_text": "\u2018rating\u2019:\u2019vdsfdv\u2019,\n}\n]\n}\u2019\nJSON.GET\nauthors:1\n$.name", "page_label": "3", "file_name": "Redis.pdf", "doc_id": "91563704-8392-4968-ba86-b66551507609"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "91563704-8392-4968-ba86-b66551507609", "node_type": "4", "metadata": {"page_label": "3", "file_name": "Redis.pdf", "doc_id": "91563704-8392-4968-ba86-b66551507609"}, "hash": "3363878293e2efcd514726d9b57978951d06062cc1eb2afdd6f2c192e6f5fafb", "class_name": "RelatedNodeInfo"}}, "text": "\u2018rating\u2019:\u2019vdsfdv\u2019,\n}\n]\n}\u2019\nJSON.GET\nauthors:1\n$.name", "start_char_idx": 0, "end_char_idx": 51, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "13b8d581-8998-407a-86e8-4f1a70456028": {"__data__": {"id_": "13b8d581-8998-407a-86e8-4f1a70456028", "embedding": null, "metadata": {"window": "s \n\n\n , , , , , , \n\n \n\n , , , , , , \n\n1 \ny. - \n\n\n , , , , , , \n\ns \n\n\n , , , , , , , , , , , , \n\n \n\n , , , , , , , , , , , ,", "original_text": "s \n\n\n , , , , , , \n\n \n\n , , , , , , \n\n1 \ny. ", "file_name": "conda-4.14_ocr.docx", "doc_id": "3e116485-f52b-48d9-8072-b57ca300433d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3e116485-f52b-48d9-8072-b57ca300433d", "node_type": "4", "metadata": {"file_name": "conda-4.14_ocr.docx", "doc_id": "3e116485-f52b-48d9-8072-b57ca300433d"}, "hash": "27d0ddf368c4a796924b8f4395baf455ec231d2ca976aa5682b9073535c84497", "class_name": "RelatedNodeInfo"}, "3": {"node_id": "a35cb220-4533-42b3-a062-56ea0cf37bc0", "node_type": "1", "metadata": {"window": "s \n\n\n , , , , , , \n\n \n\n , , , , , , \n\n1 \ny. - \n\n\n , , , , , , \n\ns \n\n\n , , , , , , , , , , , , \n\n \n\n , , , , , , , , , , , ,", "original_text": "- \n\n\n , , , , , , \n\ns \n\n\n , , , , , , , , , , , , \n\n \n\n , , , , , , , , , , , ,"}, "hash": "79cdedcd029b4384d8918e7c0544965b564cf4c54d88a900bbc5294e58164dcf", "class_name": "RelatedNodeInfo"}}, "text": "s \n\n\n , , , , , , \n\n \n\n , , , , , , \n\n1 \ny. ", "start_char_idx": 0, "end_char_idx": 54, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}, "a35cb220-4533-42b3-a062-56ea0cf37bc0": {"__data__": {"id_": "a35cb220-4533-42b3-a062-56ea0cf37bc0", "embedding": null, "metadata": {"window": "s \n\n\n , , , , , , \n\n \n\n , , , , , , \n\n1 \ny. - \n\n\n , , , , , , \n\ns \n\n\n , , , , , , , , , , , , \n\n \n\n , , , , , , , , , , , ,", "original_text": "- \n\n\n , , , , , , \n\ns \n\n\n , , , , , , , , , , , , \n\n \n\n , , , , , , , , , , , ,", "file_name": "conda-4.14_ocr.docx", "doc_id": "3e116485-f52b-48d9-8072-b57ca300433d"}, "excluded_embed_metadata_keys": ["doc_id", "window", "original_text"], "excluded_llm_metadata_keys": ["file_name", "doc_id", "page_label", "window", "original_text"], "relationships": {"1": {"node_id": "3e116485-f52b-48d9-8072-b57ca300433d", "node_type": "4", "metadata": {"file_name": "conda-4.14_ocr.docx", "doc_id": "3e116485-f52b-48d9-8072-b57ca300433d"}, "hash": "27d0ddf368c4a796924b8f4395baf455ec231d2ca976aa5682b9073535c84497", "class_name": "RelatedNodeInfo"}, "2": {"node_id": "13b8d581-8998-407a-86e8-4f1a70456028", "node_type": "1", "metadata": {"window": "s \n\n\n , , , , , , \n\n \n\n , , , , , , \n\n1 \ny. - \n\n\n , , , , , , \n\ns \n\n\n , , , , , , , , , , , , \n\n \n\n , , , , , , , , , , , ,", "original_text": "s \n\n\n , , , , , , \n\n \n\n , , , , , , \n\n1 \ny. ", "file_name": "conda-4.14_ocr.docx", "doc_id": "3e116485-f52b-48d9-8072-b57ca300433d"}, "hash": "3fa69ec63a8dd3b836cd616b1c1391a3e80aa0271b1ee25b752d7937d08018c4", "class_name": "RelatedNodeInfo"}}, "text": "- \n\n\n , , , , , , \n\ns \n\n\n , , , , , , , , , , , , \n\n \n\n , , , , , , , , , , , ,", "start_char_idx": 54, "end_char_idx": 160, "text_template": "{metadata_str}\n\n{content}", "metadata_template": "{key}: {value}", "metadata_seperator": "\n", "class_name": "TextNode"}, "__type__": "1"}}, "docstore/metadata": {"1b9357d6-4c8e-40b1-bc5b-d13f4c07db7d": {"doc_hash": "6db682965a2f34a93d6424d0872559f122811b0492c1d9efe0b7c8d60f9624e9", "ref_doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "9a7dd336-5118-472f-b99d-c4c0fa26c21c": {"doc_hash": "fef942eb48215271c9121fb4306eced65050ad0906bbc358ff2f87f7b6a12aaa", "ref_doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "8e356062-c915-43f4-8410-08a1b8c52ee3": {"doc_hash": "e72786bbca13e53c5ffbd2825f1c8e18ced4f5e857b9115e18f6836bb53ea659", "ref_doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "719212ab-2bff-4581-b60d-e36578236552": {"doc_hash": "41051abd04d53412dd43e6b427488739dcf055bcd4ba7fc9ed2c72080444e09b", "ref_doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "759232c4-9bd4-48ed-a2ad-f970920ceeec": {"doc_hash": "de300c2170be72597677511cbe9c3b4ead9570dc6b8dbb165160a3636033260f", "ref_doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "67cb5d79-a63d-4b93-a85f-9f897a4ff177": {"doc_hash": "2a077c6dd854e63c49efc46264a2fd1f11c9597091cffa4a003f1c80131a9eb6", "ref_doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}, "6158d5cb-d1f1-4723-a60d-a49b65814d47": {"doc_hash": "5a922b98e496146e0a4495d5fc9a94add5d91347d5153a2a52b544e21860f6ac"}, "bf21b013-39f4-4eba-afc8-a33d85670371": {"doc_hash": "f82942014fce47a0bd3b7470230155c2e732ae7c56a26b42241061fec2cdc3be", "ref_doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "968920d7-bd82-4952-95a6-68a06af2bda0": {"doc_hash": "cad720b4c5d46ddb33947d761a5e213351f6835643e38f446a0864eb58e72ebc", "ref_doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "73bcd66c-2e87-4ade-be00-4d5267a0e495": {"doc_hash": "993100d902c282d7e6653c2857aa7bbd2349ab671fb9ac7e87b1742b25c98aed", "ref_doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "9d9af823-92b9-4c61-89b6-9c5c1109e8b0": {"doc_hash": "257aac1d4575b3ae518724c761c83d5f0cd93a87c4d6d2e96c9691faed839d85", "ref_doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "c0f29056-12b9-452a-ba99-b205d18c30d5": {"doc_hash": "68f15a58b6af06088a5f8527e195338f3b4f5d21f65280f416b715d93906f93c", "ref_doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}, "d70f2fe5-84f2-47be-a540-e8180a49557a": {"doc_hash": "dc0ed81528890b847a99e19a61f039a8f4cbf3f9e6585739e16121a91d576f7b"}, "243b2cae-0971-452c-aa04-1d071f92fa18": {"doc_hash": "6b3cc2640607aff646b0469364cdce368f52ab6b4c1d556e222beb841c4305d1", "ref_doc_id": "9a84f96c-b223-4b26-8ccf-6dc9515ce9ed"}, "9a84f96c-b223-4b26-8ccf-6dc9515ce9ed": {"doc_hash": "47df0dceffab5a6e1f129f9a60b9aa0f1b5b3257b7aac31292b90d4821dd3db1"}, "7e60c684-f896-4dea-9bd7-7d27c5f299a8": {"doc_hash": "cb21936ab9130041a8b1756a781b1de0796dc58893d3b0320baccec1a17ff0d3", "ref_doc_id": "a6f214f7-4ed5-4554-9667-3a05dd0a7a69"}, "a6f214f7-4ed5-4554-9667-3a05dd0a7a69": {"doc_hash": "afbf53b165a2246eefb31f80e9648ae8cc23a6a31ca3a92be8e683ccc5c1f66c"}, "95c10e98-6535-4758-ac9c-cdce1ed37540": {"doc_hash": "c3eae7d4a0fc42872ce1cbbfaf68a563a6391e7dad9385d6c522d5c7581198d7", "ref_doc_id": "91563704-8392-4968-ba86-b66551507609"}, "91563704-8392-4968-ba86-b66551507609": {"doc_hash": "3363878293e2efcd514726d9b57978951d06062cc1eb2afdd6f2c192e6f5fafb"}, "13b8d581-8998-407a-86e8-4f1a70456028": {"doc_hash": "3fa69ec63a8dd3b836cd616b1c1391a3e80aa0271b1ee25b752d7937d08018c4", "ref_doc_id": "3e116485-f52b-48d9-8072-b57ca300433d"}, "a35cb220-4533-42b3-a062-56ea0cf37bc0": {"doc_hash": "f062329beed4b8c42c00cbf0fda8dda472ff21601fbb0a48bb91430ea5dc33f1", "ref_doc_id": "3e116485-f52b-48d9-8072-b57ca300433d"}, "3e116485-f52b-48d9-8072-b57ca300433d": {"doc_hash": "27d0ddf368c4a796924b8f4395baf455ec231d2ca976aa5682b9073535c84497"}}, "docstore/ref_doc_info": {"6158d5cb-d1f1-4723-a60d-a49b65814d47": {"node_ids": ["1b9357d6-4c8e-40b1-bc5b-d13f4c07db7d", "9a7dd336-5118-472f-b99d-c4c0fa26c21c", "8e356062-c915-43f4-8410-08a1b8c52ee3", "719212ab-2bff-4581-b60d-e36578236552", "759232c4-9bd4-48ed-a2ad-f970920ceeec", "67cb5d79-a63d-4b93-a85f-9f897a4ff177"], "metadata": {"window": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n conf\nimport\nsettings\nimport\nos\n#settings\nos\n.environ.\n setdefault\n(\n\"DJANGO_SETTINGS_MODULE\"\n,\n\"pricetracker.settings\"\n)\napp\n=\nCelery\n(\n\"pricetracker\"\n)\napp.conf.enable_utc\n=\nFalse\napp.conf.\n update\n(\ntimezone\n=\n'Asia/Kathmandu'\n)\napp.\n", "original_text": "In\nproject/setting.py\nCELERY_BROKER_URL\n=\n'redis://localhost:6379'\n#\nCELERY_ACCEPT_CONTENT\n=\n['application/json']\n#\nCELERY_RESULT_SERIALIZER\n=\n'json'\n#\nCELERY_TASK_SERIALIZER\n=\n'json'\nCELERY_RESULT_BACKEND\n=\n'redis://localhost:6379'\nCELERY_TIMEZONE\n=\n'Asia/Kathmandu'\nCELERY_BEAT_SCHEDULE\n=\n{\n'task-trackprice'\n:{\n'task'\n:\n'tracker.tasks.add'\n,\n'schedule'\n:\n10.0\n,\n'args'\n:(\n4\n,\n4\n),\n}\n}\npeoject/Celery .py\nfrom\n__future__\nimport\nabsolute_import\n,unicode_literals\nfrom\ncelery\nimport\nCelery\nfrom\ndjango\n.\n", "page_label": "1", "file_name": "Celery.pdf", "doc_id": "6158d5cb-d1f1-4723-a60d-a49b65814d47"}}, "d70f2fe5-84f2-47be-a540-e8180a49557a": {"node_ids": ["bf21b013-39f4-4eba-afc8-a33d85670371", "968920d7-bd82-4952-95a6-68a06af2bda0", "73bcd66c-2e87-4ade-be00-4d5267a0e495", "9d9af823-92b9-4c61-89b6-9c5c1109e8b0", "c0f29056-12b9-452a-ba99-b205d18c30d5"], "metadata": {"window": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n request\nimport\nRequest\nfrom\n.\n models\nimport\nProduct\nimport\nlogging\nlogger\n=\nlogging\n.\n getLogger\n(__name__)\n@shared_task\ndef\nadd\n(\nx\n,\ny\n):\nprint\n(\nf\n'total\nsum\n=\n{\nx\n+\ny\n}\n'\n)\nresult\n=\nx\n+\ny\nlogger.\n", "original_text": "app/task.py\nfrom\n__future__\nimport\nabsolute_import,\nunicode_literals\nimport\ntime\nfrom\ncelery\nimport\nshared_task\nfrom\nurllib\n.\n", "page_label": "2", "file_name": "Celery.pdf", "doc_id": "d70f2fe5-84f2-47be-a540-e8180a49557a"}}, "9a84f96c-b223-4b26-8ccf-6dc9515ce9ed": {"node_ids": ["243b2cae-0971-452c-aa04-1d071f92fa18"], "metadata": {"window": "In\nWSL\nsudo\napt-get\ninstall\nredis-server\nsudo\nservice\nredis-server\nstatus\nsudo\nservice\nredis-server\nstart\nsudo\nservice\nredis-server\nstop\nBasic\nCommands\nSET\nkeyname\n\u201cvalue\u201d\nGET\nkeyname\nDEL\nKeyname\nMSET\nkey1\nvalue1\nkey2\nvalue2\nkey3\nvalue3\nMGET\nkey1\nkey2\nkey3\nGETRANGE\nkey\n0\n3\nGETRANGE\nkey\n-3\n-1\nSETRANGE\nkey\n2\nabc\nDECR\nkey1\nINCRBY\nkey\n5\nDECRBY\nkey\n5\nKEY\n*\nSet\nkey\nvalue\nget\n", "original_text": "In\nWSL\nsudo\napt-get\ninstall\nredis-server\nsudo\nservice\nredis-server\nstatus\nsudo\nservice\nredis-server\nstart\nsudo\nservice\nredis-server\nstop\nBasic\nCommands\nSET\nkeyname\n\u201cvalue\u201d\nGET\nkeyname\nDEL\nKeyname\nMSET\nkey1\nvalue1\nkey2\nvalue2\nkey3\nvalue3\nMGET\nkey1\nkey2\nkey3\nGETRANGE\nkey\n0\n3\nGETRANGE\nkey\n-3\n-1\nSETRANGE\nkey\n2\nabc\nDECR\nkey1\nINCRBY\nkey\n5\nDECRBY\nkey\n5\nKEY\n*\nSet\nkey\nvalue\nget\n", "page_label": "1", "file_name": "Redis.pdf", "doc_id": "9a84f96c-b223-4b26-8ccf-6dc9515ce9ed"}}, "a6f214f7-4ed5-4554-9667-3a05dd0a7a69": {"node_ids": ["7e60c684-f896-4dea-9bd7-7d27c5f299a8"], "metadata": {"window": "Sets\nSadd\nSrem\nSunion\nkey1\nkey2\nSismember\nkey\nvalue\nTypes\nSet\nList\nHash\nHSET\nbooks:1\nauthor\n\u201cauthorname\u201d\nHSET\nbooks:1\ntitle\n\u201ctitlename\u201d\nHset\nbooks:2\nfield\nvalue\nfield\nvalue\nSorted\nZADD\nbooks\n7\n\"dasf\"\n2\n\"dasv\"\n9\n'fasdfdas'\nJSON\nJSON.SET\nauthors:1\n$\u2019{\n\u201cName\u201d:\u201ddsadsvaf\u201d,\n\u201cAge\u201d:\u201ddsaf\u201d,\n\u2018Books\u2019:[\n{\n\u201cTitle\u201d:\u201ddsav\u201d,\n\u2018rating\u2019:\u2019vdsfdv\u2019,\n},\n{\n\u201cTitle\u201d:\u201ddsav\u201d,", "original_text": "Sets\nSadd\nSrem\nSunion\nkey1\nkey2\nSismember\nkey\nvalue\nTypes\nSet\nList\nHash\nHSET\nbooks:1\nauthor\n\u201cauthorname\u201d\nHSET\nbooks:1\ntitle\n\u201ctitlename\u201d\nHset\nbooks:2\nfield\nvalue\nfield\nvalue\nSorted\nZADD\nbooks\n7\n\"dasf\"\n2\n\"dasv\"\n9\n'fasdfdas'\nJSON\nJSON.SET\nauthors:1\n$\u2019{\n\u201cName\u201d:\u201ddsadsvaf\u201d,\n\u201cAge\u201d:\u201ddsaf\u201d,\n\u2018Books\u2019:[\n{\n\u201cTitle\u201d:\u201ddsav\u201d,\n\u2018rating\u2019:\u2019vdsfdv\u2019,\n},\n{\n\u201cTitle\u201d:\u201ddsav\u201d,", "page_label": "2", "file_name": "Redis.pdf", "doc_id": "a6f214f7-4ed5-4554-9667-3a05dd0a7a69"}}, "91563704-8392-4968-ba86-b66551507609": {"node_ids": ["95c10e98-6535-4758-ac9c-cdce1ed37540"], "metadata": {"window": "\u2018rating\u2019:\u2019vdsfdv\u2019,\n}\n]\n}\u2019\nJSON.GET\nauthors:1\n$.name", "original_text": "\u2018rating\u2019:\u2019vdsfdv\u2019,\n}\n]\n}\u2019\nJSON.GET\nauthors:1\n$.name", "page_label": "3", "file_name": "Redis.pdf", "doc_id": "91563704-8392-4968-ba86-b66551507609"}}, "3e116485-f52b-48d9-8072-b57ca300433d": {"node_ids": ["13b8d581-8998-407a-86e8-4f1a70456028", "a35cb220-4533-42b3-a062-56ea0cf37bc0"], "metadata": {"window": "s \n\n\n , , , , , , \n\n \n\n , , , , , , \n\n1 \ny. - \n\n\n , , , , , , \n\ns \n\n\n , , , , , , , , , , , , \n\n \n\n , , , , , , , , , , , ,", "original_text": "s \n\n\n , , , , , , \n\n \n\n , , , , , , \n\n1 \ny. ", "file_name": "conda-4.14_ocr.docx", "doc_id": "3e116485-f52b-48d9-8072-b57ca300433d"}}}} \ No newline at end of file diff --git a/local_data/private_gpt/index_store.json b/local_data/private_gpt/index_store.json index 9d02951c..63f176cb 100644 --- a/local_data/private_gpt/index_store.json +++ b/local_data/private_gpt/index_store.json @@ -1 +1 @@ -{"index_store/data": {"33fb1cbc-3e5e-4c1c-826c-fc331c85bc2a": {"__type__": "vector_store", "__data__": "{\"index_id\": \"33fb1cbc-3e5e-4c1c-826c-fc331c85bc2a\", \"summary\": null, \"nodes_dict\": {\"6a631852-fb8e-4ca6-8cb0-1e3b7b881be0\": \"6a631852-fb8e-4ca6-8cb0-1e3b7b881be0\", \"5494819d-a99c-4902-ac0a-ae3353796805\": \"5494819d-a99c-4902-ac0a-ae3353796805\", \"c2c51f1a-3c4c-4f7c-b814-4da4ef71765b\": \"c2c51f1a-3c4c-4f7c-b814-4da4ef71765b\", \"24a22607-3347-48a6-ba9e-d72156f02a9b\": \"24a22607-3347-48a6-ba9e-d72156f02a9b\", \"83143d31-b3ca-4cbc-bfc9-1dab636c966a\": \"83143d31-b3ca-4cbc-bfc9-1dab636c966a\", \"68a75094-0a21-47c5-b93e-c35a8d18d947\": \"68a75094-0a21-47c5-b93e-c35a8d18d947\", \"d0f5d94a-a64e-4cd1-b52d-9fb0f2113a21\": \"d0f5d94a-a64e-4cd1-b52d-9fb0f2113a21\", \"b02533b8-c391-4c12-b275-64526272c0bf\": \"b02533b8-c391-4c12-b275-64526272c0bf\", \"d028ff1f-c35d-46cc-bd7f-0ea3a655e513\": \"d028ff1f-c35d-46cc-bd7f-0ea3a655e513\", \"83509f26-a88a-45a3-b0cd-4db3cdca12ae\": \"83509f26-a88a-45a3-b0cd-4db3cdca12ae\", \"45e2c9d6-f52d-456d-b335-2ff8a3efc624\": \"45e2c9d6-f52d-456d-b335-2ff8a3efc624\", \"f4dde1b9-a171-4ba5-84f9-f033722675e0\": \"f4dde1b9-a171-4ba5-84f9-f033722675e0\", \"f6e1d1a5-cf15-41ab-9d85-c1884305d548\": \"f6e1d1a5-cf15-41ab-9d85-c1884305d548\", \"1564a509-3858-4618-8b3e-f251f2d7eb84\": \"1564a509-3858-4618-8b3e-f251f2d7eb84\", \"866a4b6f-aee8-47d9-be5d-feaa3acad45b\": \"866a4b6f-aee8-47d9-be5d-feaa3acad45b\", \"5250640b-2a90-4a3f-beae-e9c425b2e409\": \"5250640b-2a90-4a3f-beae-e9c425b2e409\", \"f09ad18b-809e-48c1-9594-08c0e7cd94e8\": \"f09ad18b-809e-48c1-9594-08c0e7cd94e8\", \"27006bda-d38e-440b-9b44-51cb0c237139\": \"27006bda-d38e-440b-9b44-51cb0c237139\", \"b83b8665-b20a-40cd-8635-744eb32f0865\": \"b83b8665-b20a-40cd-8635-744eb32f0865\", \"cb949682-7cf9-433d-a818-d9095bc087fc\": \"cb949682-7cf9-433d-a818-d9095bc087fc\", \"e8aaccc0-ad4a-4d97-a3cc-ede7c776cbe1\": \"e8aaccc0-ad4a-4d97-a3cc-ede7c776cbe1\", \"58e7818c-f650-401b-9c01-7d3905c2407b\": \"58e7818c-f650-401b-9c01-7d3905c2407b\", \"ddec1dd2-5542-4cf6-9516-364a188cb50c\": \"ddec1dd2-5542-4cf6-9516-364a188cb50c\", \"3d634f4a-6464-4604-b2ce-c9c1644b3d6e\": \"3d634f4a-6464-4604-b2ce-c9c1644b3d6e\", \"a07eb1c6-055b-4024-b693-e46624363a24\": \"a07eb1c6-055b-4024-b693-e46624363a24\", \"7b7b6905-0f25-4a92-8974-653add4ae317\": \"7b7b6905-0f25-4a92-8974-653add4ae317\", \"e1333b08-9d0d-4c3b-a8cd-f51cb20d7314\": \"e1333b08-9d0d-4c3b-a8cd-f51cb20d7314\", \"4fe7d6bf-eb33-493b-8b7a-23f0c94b5153\": \"4fe7d6bf-eb33-493b-8b7a-23f0c94b5153\", \"7da8e5a7-784b-4f29-84f7-8d458417c35e\": \"7da8e5a7-784b-4f29-84f7-8d458417c35e\", \"22465b8a-248a-4772-ad2a-fbd03e55b3bf\": \"22465b8a-248a-4772-ad2a-fbd03e55b3bf\", \"0ecb0ff8-e372-4eaa-8208-e819b5a1714b\": \"0ecb0ff8-e372-4eaa-8208-e819b5a1714b\", \"192d43fd-b604-4e93-accc-cc6f5d07cdf9\": \"192d43fd-b604-4e93-accc-cc6f5d07cdf9\", \"6f129632-3f87-44a7-989c-ec9c49d59bc6\": \"6f129632-3f87-44a7-989c-ec9c49d59bc6\", \"f4706536-f8da-4795-92dc-d4c1071a07cd\": \"f4706536-f8da-4795-92dc-d4c1071a07cd\", \"cbaafd8e-06d1-4576-9bc1-d93dad3170b8\": \"cbaafd8e-06d1-4576-9bc1-d93dad3170b8\", \"5b642f65-112a-43d4-9b14-335caa53070d\": \"5b642f65-112a-43d4-9b14-335caa53070d\", \"65481478-3f66-4cc5-9784-6b8c54661654\": \"65481478-3f66-4cc5-9784-6b8c54661654\", \"0026c333-d487-4ad1-82eb-c7465cb926b8\": \"0026c333-d487-4ad1-82eb-c7465cb926b8\", \"65f5353c-1f93-436f-95b4-4aa3f60e03fc\": \"65f5353c-1f93-436f-95b4-4aa3f60e03fc\", \"4436eb3c-9c54-4893-8d62-32bb42cb46ef\": \"4436eb3c-9c54-4893-8d62-32bb42cb46ef\", \"dbe20a2a-1fc4-47c8-b82d-8cc0d59ce39e\": \"dbe20a2a-1fc4-47c8-b82d-8cc0d59ce39e\", \"8b7b9878-5693-439a-a23e-4cc6d1493350\": \"8b7b9878-5693-439a-a23e-4cc6d1493350\", \"95f99dab-63db-4b78-826d-696a8ff66ab9\": \"95f99dab-63db-4b78-826d-696a8ff66ab9\", \"bc64b8ee-928f-4d28-876b-fd773677e984\": \"bc64b8ee-928f-4d28-876b-fd773677e984\", \"3abde7ec-f74a-4629-b17d-67475d92da1f\": \"3abde7ec-f74a-4629-b17d-67475d92da1f\", \"7fdda8db-5310-487c-8bf5-6fa4fd27794d\": \"7fdda8db-5310-487c-8bf5-6fa4fd27794d\", \"9a94a297-d0f9-4898-9f65-0144aad5c26f\": \"9a94a297-d0f9-4898-9f65-0144aad5c26f\", \"3bc654c1-d5f3-4b58-8b5a-99a5ac5b7e07\": \"3bc654c1-d5f3-4b58-8b5a-99a5ac5b7e07\", \"cadbd380-380b-4f8e-929d-4bb1555aeb54\": \"cadbd380-380b-4f8e-929d-4bb1555aeb54\", \"ecd2acb0-bb8e-4f4d-9780-e3281c776920\": \"ecd2acb0-bb8e-4f4d-9780-e3281c776920\", \"078d64c7-eccc-4149-9a17-fb2926c65eb9\": \"078d64c7-eccc-4149-9a17-fb2926c65eb9\", \"69bc62b7-4d5c-452a-9b92-270911d4a0fe\": \"69bc62b7-4d5c-452a-9b92-270911d4a0fe\", \"28a8185c-f125-4827-b001-61b93cd4bcc4\": \"28a8185c-f125-4827-b001-61b93cd4bcc4\", \"f7144879-9b5e-4f29-bbf9-386cb07ef6fa\": \"f7144879-9b5e-4f29-bbf9-386cb07ef6fa\", \"c511a92a-648f-4757-a9ad-d7f0323a2184\": \"c511a92a-648f-4757-a9ad-d7f0323a2184\", \"1e866be3-ffe5-46cf-b4a3-8ac41f938b69\": \"1e866be3-ffe5-46cf-b4a3-8ac41f938b69\", \"b6af877d-2390-4bd8-a6d2-6ed4a772215d\": \"b6af877d-2390-4bd8-a6d2-6ed4a772215d\", \"d0b11037-1945-40ec-8ab3-47921d1fadcb\": \"d0b11037-1945-40ec-8ab3-47921d1fadcb\", \"7fd8f050-d87e-41cc-9c63-0003e5ee1544\": \"7fd8f050-d87e-41cc-9c63-0003e5ee1544\", \"a77ba583-0f1d-46b2-8ff7-ae17479ce0fd\": \"a77ba583-0f1d-46b2-8ff7-ae17479ce0fd\", \"300666de-ee99-4e70-879a-f6089faafc46\": \"300666de-ee99-4e70-879a-f6089faafc46\", \"fc29303b-07ce-4727-be27-983181f9f61e\": \"fc29303b-07ce-4727-be27-983181f9f61e\", \"f8cbb712-32b8-4562-bde4-fb725b3d9205\": \"f8cbb712-32b8-4562-bde4-fb725b3d9205\", \"5d9e999c-18a0-4cb2-9926-50c308eb129b\": \"5d9e999c-18a0-4cb2-9926-50c308eb129b\", \"a56e9c7d-5513-45d6-a642-be7af0c2e85c\": \"a56e9c7d-5513-45d6-a642-be7af0c2e85c\", \"6a803b57-49fc-48ca-9393-972328ee4732\": \"6a803b57-49fc-48ca-9393-972328ee4732\", \"02ca96c4-6d09-4dc8-92cc-b544eedf62f1\": \"02ca96c4-6d09-4dc8-92cc-b544eedf62f1\", \"ed46bb94-ddc0-496e-b660-7dc1414efb5a\": \"ed46bb94-ddc0-496e-b660-7dc1414efb5a\", \"2bad9597-31ad-4288-9dce-b385ed1aac1a\": \"2bad9597-31ad-4288-9dce-b385ed1aac1a\", \"8ded3bcf-f8a8-461b-a4b9-9a85d82797f3\": \"8ded3bcf-f8a8-461b-a4b9-9a85d82797f3\", \"3b9a25ca-ad51-446a-b03e-3ebd0d40242d\": \"3b9a25ca-ad51-446a-b03e-3ebd0d40242d\", \"58185f9d-bf2a-443c-bc76-f5bfe06ec79a\": \"58185f9d-bf2a-443c-bc76-f5bfe06ec79a\", \"e2622ce4-abb8-4d42-86d9-966ce0b9ca15\": \"e2622ce4-abb8-4d42-86d9-966ce0b9ca15\", \"9949ac58-0bff-4791-bb37-9b42df6977db\": \"9949ac58-0bff-4791-bb37-9b42df6977db\", \"5214c1b3-9682-48b2-a25e-f4d5879a1a65\": \"5214c1b3-9682-48b2-a25e-f4d5879a1a65\", \"9e2d2d43-625d-4106-8d00-c47da6bd20c3\": \"9e2d2d43-625d-4106-8d00-c47da6bd20c3\", \"d6b690e6-46f0-492f-8f4b-3a7a80d07138\": \"d6b690e6-46f0-492f-8f4b-3a7a80d07138\", \"df93033a-8dd3-49f7-b348-763d0b48e612\": \"df93033a-8dd3-49f7-b348-763d0b48e612\", \"5a860cda-b415-4d83-aa50-ae5b9e63b858\": \"5a860cda-b415-4d83-aa50-ae5b9e63b858\", \"01fe664f-3b2a-46d1-b8bb-7d45779f69f6\": \"01fe664f-3b2a-46d1-b8bb-7d45779f69f6\", \"bcdc7243-9dd5-445b-b2b7-358c669c8893\": \"bcdc7243-9dd5-445b-b2b7-358c669c8893\", \"966263e0-1f7b-4cc1-8815-c3f548f11def\": \"966263e0-1f7b-4cc1-8815-c3f548f11def\", \"df0da444-94fc-4ca2-99eb-20c90d355490\": \"df0da444-94fc-4ca2-99eb-20c90d355490\", \"adb544e2-adb7-4b83-a8aa-cefb1f2db533\": \"adb544e2-adb7-4b83-a8aa-cefb1f2db533\", \"100c5e3f-39bf-4e91-8a77-6be51ab4a2a1\": \"100c5e3f-39bf-4e91-8a77-6be51ab4a2a1\", \"5f79533d-d369-490f-9016-5149f141ebc5\": \"5f79533d-d369-490f-9016-5149f141ebc5\", \"05c844be-7464-4e7c-913c-5ffbce72216d\": \"05c844be-7464-4e7c-913c-5ffbce72216d\", \"e1e2da1d-700d-405d-8f91-cf85a3d0298c\": \"e1e2da1d-700d-405d-8f91-cf85a3d0298c\", \"77272b59-5423-4d64-9966-838372f1baf0\": \"77272b59-5423-4d64-9966-838372f1baf0\", \"2e3ae5c2-1359-477f-8d03-f94011102462\": \"2e3ae5c2-1359-477f-8d03-f94011102462\", \"e2638c82-3b0f-4b13-bb08-7dda091f3742\": \"e2638c82-3b0f-4b13-bb08-7dda091f3742\", \"490925cf-dc04-479d-9867-e2198bb474a1\": \"490925cf-dc04-479d-9867-e2198bb474a1\", \"b33fb72e-9070-4eae-a7b0-c567c9f6ea22\": \"b33fb72e-9070-4eae-a7b0-c567c9f6ea22\", \"49b8caf2-6a12-493b-ad4c-0f93bcd226dd\": \"49b8caf2-6a12-493b-ad4c-0f93bcd226dd\", \"95c6c4a4-fa11-42d8-9f26-8a79039a5c52\": \"95c6c4a4-fa11-42d8-9f26-8a79039a5c52\", \"7bd2d852-2912-49ec-a0a2-20b8af746cd7\": \"7bd2d852-2912-49ec-a0a2-20b8af746cd7\", \"ce14dbf8-5e64-4a1c-ab0c-fd33f4c88197\": \"ce14dbf8-5e64-4a1c-ab0c-fd33f4c88197\", \"611a01a0-1846-4956-afa8-1721c7e159c6\": \"611a01a0-1846-4956-afa8-1721c7e159c6\", \"dc6ba06b-d8da-41cc-9bfe-2278eea4e56a\": \"dc6ba06b-d8da-41cc-9bfe-2278eea4e56a\", \"93c1fbbd-2699-4ae1-9962-68a0659657e4\": \"93c1fbbd-2699-4ae1-9962-68a0659657e4\", \"8f813959-7893-486a-8d03-714339c68ce4\": \"8f813959-7893-486a-8d03-714339c68ce4\", \"f05a433d-ed66-4ed2-833c-2883a8db685a\": \"f05a433d-ed66-4ed2-833c-2883a8db685a\", \"28408e6d-fbfd-45e2-bc90-cb420df61123\": \"28408e6d-fbfd-45e2-bc90-cb420df61123\", \"6a5bd365-07fd-49c3-bbee-d97f50e051da\": \"6a5bd365-07fd-49c3-bbee-d97f50e051da\", \"2ab9e166-9379-493f-928b-d89ae364ae9b\": \"2ab9e166-9379-493f-928b-d89ae364ae9b\", \"3a4ba3e0-e605-466a-9393-c37ae9f6f854\": \"3a4ba3e0-e605-466a-9393-c37ae9f6f854\", \"58bd1a0c-4caf-4aab-97b9-d69cdaf9170e\": \"58bd1a0c-4caf-4aab-97b9-d69cdaf9170e\", \"1af5f605-ca46-404d-8dc5-fc1b82de88e6\": \"1af5f605-ca46-404d-8dc5-fc1b82de88e6\", \"0d9629cf-7213-4062-b3e8-7dbdfc05c1e6\": \"0d9629cf-7213-4062-b3e8-7dbdfc05c1e6\", \"7d80ba2f-ba44-49e2-97c8-68cea22d2916\": \"7d80ba2f-ba44-49e2-97c8-68cea22d2916\", \"bd2cf428-3bc4-4670-a299-bf780c72bea3\": \"bd2cf428-3bc4-4670-a299-bf780c72bea3\", \"8b20bc6c-3dfb-4ebc-94c8-25ae7b3267f6\": \"8b20bc6c-3dfb-4ebc-94c8-25ae7b3267f6\", \"e3c390e3-85d3-4c69-9c96-066b77f5a79a\": \"e3c390e3-85d3-4c69-9c96-066b77f5a79a\", \"332a3a26-4225-4fc5-a916-757c9d09546c\": \"332a3a26-4225-4fc5-a916-757c9d09546c\", \"e42821bf-4fee-435b-a441-6e711f93afa8\": \"e42821bf-4fee-435b-a441-6e711f93afa8\", \"fba66f0c-582c-4727-a940-6fe6b399d0e8\": \"fba66f0c-582c-4727-a940-6fe6b399d0e8\", \"0cb107c3-ba56-4017-bc47-5a0b3b692df2\": \"0cb107c3-ba56-4017-bc47-5a0b3b692df2\", \"3b079652-a22e-4cea-aa9a-5405b1f81807\": \"3b079652-a22e-4cea-aa9a-5405b1f81807\", \"ffada7bd-ed77-47e1-b51b-b578bcbabf71\": \"ffada7bd-ed77-47e1-b51b-b578bcbabf71\", \"e2f56072-fc39-4e1a-bee3-73eede268aa6\": \"e2f56072-fc39-4e1a-bee3-73eede268aa6\", \"9d56e7de-e17b-4ada-a431-edb219071f49\": \"9d56e7de-e17b-4ada-a431-edb219071f49\", \"43a19927-4a33-4a89-83fd-ad58d585938e\": \"43a19927-4a33-4a89-83fd-ad58d585938e\", \"200e4c3e-0cfb-43a0-809f-1ce8197f0fec\": \"200e4c3e-0cfb-43a0-809f-1ce8197f0fec\", \"4e9eb35d-1e39-4c53-839f-52bec0f97536\": \"4e9eb35d-1e39-4c53-839f-52bec0f97536\", \"979b9255-62a1-439e-98c6-433a4c37af0e\": \"979b9255-62a1-439e-98c6-433a4c37af0e\", \"b7b4ff76-7b67-4fb9-8dca-dbd2ecf26c4d\": \"b7b4ff76-7b67-4fb9-8dca-dbd2ecf26c4d\", \"e209f9bf-dda9-43e3-8c64-38517c43c14f\": \"e209f9bf-dda9-43e3-8c64-38517c43c14f\", \"68602cb0-6f9d-4eec-b4dc-af904ddf9455\": \"68602cb0-6f9d-4eec-b4dc-af904ddf9455\", \"9203e64d-436e-40d3-864d-bc7a6970b421\": \"9203e64d-436e-40d3-864d-bc7a6970b421\", \"a39ac088-9722-442e-9d9b-c0e55fc17801\": \"a39ac088-9722-442e-9d9b-c0e55fc17801\", \"eca70f18-6c77-4e89-a476-fd5a9e713826\": \"eca70f18-6c77-4e89-a476-fd5a9e713826\", \"36ebb5b6-c2e0-4dfe-a3dd-d3dfa9c22499\": \"36ebb5b6-c2e0-4dfe-a3dd-d3dfa9c22499\", \"ce1cb2b5-b7f8-4dd1-a7d8-e5085cedcf6e\": \"ce1cb2b5-b7f8-4dd1-a7d8-e5085cedcf6e\", \"77051c31-f841-4e14-894e-1f862021b3dd\": \"77051c31-f841-4e14-894e-1f862021b3dd\", \"595b345e-ee63-409c-9292-68359467be4f\": \"595b345e-ee63-409c-9292-68359467be4f\", \"57f9f691-887d-4f71-a458-7373c780e219\": \"57f9f691-887d-4f71-a458-7373c780e219\", \"e5a1e03f-b0a0-4d55-9200-b54d3c152d3e\": \"e5a1e03f-b0a0-4d55-9200-b54d3c152d3e\", \"3acecbd4-1867-4451-b65a-5dbf975bb532\": \"3acecbd4-1867-4451-b65a-5dbf975bb532\", \"0957ead3-48dd-4dba-8d5d-231ad4bf4079\": \"0957ead3-48dd-4dba-8d5d-231ad4bf4079\", \"e8285ac4-67c6-465e-bb2e-bb4d232ee8b9\": \"e8285ac4-67c6-465e-bb2e-bb4d232ee8b9\", \"f6df0908-4d14-4b3f-89c7-0d0db1a18073\": \"f6df0908-4d14-4b3f-89c7-0d0db1a18073\", \"403213cd-056c-4dd4-9f30-6c196e4b843a\": \"403213cd-056c-4dd4-9f30-6c196e4b843a\", \"763de8e3-b292-4b0f-a23d-352999b8dac3\": \"763de8e3-b292-4b0f-a23d-352999b8dac3\", \"0029fe70-8458-48fe-9867-052638f3e121\": \"0029fe70-8458-48fe-9867-052638f3e121\", \"49061286-377d-4bd2-868f-9af96241cc3f\": \"49061286-377d-4bd2-868f-9af96241cc3f\", \"4e9bcbd6-b2f0-4e98-b621-37cd6e2bab33\": \"4e9bcbd6-b2f0-4e98-b621-37cd6e2bab33\", \"bfd83eea-695c-4156-b9e0-ed51488f50cd\": \"bfd83eea-695c-4156-b9e0-ed51488f50cd\", \"c52e477a-e629-4d8d-ae02-3acec463f0e5\": \"c52e477a-e629-4d8d-ae02-3acec463f0e5\", \"528d270b-d6b7-458c-aa0c-17cfb1b7493b\": \"528d270b-d6b7-458c-aa0c-17cfb1b7493b\", \"38c05c5c-78a9-41fd-b8c8-cc911b44b392\": \"38c05c5c-78a9-41fd-b8c8-cc911b44b392\", \"3766a672-229d-481b-8e77-f63d9edfe42d\": \"3766a672-229d-481b-8e77-f63d9edfe42d\", \"88caea78-3b8c-4c50-8e40-be33f06d0a84\": \"88caea78-3b8c-4c50-8e40-be33f06d0a84\", \"79661545-c9b8-410c-a23c-7b75c28e1847\": \"79661545-c9b8-410c-a23c-7b75c28e1847\", \"4118448b-bb8b-4fd6-9f1b-e10f8247536f\": \"4118448b-bb8b-4fd6-9f1b-e10f8247536f\", \"f157ec57-6d4d-4539-a463-eaef48d39eaa\": \"f157ec57-6d4d-4539-a463-eaef48d39eaa\", \"024fedaa-e2e4-4733-80db-1770ee4be916\": \"024fedaa-e2e4-4733-80db-1770ee4be916\", \"852347b8-c229-42b8-9261-bc9c6037ad24\": \"852347b8-c229-42b8-9261-bc9c6037ad24\", \"7a64fd7d-9b41-4740-a3de-2b277f852653\": \"7a64fd7d-9b41-4740-a3de-2b277f852653\", \"a390b91f-efb8-4f77-9649-77a25276cf6b\": \"a390b91f-efb8-4f77-9649-77a25276cf6b\", \"48499d08-c18e-4ae7-a08e-14c6a8ce5534\": \"48499d08-c18e-4ae7-a08e-14c6a8ce5534\", \"120557fb-efb3-4afd-a575-fb950b4dde3e\": \"120557fb-efb3-4afd-a575-fb950b4dde3e\", \"5d85bafc-9d1d-41e2-895a-d18e73e172ae\": \"5d85bafc-9d1d-41e2-895a-d18e73e172ae\", \"2e61ba59-a7aa-4b65-926a-687ae86861e3\": \"2e61ba59-a7aa-4b65-926a-687ae86861e3\", \"ca8ed9ab-36c3-4cc9-9200-a44281095748\": \"ca8ed9ab-36c3-4cc9-9200-a44281095748\", \"83f784f8-1769-4a12-a9fc-e66d75ebd146\": \"83f784f8-1769-4a12-a9fc-e66d75ebd146\", \"d358ea6f-d726-4852-b959-6b6f02b7f626\": \"d358ea6f-d726-4852-b959-6b6f02b7f626\", \"77027437-a678-41be-b475-fb1d8b50057e\": \"77027437-a678-41be-b475-fb1d8b50057e\", \"fa1fcd89-0316-4277-a96a-908337af1bcb\": \"fa1fcd89-0316-4277-a96a-908337af1bcb\", \"54e47b1b-5be0-423e-8358-83c8c815d142\": \"54e47b1b-5be0-423e-8358-83c8c815d142\", \"795741ac-cedf-4428-8f5e-165bd45b1a62\": \"795741ac-cedf-4428-8f5e-165bd45b1a62\", \"83547562-e8ba-4313-93f1-fc33fd2e0cd7\": \"83547562-e8ba-4313-93f1-fc33fd2e0cd7\", \"a8fddcc6-b502-48a5-957e-099fdc6d5fdc\": \"a8fddcc6-b502-48a5-957e-099fdc6d5fdc\", \"d158c94d-fd03-4607-b7b2-b817dc6750ac\": \"d158c94d-fd03-4607-b7b2-b817dc6750ac\", \"89375532-71c7-4ba7-a392-f09aaf08f2be\": \"89375532-71c7-4ba7-a392-f09aaf08f2be\", \"9b5e83f4-4d7e-48f3-b44c-e6d3b4a33367\": \"9b5e83f4-4d7e-48f3-b44c-e6d3b4a33367\", \"835d2923-71e0-4163-893a-caabe716e546\": \"835d2923-71e0-4163-893a-caabe716e546\", \"ca32725c-6115-49db-913c-df3b07fa6beb\": \"ca32725c-6115-49db-913c-df3b07fa6beb\", \"578241bd-9f23-4439-a655-d30648805018\": \"578241bd-9f23-4439-a655-d30648805018\", \"e14f6cb9-9e6c-4472-abf0-450c9619ec9f\": \"e14f6cb9-9e6c-4472-abf0-450c9619ec9f\", \"914aa8b2-ee23-4ca1-9e6e-5654c2fb7b10\": \"914aa8b2-ee23-4ca1-9e6e-5654c2fb7b10\", \"2bd791d3-6858-47f9-865f-388dac32fac6\": \"2bd791d3-6858-47f9-865f-388dac32fac6\", \"c8e5d8f0-61e2-4054-9cc6-1d6bb01946ef\": \"c8e5d8f0-61e2-4054-9cc6-1d6bb01946ef\", \"101abeec-50d2-415c-bd60-6b01f5634c97\": \"101abeec-50d2-415c-bd60-6b01f5634c97\", \"a8b43d44-7ec4-40ac-a16a-3befd53e8c65\": \"a8b43d44-7ec4-40ac-a16a-3befd53e8c65\", \"8273a425-c99f-49b4-9db3-121013f2933d\": \"8273a425-c99f-49b4-9db3-121013f2933d\", \"b88f77c1-2044-4a9f-b790-573fc3c5c12b\": \"b88f77c1-2044-4a9f-b790-573fc3c5c12b\", \"87039a66-6d37-483a-bff7-4432cc531908\": \"87039a66-6d37-483a-bff7-4432cc531908\", \"d2e036ec-ad7f-4f9c-919f-08e95b238f42\": \"d2e036ec-ad7f-4f9c-919f-08e95b238f42\", \"476681b8-7b69-4a34-a6d2-809fc653b8bf\": \"476681b8-7b69-4a34-a6d2-809fc653b8bf\", \"b6bac391-46af-49b8-ac76-55b9ea0a3f10\": \"b6bac391-46af-49b8-ac76-55b9ea0a3f10\", \"4e342ed1-90d4-4470-95d3-1ca6c00677d9\": \"4e342ed1-90d4-4470-95d3-1ca6c00677d9\", \"71c4a3bc-6635-44e1-80a1-0e8deef0d767\": \"71c4a3bc-6635-44e1-80a1-0e8deef0d767\", \"2db9c2b8-f85c-463d-9f24-ebd8e9727fd5\": \"2db9c2b8-f85c-463d-9f24-ebd8e9727fd5\", \"9c6d0c05-1650-4b0e-9a43-a2e793804053\": \"9c6d0c05-1650-4b0e-9a43-a2e793804053\", \"74d6bdca-a349-435b-9efe-0beaeed635a1\": \"74d6bdca-a349-435b-9efe-0beaeed635a1\", \"a3298b90-49cf-4b41-a0d9-17cc2a67baca\": \"a3298b90-49cf-4b41-a0d9-17cc2a67baca\", \"1e4b3a13-4e82-4e88-8799-8d02597cd960\": \"1e4b3a13-4e82-4e88-8799-8d02597cd960\", \"d72266a3-fc2b-4dc5-9db2-4f7278b30167\": \"d72266a3-fc2b-4dc5-9db2-4f7278b30167\", \"797816ac-6fc2-4453-b294-c5da10cbf4ab\": \"797816ac-6fc2-4453-b294-c5da10cbf4ab\", \"bca215d8-8f5d-4550-bee2-ca746b34b1c7\": \"bca215d8-8f5d-4550-bee2-ca746b34b1c7\", \"2af8640e-5a53-47c2-a938-9f9695cd7c76\": \"2af8640e-5a53-47c2-a938-9f9695cd7c76\", \"f8bf4db5-78de-4d72-a5e3-33c83fc8c734\": \"f8bf4db5-78de-4d72-a5e3-33c83fc8c734\", \"44888967-ba3f-442c-9d7b-802d7ca43e44\": \"44888967-ba3f-442c-9d7b-802d7ca43e44\", \"dc28745b-ce90-456e-83b0-3718ac471b7f\": \"dc28745b-ce90-456e-83b0-3718ac471b7f\", \"14eda487-be69-46a6-8dd9-740d35cc7fe3\": \"14eda487-be69-46a6-8dd9-740d35cc7fe3\", \"6e741f83-1a55-4964-a39a-1735a998cd6d\": \"6e741f83-1a55-4964-a39a-1735a998cd6d\", \"40a841c0-27b9-4105-8dc6-3454da3e3bd8\": \"40a841c0-27b9-4105-8dc6-3454da3e3bd8\", \"0e35a31b-6d8a-4f9b-8c29-5781a42f4a6a\": \"0e35a31b-6d8a-4f9b-8c29-5781a42f4a6a\", \"4ffb13a4-79e2-4307-ae24-d806775763c3\": \"4ffb13a4-79e2-4307-ae24-d806775763c3\", \"6be1f85e-83be-4483-8b86-92c8725356a9\": \"6be1f85e-83be-4483-8b86-92c8725356a9\", \"c271474a-b01e-4dde-806e-7f88aea2f469\": \"c271474a-b01e-4dde-806e-7f88aea2f469\", \"7c252836-73d8-4243-8506-264c8086427a\": \"7c252836-73d8-4243-8506-264c8086427a\", \"72335e90-0cfc-416a-bc36-58b99175d085\": \"72335e90-0cfc-416a-bc36-58b99175d085\", \"09bc1af2-b295-43b7-91c8-008573646a0d\": \"09bc1af2-b295-43b7-91c8-008573646a0d\", \"468e2ecf-5ca8-4831-a045-858601970464\": \"468e2ecf-5ca8-4831-a045-858601970464\", \"c6e72421-0c17-4c05-85ce-2010d1df2cea\": \"c6e72421-0c17-4c05-85ce-2010d1df2cea\", \"603ea3c1-06dc-4f3b-944a-9c6cc9673b9d\": \"603ea3c1-06dc-4f3b-944a-9c6cc9673b9d\", \"a0fc13ea-7924-4e50-95e1-f43f0559d329\": \"a0fc13ea-7924-4e50-95e1-f43f0559d329\", \"b1f955b6-bde3-4187-b7ec-0ccca333c31b\": \"b1f955b6-bde3-4187-b7ec-0ccca333c31b\", \"5b57b692-0186-4785-9cda-71e403686f43\": \"5b57b692-0186-4785-9cda-71e403686f43\", \"8086fd1e-b2ec-4070-975c-c2361133f6a4\": \"8086fd1e-b2ec-4070-975c-c2361133f6a4\", \"ffb9a74a-b5ef-46fe-a18b-ccc6ba7da111\": \"ffb9a74a-b5ef-46fe-a18b-ccc6ba7da111\", \"bc11dbf0-462f-4bef-b531-78c07e33d133\": \"bc11dbf0-462f-4bef-b531-78c07e33d133\", \"0c284300-d9f9-441d-b582-6e6795221c4e\": \"0c284300-d9f9-441d-b582-6e6795221c4e\", \"1e759376-2456-49fa-a154-1a5e19aad3e9\": \"1e759376-2456-49fa-a154-1a5e19aad3e9\", \"cf77eaa3-eda1-41a1-84ee-75ca0759b985\": \"cf77eaa3-eda1-41a1-84ee-75ca0759b985\", \"5622feb7-e8d7-436c-b3da-101d0b4f4f06\": \"5622feb7-e8d7-436c-b3da-101d0b4f4f06\", \"ff3e9c00-eb71-4900-9413-b6deada6e561\": \"ff3e9c00-eb71-4900-9413-b6deada6e561\", \"32da5209-b7d2-4eb3-8d14-ef013b8d4938\": \"32da5209-b7d2-4eb3-8d14-ef013b8d4938\", \"f5793231-5cbd-4197-a8f7-0eeb8fb4c6c1\": \"f5793231-5cbd-4197-a8f7-0eeb8fb4c6c1\", \"8847a2eb-c347-4971-94f1-45a7f1688aac\": \"8847a2eb-c347-4971-94f1-45a7f1688aac\", \"9c608428-da65-4cb9-bb75-fbc5c66ccd01\": \"9c608428-da65-4cb9-bb75-fbc5c66ccd01\", \"e3f05e59-fcfb-46c1-8e98-1e1783599004\": \"e3f05e59-fcfb-46c1-8e98-1e1783599004\", \"f24a6dc4-2427-4dd3-9bb8-61fe621a59cb\": \"f24a6dc4-2427-4dd3-9bb8-61fe621a59cb\", \"df0cb8c7-a553-454b-ba68-82ec87b30299\": \"df0cb8c7-a553-454b-ba68-82ec87b30299\", \"413faf23-1ff4-4f8e-a48b-d9509c3d23ae\": \"413faf23-1ff4-4f8e-a48b-d9509c3d23ae\", \"9e5d2a5d-d5f2-4612-a45c-8e15a890ceb2\": \"9e5d2a5d-d5f2-4612-a45c-8e15a890ceb2\", \"b9707183-c73e-4aee-8864-fee85b148ec9\": \"b9707183-c73e-4aee-8864-fee85b148ec9\", \"90e148e7-14d9-4881-861d-0786b910c721\": \"90e148e7-14d9-4881-861d-0786b910c721\", \"c85b5a7b-c07c-456c-b67e-041c52a49a9c\": \"c85b5a7b-c07c-456c-b67e-041c52a49a9c\", \"8fa24c22-6fbd-4ab5-a8df-d0043157c950\": \"8fa24c22-6fbd-4ab5-a8df-d0043157c950\", \"d7f0868b-795a-4340-8ac3-625b21cf4b6f\": \"d7f0868b-795a-4340-8ac3-625b21cf4b6f\", \"7c5c4726-bc4f-48d9-9331-ad444749d3ae\": \"7c5c4726-bc4f-48d9-9331-ad444749d3ae\", \"aec64413-f360-4c95-891e-294655fa24f5\": \"aec64413-f360-4c95-891e-294655fa24f5\", \"47be1383-b4c3-4b46-b1bb-612f115cb5cd\": \"47be1383-b4c3-4b46-b1bb-612f115cb5cd\", \"46cb1d52-0f0b-4b17-8e1f-3432aae4826c\": \"46cb1d52-0f0b-4b17-8e1f-3432aae4826c\", \"778b8bd0-445d-4c66-8804-9c1e37888ea4\": \"778b8bd0-445d-4c66-8804-9c1e37888ea4\", \"8acd8464-081a-4d21-a2d8-811bc8a41922\": \"8acd8464-081a-4d21-a2d8-811bc8a41922\", \"c895e787-7815-4877-a7df-afab66f0636a\": \"c895e787-7815-4877-a7df-afab66f0636a\", \"296c8197-079b-4c2d-b812-f74780c73c32\": \"296c8197-079b-4c2d-b812-f74780c73c32\", \"a80953f0-5fd7-434d-8fc0-cfd43266c141\": \"a80953f0-5fd7-434d-8fc0-cfd43266c141\", \"2a7e0776-0b2c-48ed-a2cc-258375452620\": \"2a7e0776-0b2c-48ed-a2cc-258375452620\", \"faa27de2-ed4c-48b4-8317-fc0e869a4a36\": \"faa27de2-ed4c-48b4-8317-fc0e869a4a36\", \"463072b0-0ada-437e-bb65-bf0976ef72b3\": \"463072b0-0ada-437e-bb65-bf0976ef72b3\", \"4e248107-2035-4199-bc08-c74b49d5fcc6\": \"4e248107-2035-4199-bc08-c74b49d5fcc6\", \"cfdfad83-3486-47fc-9d06-18e966e50b7c\": \"cfdfad83-3486-47fc-9d06-18e966e50b7c\", \"50e9c42c-bb86-4291-a2a7-bd60a71a466e\": \"50e9c42c-bb86-4291-a2a7-bd60a71a466e\", \"5fb9c9ec-1b0e-4967-aceb-2b86d57f22fd\": \"5fb9c9ec-1b0e-4967-aceb-2b86d57f22fd\", \"ff25c099-aa59-464c-a08c-fdb3791ab5dd\": \"ff25c099-aa59-464c-a08c-fdb3791ab5dd\", \"ea4724d4-0293-4e1e-a176-0bea52a3e5f3\": \"ea4724d4-0293-4e1e-a176-0bea52a3e5f3\", \"f9cc2420-88fe-404c-b7dc-a64dc68fa7ec\": \"f9cc2420-88fe-404c-b7dc-a64dc68fa7ec\", \"860c4228-3dfe-4204-8555-d3f93f30e982\": \"860c4228-3dfe-4204-8555-d3f93f30e982\", \"6a65d6cc-b8ef-4b49-a1b9-06501f385281\": \"6a65d6cc-b8ef-4b49-a1b9-06501f385281\", \"deb4207f-47b8-4363-ac6c-c00cf633e9a3\": \"deb4207f-47b8-4363-ac6c-c00cf633e9a3\", \"70207f0b-28b6-4000-9af1-a9751ec388a1\": \"70207f0b-28b6-4000-9af1-a9751ec388a1\", \"35b30ee3-83d7-4c50-a533-590b75092687\": \"35b30ee3-83d7-4c50-a533-590b75092687\", \"b74e5b1c-365c-4a04-b58e-ca8df2f2a812\": \"b74e5b1c-365c-4a04-b58e-ca8df2f2a812\", \"dac79022-37f6-466c-99fe-255aa9a4aff6\": \"dac79022-37f6-466c-99fe-255aa9a4aff6\", \"a684faf2-d6e7-4094-a1f5-3073e3010969\": \"a684faf2-d6e7-4094-a1f5-3073e3010969\", \"b71e453e-c24c-4ddf-9f76-8f1d2c3f59e5\": \"b71e453e-c24c-4ddf-9f76-8f1d2c3f59e5\", \"09d878c5-7b5f-43df-b2fc-17349c286eb7\": \"09d878c5-7b5f-43df-b2fc-17349c286eb7\", \"e369201a-c028-456e-b33f-5a823cd04c4b\": \"e369201a-c028-456e-b33f-5a823cd04c4b\", \"0862dba7-c437-419d-a67c-a7a19278ee37\": \"0862dba7-c437-419d-a67c-a7a19278ee37\", \"8a6a3656-e862-4e1e-9566-98904db6b57b\": \"8a6a3656-e862-4e1e-9566-98904db6b57b\", \"a0f8d230-720d-442f-ae36-25a8a54cfa97\": \"a0f8d230-720d-442f-ae36-25a8a54cfa97\", \"058fd3d4-efa5-4488-a1c3-74bf09781e86\": \"058fd3d4-efa5-4488-a1c3-74bf09781e86\", \"9f902caa-3c8a-4c05-b46c-1e1f1df83834\": \"9f902caa-3c8a-4c05-b46c-1e1f1df83834\", \"15997e69-4974-4fe1-9800-c562eec9b258\": \"15997e69-4974-4fe1-9800-c562eec9b258\", \"76601a4c-5955-4f68-8fe0-2347f76e0d83\": \"76601a4c-5955-4f68-8fe0-2347f76e0d83\", \"78a03d23-9f82-4414-be59-a73782dee41c\": \"78a03d23-9f82-4414-be59-a73782dee41c\", \"97d1c507-fc21-47f4-9eb4-f7321a4c0a77\": \"97d1c507-fc21-47f4-9eb4-f7321a4c0a77\", \"b4423dab-675c-4491-9cea-c5384fd18e2b\": \"b4423dab-675c-4491-9cea-c5384fd18e2b\", \"5c8c1f58-f167-4b77-aa0e-61d47a8039d7\": \"5c8c1f58-f167-4b77-aa0e-61d47a8039d7\", \"7e34500c-dbfa-4e84-8d64-3d1163dd5c48\": \"7e34500c-dbfa-4e84-8d64-3d1163dd5c48\", \"a8f88646-e5af-4381-8a33-f2d66d538ffd\": \"a8f88646-e5af-4381-8a33-f2d66d538ffd\", \"2604e495-b5e9-41b6-bcac-c29ffed09f4c\": \"2604e495-b5e9-41b6-bcac-c29ffed09f4c\", \"8ab04d40-d2ca-4185-9bab-b4c745a49c48\": \"8ab04d40-d2ca-4185-9bab-b4c745a49c48\", \"5285e0af-31bb-4297-9b85-74f17d7939e9\": \"5285e0af-31bb-4297-9b85-74f17d7939e9\", \"8fbe5691-8155-4aee-a535-dfeb2a06cf9b\": \"8fbe5691-8155-4aee-a535-dfeb2a06cf9b\", \"032cec94-aeb3-436e-a40f-60f21acda04f\": \"032cec94-aeb3-436e-a40f-60f21acda04f\", \"6b7d8b5b-95aa-4bb5-bc55-174503dd4e62\": \"6b7d8b5b-95aa-4bb5-bc55-174503dd4e62\", \"274dcbca-d18d-4650-a190-c0911bb99942\": \"274dcbca-d18d-4650-a190-c0911bb99942\", \"4dea95ae-199c-4134-af0a-d58ebfff00f9\": \"4dea95ae-199c-4134-af0a-d58ebfff00f9\", \"ebec4eac-8275-4125-8b61-3c7cbd201d55\": \"ebec4eac-8275-4125-8b61-3c7cbd201d55\", \"50b32ea2-6fc6-481c-865a-980bec925996\": \"50b32ea2-6fc6-481c-865a-980bec925996\", \"f2cbf011-bc22-410f-b36e-05f7c6edc459\": \"f2cbf011-bc22-410f-b36e-05f7c6edc459\", \"346aa99f-bb2b-4cf7-a7ae-2aaea8ebb785\": \"346aa99f-bb2b-4cf7-a7ae-2aaea8ebb785\", \"1c75b713-6f92-4ec8-9218-3bb3e58c4e03\": \"1c75b713-6f92-4ec8-9218-3bb3e58c4e03\", \"ccc440cc-471f-40a5-a4b4-2fe156a969fc\": \"ccc440cc-471f-40a5-a4b4-2fe156a969fc\", \"33b8bf66-a163-4af4-8f34-974afdb37833\": \"33b8bf66-a163-4af4-8f34-974afdb37833\", \"364f57dc-fe18-47a9-816d-ea654a4b2b7c\": \"364f57dc-fe18-47a9-816d-ea654a4b2b7c\", \"cdc234c5-6d40-4b9a-8a6b-aed34b6c6ed7\": \"cdc234c5-6d40-4b9a-8a6b-aed34b6c6ed7\", \"d42c8120-3255-4b13-83d4-eb2cad0d73c0\": \"d42c8120-3255-4b13-83d4-eb2cad0d73c0\", \"0a61de61-47dd-42cd-94be-4467bdc87028\": \"0a61de61-47dd-42cd-94be-4467bdc87028\", \"a11f6bc2-d45c-4302-9f93-15f941acefa1\": \"a11f6bc2-d45c-4302-9f93-15f941acefa1\", \"b20c38b6-59e4-43a9-9b10-8ef6127ecb04\": \"b20c38b6-59e4-43a9-9b10-8ef6127ecb04\", \"ed17db20-b032-4c05-a08d-760554d40e33\": \"ed17db20-b032-4c05-a08d-760554d40e33\", \"6e13df71-09d7-4d1e-9790-ff7ffdf84823\": \"6e13df71-09d7-4d1e-9790-ff7ffdf84823\", \"d51236fd-2a0c-4de1-b447-a5aca9c8206b\": \"d51236fd-2a0c-4de1-b447-a5aca9c8206b\", \"464b1f97-e2e7-4c08-831e-26f486e2c433\": \"464b1f97-e2e7-4c08-831e-26f486e2c433\", \"58ab7dd7-68b1-4ed3-b40f-38b076c70908\": \"58ab7dd7-68b1-4ed3-b40f-38b076c70908\", \"ae0078e0-7d33-47a4-b481-d98e71589dce\": \"ae0078e0-7d33-47a4-b481-d98e71589dce\", \"3f6a626d-e8cb-4481-a77f-848c263aa0a7\": \"3f6a626d-e8cb-4481-a77f-848c263aa0a7\", \"412c18f5-2adf-4945-acb2-777ae502bdc3\": \"412c18f5-2adf-4945-acb2-777ae502bdc3\", \"ef4cefad-0d6b-47c8-9cb9-039fb64b5457\": \"ef4cefad-0d6b-47c8-9cb9-039fb64b5457\", \"5ccf1886-586d-469b-9c5d-0edcc27c58c9\": \"5ccf1886-586d-469b-9c5d-0edcc27c58c9\", \"fb5057d6-151f-45f4-94e3-0b72ee4db0b1\": \"fb5057d6-151f-45f4-94e3-0b72ee4db0b1\", \"6876f76e-e347-4f20-ac56-af1923c786a1\": \"6876f76e-e347-4f20-ac56-af1923c786a1\", \"d1479bee-44ae-4a44-93f5-f3792b1cd94a\": \"d1479bee-44ae-4a44-93f5-f3792b1cd94a\", \"405fb950-67ab-482b-9e74-48979480e5c4\": \"405fb950-67ab-482b-9e74-48979480e5c4\", \"8d404377-1b77-4704-b523-3dcbd4c8b233\": \"8d404377-1b77-4704-b523-3dcbd4c8b233\", \"4d66d061-fd5a-497c-ba1e-a14318f7f516\": \"4d66d061-fd5a-497c-ba1e-a14318f7f516\", \"0120a2e9-c4f5-4f6a-8d8c-56e844c24f0e\": \"0120a2e9-c4f5-4f6a-8d8c-56e844c24f0e\", \"71b50d05-a9dd-4398-b6af-ea4c37803aef\": \"71b50d05-a9dd-4398-b6af-ea4c37803aef\", \"60b16a6e-e240-4685-8033-5110a9e2662e\": \"60b16a6e-e240-4685-8033-5110a9e2662e\", \"5293cdfc-2093-4688-848c-c294e9d766ea\": \"5293cdfc-2093-4688-848c-c294e9d766ea\", \"c71e7e12-cedf-4542-b14b-231a8ddcb334\": \"c71e7e12-cedf-4542-b14b-231a8ddcb334\", \"c575058c-205e-4995-955e-14e1968bfa57\": \"c575058c-205e-4995-955e-14e1968bfa57\", \"d72190e5-f2aa-44a6-b790-d25e61ac052d\": \"d72190e5-f2aa-44a6-b790-d25e61ac052d\", \"b4288da3-3532-4958-8cbb-5f314e568859\": \"b4288da3-3532-4958-8cbb-5f314e568859\", \"d1691c76-81d3-42d2-8b4b-13216c91266d\": \"d1691c76-81d3-42d2-8b4b-13216c91266d\", \"81ec9bf4-9a1f-4c66-ab51-9c83014d037b\": \"81ec9bf4-9a1f-4c66-ab51-9c83014d037b\", \"480985cf-845c-4498-9784-3795b988ffbe\": \"480985cf-845c-4498-9784-3795b988ffbe\", \"8c831ae1-636c-4638-a199-e71f19d1a116\": \"8c831ae1-636c-4638-a199-e71f19d1a116\", \"b3304b34-b04b-4c3d-bef5-a595f990cd6a\": \"b3304b34-b04b-4c3d-bef5-a595f990cd6a\", \"35050b70-c5a7-48cf-b9e2-650bd0ae7363\": \"35050b70-c5a7-48cf-b9e2-650bd0ae7363\", \"c4ed859d-65f6-4952-9136-e2168eaa364b\": \"c4ed859d-65f6-4952-9136-e2168eaa364b\", \"3ee50f81-fa6a-4edb-847c-6ca85593d6a1\": \"3ee50f81-fa6a-4edb-847c-6ca85593d6a1\", \"280c0e76-41c0-4264-8a9c-9da2abc3c6ec\": \"280c0e76-41c0-4264-8a9c-9da2abc3c6ec\", \"ca6cb905-f47c-401a-bf43-e3a31a4f55da\": \"ca6cb905-f47c-401a-bf43-e3a31a4f55da\", \"90d1ef37-a2f9-4e2d-ae8d-9e949b3099ef\": \"90d1ef37-a2f9-4e2d-ae8d-9e949b3099ef\", \"d64e91df-5c26-4967-b652-9ae074915b33\": \"d64e91df-5c26-4967-b652-9ae074915b33\", \"6b49d114-f4f4-485d-b910-70d6d6180da0\": \"6b49d114-f4f4-485d-b910-70d6d6180da0\", \"44a95309-3132-4d05-80d1-c46a5678b3dc\": \"44a95309-3132-4d05-80d1-c46a5678b3dc\", \"1fef1573-f066-4242-a6eb-2564da31ff53\": \"1fef1573-f066-4242-a6eb-2564da31ff53\", \"ad7f3325-40a7-4edc-849c-1cf0a687bd08\": \"ad7f3325-40a7-4edc-849c-1cf0a687bd08\", \"87a116ae-c397-4230-8e39-fae765e6d4dd\": \"87a116ae-c397-4230-8e39-fae765e6d4dd\", \"d343ff63-7653-4429-a4f9-d48a41df1b27\": \"d343ff63-7653-4429-a4f9-d48a41df1b27\", \"8390024f-9a10-4c45-8477-8f43e6cc772d\": \"8390024f-9a10-4c45-8477-8f43e6cc772d\", \"a172593c-f4f9-4d7b-b0ab-e683c8f21c70\": \"a172593c-f4f9-4d7b-b0ab-e683c8f21c70\", \"2a580198-957b-4937-9cbc-9c634ba3c008\": \"2a580198-957b-4937-9cbc-9c634ba3c008\", \"e138bd74-d5de-4d81-9ef5-5c4c15f03829\": \"e138bd74-d5de-4d81-9ef5-5c4c15f03829\", \"7d06288f-71e6-4cb6-a44f-6c4a982fc775\": \"7d06288f-71e6-4cb6-a44f-6c4a982fc775\", \"87cdb9f9-6443-4de6-805e-60fa79892b8c\": \"87cdb9f9-6443-4de6-805e-60fa79892b8c\", \"5b089c73-d94f-4170-9d23-00175b148dff\": \"5b089c73-d94f-4170-9d23-00175b148dff\", \"2bedf45a-a532-4f34-af89-5e54ebbb3360\": \"2bedf45a-a532-4f34-af89-5e54ebbb3360\", \"c4a882e3-5baf-45de-a850-58acb66aaf09\": \"c4a882e3-5baf-45de-a850-58acb66aaf09\", \"efa844fa-c6b3-49df-bf77-56953f9df462\": \"efa844fa-c6b3-49df-bf77-56953f9df462\", \"79183a94-0bfd-4e26-b2ac-01b4844777d6\": \"79183a94-0bfd-4e26-b2ac-01b4844777d6\", \"b90b3dfd-a42f-4419-b97f-f89f1c08ab54\": \"b90b3dfd-a42f-4419-b97f-f89f1c08ab54\", \"4e3e7b84-0d91-4cf7-b805-b232c8b649ba\": \"4e3e7b84-0d91-4cf7-b805-b232c8b649ba\", \"81d50026-2523-41c6-9b77-902190f43f7b\": \"81d50026-2523-41c6-9b77-902190f43f7b\", \"05dec978-9706-4716-ac11-f33bae44ea0b\": \"05dec978-9706-4716-ac11-f33bae44ea0b\", \"713a8421-fb21-41ba-ab14-183e576edcf8\": \"713a8421-fb21-41ba-ab14-183e576edcf8\", \"fe545f00-c6d3-4531-9c21-45cdddb63c6b\": \"fe545f00-c6d3-4531-9c21-45cdddb63c6b\", \"fb3649b3-a0a1-4bf8-a6fb-31d6cb3e4f3a\": \"fb3649b3-a0a1-4bf8-a6fb-31d6cb3e4f3a\", \"9dead0bc-0207-435a-ae20-ce09bcfe8f58\": \"9dead0bc-0207-435a-ae20-ce09bcfe8f58\", \"c7c5137c-0629-4b93-86d0-e670c9f67a27\": \"c7c5137c-0629-4b93-86d0-e670c9f67a27\", \"8757f6b1-ae55-499f-b25f-de05ab6dda08\": \"8757f6b1-ae55-499f-b25f-de05ab6dda08\", \"f40f7e2e-0b7f-4b3e-a2b9-23ed6bc639b7\": \"f40f7e2e-0b7f-4b3e-a2b9-23ed6bc639b7\", \"d1a21348-e334-4cfd-bec4-dd62abb6f17e\": \"d1a21348-e334-4cfd-bec4-dd62abb6f17e\", \"e04b7813-1ac3-41bd-9d76-1989880984cd\": \"e04b7813-1ac3-41bd-9d76-1989880984cd\", \"4d438801-b2bf-411f-977d-f82dd9f153ee\": \"4d438801-b2bf-411f-977d-f82dd9f153ee\", \"d906a6e3-7a82-4967-b953-b0fdc66a6e47\": \"d906a6e3-7a82-4967-b953-b0fdc66a6e47\", \"9b99d183-9a8b-43db-b957-6e4913e35169\": \"9b99d183-9a8b-43db-b957-6e4913e35169\", \"329fa215-36f6-4ca9-9ab5-f4cbbc2dd9b4\": \"329fa215-36f6-4ca9-9ab5-f4cbbc2dd9b4\", \"bc7ed399-c799-4a22-a1b6-e1f003dd5610\": \"bc7ed399-c799-4a22-a1b6-e1f003dd5610\", \"67b55cd7-f8e1-469b-ad4b-03fa99f217a6\": \"67b55cd7-f8e1-469b-ad4b-03fa99f217a6\", \"418bdbeb-1337-428f-9947-64b09fbb11d2\": \"418bdbeb-1337-428f-9947-64b09fbb11d2\", \"f3fd52ab-6701-4e46-bc50-334d434e5506\": \"f3fd52ab-6701-4e46-bc50-334d434e5506\", \"9b6eccff-e7af-41e1-9e66-b386cde7c1c0\": \"9b6eccff-e7af-41e1-9e66-b386cde7c1c0\", \"19e66bab-9c92-4328-9ef0-c968ba87545d\": \"19e66bab-9c92-4328-9ef0-c968ba87545d\", \"ab51dd03-4549-42e0-8ce6-c7bec4f90dea\": \"ab51dd03-4549-42e0-8ce6-c7bec4f90dea\", \"a3543077-dc63-462e-bdde-45a63f52b730\": \"a3543077-dc63-462e-bdde-45a63f52b730\", \"e53f0119-da24-4204-88c5-936fab297322\": \"e53f0119-da24-4204-88c5-936fab297322\", \"4f2cb7ba-803b-414c-8fad-e09bf904bef8\": \"4f2cb7ba-803b-414c-8fad-e09bf904bef8\", \"bd03b071-a4f2-47be-8f28-d03f6308a455\": \"bd03b071-a4f2-47be-8f28-d03f6308a455\", \"65cd9328-4671-4d36-8c75-e84b8a97fced\": \"65cd9328-4671-4d36-8c75-e84b8a97fced\", \"cfb22927-a751-4cd7-bdd6-cfd0ba9ab7ae\": \"cfb22927-a751-4cd7-bdd6-cfd0ba9ab7ae\", \"0200d07e-ac4a-4836-a687-85bceb36acac\": \"0200d07e-ac4a-4836-a687-85bceb36acac\", \"216c6559-336b-4dad-9799-4b97091755cc\": \"216c6559-336b-4dad-9799-4b97091755cc\", \"22c2f1c7-5c1e-488c-8bac-d5aa917d73ad\": \"22c2f1c7-5c1e-488c-8bac-d5aa917d73ad\", \"5cb2ca77-8c68-4eca-ba7b-09fd6f940847\": \"5cb2ca77-8c68-4eca-ba7b-09fd6f940847\", \"c570b9fd-00b6-44cc-9eb6-3e013d8cdd0a\": \"c570b9fd-00b6-44cc-9eb6-3e013d8cdd0a\", \"a5d51abe-ea19-4749-aac1-0b15fde47d8c\": \"a5d51abe-ea19-4749-aac1-0b15fde47d8c\", \"8035ab1f-a41e-4fe9-bf09-ec5ca904acef\": \"8035ab1f-a41e-4fe9-bf09-ec5ca904acef\", \"a23ebbe3-906f-4680-b1f3-a8fb40303f61\": \"a23ebbe3-906f-4680-b1f3-a8fb40303f61\", \"27461456-384c-47b7-b8c8-98d570467a6d\": \"27461456-384c-47b7-b8c8-98d570467a6d\", \"aee00e79-c56b-4bd1-8a78-2057cc30c0e8\": \"aee00e79-c56b-4bd1-8a78-2057cc30c0e8\", \"724f31c2-5a6e-477f-a1ea-1e3edaeb4b4a\": \"724f31c2-5a6e-477f-a1ea-1e3edaeb4b4a\", \"892abaa6-8499-4327-bb96-06284025b901\": \"892abaa6-8499-4327-bb96-06284025b901\", \"04b9e023-54a9-48bd-b155-eb593f297bdd\": \"04b9e023-54a9-48bd-b155-eb593f297bdd\", \"20cb6038-10f9-4d16-b107-1cd06e1e0e6a\": \"20cb6038-10f9-4d16-b107-1cd06e1e0e6a\", \"33b4d705-5b0e-44ba-9e0d-a823990bf169\": \"33b4d705-5b0e-44ba-9e0d-a823990bf169\", \"c887158b-3381-4c4b-acfc-233bf64aebaf\": \"c887158b-3381-4c4b-acfc-233bf64aebaf\", \"180e4ce0-e01b-4b8f-bfaf-14189430a48f\": \"180e4ce0-e01b-4b8f-bfaf-14189430a48f\", \"cae614fa-03f8-4886-b62d-3b8e05d62d75\": \"cae614fa-03f8-4886-b62d-3b8e05d62d75\", \"39cc9373-6da8-4f5a-95c4-4e81f0f83b35\": \"39cc9373-6da8-4f5a-95c4-4e81f0f83b35\", \"50f9afff-32fd-4345-a9e5-fb54e7ec2c63\": \"50f9afff-32fd-4345-a9e5-fb54e7ec2c63\", \"f8f8b6e1-b323-41fd-85ba-6a4b6e29e8c1\": \"f8f8b6e1-b323-41fd-85ba-6a4b6e29e8c1\", \"7160204a-9bae-4def-be19-1aaa04593075\": \"7160204a-9bae-4def-be19-1aaa04593075\", \"c030132a-f9b1-4ad7-a328-18b6530adb71\": \"c030132a-f9b1-4ad7-a328-18b6530adb71\", \"04023cc9-dc58-42e3-b4e5-535bcabfb7a5\": \"04023cc9-dc58-42e3-b4e5-535bcabfb7a5\", \"968e9f84-ce3e-43c7-9e73-52ae72a4f8bb\": \"968e9f84-ce3e-43c7-9e73-52ae72a4f8bb\", \"1cbea5fc-1a4e-42d4-9d8f-c0f5ad4a4885\": \"1cbea5fc-1a4e-42d4-9d8f-c0f5ad4a4885\", \"2d5ff229-5b86-4a90-b589-649b7320c30a\": \"2d5ff229-5b86-4a90-b589-649b7320c30a\", \"961c0993-1414-4237-9fcd-5e18abbc1f27\": \"961c0993-1414-4237-9fcd-5e18abbc1f27\", \"5020b73f-8873-4bc9-a860-984ff814f4ea\": \"5020b73f-8873-4bc9-a860-984ff814f4ea\", \"8e2e6e89-ded8-4515-9f9c-53a543c290d3\": \"8e2e6e89-ded8-4515-9f9c-53a543c290d3\", \"a3e6ae4f-aa90-49a5-9bf0-9721d367ab6d\": \"a3e6ae4f-aa90-49a5-9bf0-9721d367ab6d\", \"e5f227b2-6b9f-4596-bd0e-9efb449a11f1\": \"e5f227b2-6b9f-4596-bd0e-9efb449a11f1\", \"8648d275-f562-4f15-8b2f-98dbc599a3eb\": \"8648d275-f562-4f15-8b2f-98dbc599a3eb\", \"9cc69d8d-10c3-4775-a835-b59bc19029c3\": \"9cc69d8d-10c3-4775-a835-b59bc19029c3\", \"2eee2bd9-d3c6-42b6-a5ba-161c3140627e\": \"2eee2bd9-d3c6-42b6-a5ba-161c3140627e\", \"c676c70a-da45-43e0-bd7b-5cdd29aaddac\": \"c676c70a-da45-43e0-bd7b-5cdd29aaddac\", \"323d4d8a-4832-4fba-a5f6-fbc36be4955f\": \"323d4d8a-4832-4fba-a5f6-fbc36be4955f\", \"627f64b5-cc0a-44f2-878d-1f6b1b555992\": \"627f64b5-cc0a-44f2-878d-1f6b1b555992\", \"2c18f16c-acca-4b17-af67-b8012d776564\": \"2c18f16c-acca-4b17-af67-b8012d776564\", \"4806f4d4-e0a6-42fe-bab5-a09a31869025\": \"4806f4d4-e0a6-42fe-bab5-a09a31869025\", \"1dcaf295-e021-4a46-a0b2-b702b52a6625\": \"1dcaf295-e021-4a46-a0b2-b702b52a6625\", \"6c2e21a2-b490-4b89-bb56-136d64d5176b\": \"6c2e21a2-b490-4b89-bb56-136d64d5176b\", \"419073dd-6053-457f-883a-053dd428f9b1\": \"419073dd-6053-457f-883a-053dd428f9b1\", \"f3d8f307-1cf9-473e-8720-8f1edb18be2d\": \"f3d8f307-1cf9-473e-8720-8f1edb18be2d\", \"6c34ca18-ab01-4b0b-bef7-c148cf014e89\": \"6c34ca18-ab01-4b0b-bef7-c148cf014e89\", \"b7aa2bd3-f6ff-4969-a34b-b9b2e6a66431\": \"b7aa2bd3-f6ff-4969-a34b-b9b2e6a66431\", \"163dc7ca-a294-44fb-9218-c6ed5185d210\": \"163dc7ca-a294-44fb-9218-c6ed5185d210\", \"ce3ebbf7-81a2-47f4-ae0d-f5862aa6836e\": \"ce3ebbf7-81a2-47f4-ae0d-f5862aa6836e\", \"2b2ffcc6-21f2-472a-938b-b1df7e9515a0\": \"2b2ffcc6-21f2-472a-938b-b1df7e9515a0\", \"028f2cbc-d5a3-4c41-9cd7-ac718eca0b12\": \"028f2cbc-d5a3-4c41-9cd7-ac718eca0b12\", \"7d9ec202-c582-4890-b9d4-401a2ad0db07\": \"7d9ec202-c582-4890-b9d4-401a2ad0db07\", \"30b0ca3e-2620-4fe1-b097-72c110d705d1\": \"30b0ca3e-2620-4fe1-b097-72c110d705d1\", \"0a2374ea-14df-444e-b8fc-a813df7bfa17\": \"0a2374ea-14df-444e-b8fc-a813df7bfa17\", \"70372725-dd90-49e5-ac9c-37f51dff536c\": \"70372725-dd90-49e5-ac9c-37f51dff536c\", \"c03e3b07-6ad9-43e6-8e1f-341a64b1b1a9\": \"c03e3b07-6ad9-43e6-8e1f-341a64b1b1a9\", \"907087b0-4704-4abb-bf94-b06d63fc3627\": \"907087b0-4704-4abb-bf94-b06d63fc3627\", \"17304c45-6861-4e54-9145-85d48955a89a\": \"17304c45-6861-4e54-9145-85d48955a89a\", \"6b970b7f-58be-4c41-be0a-d7d9b07203f0\": \"6b970b7f-58be-4c41-be0a-d7d9b07203f0\", \"d69726f7-c633-4f58-9ce2-20dabee28f66\": \"d69726f7-c633-4f58-9ce2-20dabee28f66\", \"2fd2ca3c-d471-42c6-ba5e-259b29a4768b\": \"2fd2ca3c-d471-42c6-ba5e-259b29a4768b\", \"9389dd14-1645-4a0c-b5b3-61df42c6bf08\": \"9389dd14-1645-4a0c-b5b3-61df42c6bf08\", \"f350b3ab-7bc7-440a-9d8e-81046830991c\": \"f350b3ab-7bc7-440a-9d8e-81046830991c\", \"be0bce66-2562-4787-9f85-5fd437201f25\": \"be0bce66-2562-4787-9f85-5fd437201f25\", \"0ed5e479-952d-4459-8e88-ecb54e9a8345\": \"0ed5e479-952d-4459-8e88-ecb54e9a8345\", \"14f74901-ad84-493d-98ef-f6e18569dc84\": \"14f74901-ad84-493d-98ef-f6e18569dc84\", \"0881a8f4-0cc8-4880-882e-5c5b4acdaaf8\": \"0881a8f4-0cc8-4880-882e-5c5b4acdaaf8\", \"de36e662-d776-4bd7-8dc0-835d4c72d550\": \"de36e662-d776-4bd7-8dc0-835d4c72d550\", \"30250a1b-e5eb-43e8-ba8c-12d181b2de8b\": \"30250a1b-e5eb-43e8-ba8c-12d181b2de8b\", \"7c1e72df-7ff1-4e73-987a-8c8706c5066a\": \"7c1e72df-7ff1-4e73-987a-8c8706c5066a\", \"3eb503e4-29e8-4cde-bfcd-3bfbf280aafc\": \"3eb503e4-29e8-4cde-bfcd-3bfbf280aafc\", \"36121d44-18fc-4594-a21a-90e168f5082f\": \"36121d44-18fc-4594-a21a-90e168f5082f\", \"89120f0b-a7fc-4534-819b-3028f03632d4\": \"89120f0b-a7fc-4534-819b-3028f03632d4\", \"9acb9a18-b522-4923-a80f-b5e39002b6ef\": \"9acb9a18-b522-4923-a80f-b5e39002b6ef\", \"6801aac7-95ab-4b23-ae71-5ba8e456b7a2\": \"6801aac7-95ab-4b23-ae71-5ba8e456b7a2\", \"b5ebb767-9e90-4877-b891-cfa65ae8ac8d\": \"b5ebb767-9e90-4877-b891-cfa65ae8ac8d\", \"ee27b20c-0d1c-4eed-8b0a-ec42beb60e28\": \"ee27b20c-0d1c-4eed-8b0a-ec42beb60e28\", \"ec814f94-6d0a-4f4b-b5ca-b781d48d0fa3\": \"ec814f94-6d0a-4f4b-b5ca-b781d48d0fa3\", \"a733a156-c4e7-4dbd-b8f7-f1daa37b4fb9\": \"a733a156-c4e7-4dbd-b8f7-f1daa37b4fb9\", \"9411a935-9ae7-4828-8dde-6bd65f725c38\": \"9411a935-9ae7-4828-8dde-6bd65f725c38\", \"2da03df3-b5e4-461e-bb72-d20938ceed7c\": \"2da03df3-b5e4-461e-bb72-d20938ceed7c\", \"de777270-1445-4579-a17a-882d7f4653f2\": \"de777270-1445-4579-a17a-882d7f4653f2\"}, \"doc_id_dict\": {}, \"embeddings_dict\": {}}"}}} \ No newline at end of file +{"index_store/data": {"3c748b5d-8c91-4395-9438-cb3305f308f7": {"__type__": "vector_store", "__data__": "{\"index_id\": \"3c748b5d-8c91-4395-9438-cb3305f308f7\", \"summary\": null, \"nodes_dict\": {\"1b9357d6-4c8e-40b1-bc5b-d13f4c07db7d\": \"1b9357d6-4c8e-40b1-bc5b-d13f4c07db7d\", \"9a7dd336-5118-472f-b99d-c4c0fa26c21c\": \"9a7dd336-5118-472f-b99d-c4c0fa26c21c\", \"8e356062-c915-43f4-8410-08a1b8c52ee3\": \"8e356062-c915-43f4-8410-08a1b8c52ee3\", \"719212ab-2bff-4581-b60d-e36578236552\": \"719212ab-2bff-4581-b60d-e36578236552\", \"759232c4-9bd4-48ed-a2ad-f970920ceeec\": \"759232c4-9bd4-48ed-a2ad-f970920ceeec\", \"67cb5d79-a63d-4b93-a85f-9f897a4ff177\": \"67cb5d79-a63d-4b93-a85f-9f897a4ff177\", \"bf21b013-39f4-4eba-afc8-a33d85670371\": \"bf21b013-39f4-4eba-afc8-a33d85670371\", \"968920d7-bd82-4952-95a6-68a06af2bda0\": \"968920d7-bd82-4952-95a6-68a06af2bda0\", \"73bcd66c-2e87-4ade-be00-4d5267a0e495\": \"73bcd66c-2e87-4ade-be00-4d5267a0e495\", \"9d9af823-92b9-4c61-89b6-9c5c1109e8b0\": \"9d9af823-92b9-4c61-89b6-9c5c1109e8b0\", \"c0f29056-12b9-452a-ba99-b205d18c30d5\": \"c0f29056-12b9-452a-ba99-b205d18c30d5\", \"243b2cae-0971-452c-aa04-1d071f92fa18\": \"243b2cae-0971-452c-aa04-1d071f92fa18\", \"7e60c684-f896-4dea-9bd7-7d27c5f299a8\": \"7e60c684-f896-4dea-9bd7-7d27c5f299a8\", \"95c10e98-6535-4758-ac9c-cdce1ed37540\": \"95c10e98-6535-4758-ac9c-cdce1ed37540\", \"13b8d581-8998-407a-86e8-4f1a70456028\": \"13b8d581-8998-407a-86e8-4f1a70456028\", \"a35cb220-4533-42b3-a062-56ea0cf37bc0\": \"a35cb220-4533-42b3-a062-56ea0cf37bc0\"}, \"doc_id_dict\": {}, \"embeddings_dict\": {}}"}}} \ No newline at end of file diff --git a/local_data/private_gpt/qdrant/collection/make_this_parameterizable_per_api_call/storage.sqlite b/local_data/private_gpt/qdrant/collection/make_this_parameterizable_per_api_call/storage.sqlite index d54c8cfc..04c0ddb6 100644 Binary files a/local_data/private_gpt/qdrant/collection/make_this_parameterizable_per_api_call/storage.sqlite and b/local_data/private_gpt/qdrant/collection/make_this_parameterizable_per_api_call/storage.sqlite differ diff --git a/models/.gitignore b/models/.gitignore deleted file mode 100644 index c96a04f0..00000000 --- a/models/.gitignore +++ /dev/null @@ -1,2 +0,0 @@ -* -!.gitignore \ No newline at end of file diff --git a/poetry.lock b/poetry.lock index fb7467ff..a2bbf1f9 100644 --- a/poetry.lock +++ b/poetry.lock @@ -1,10 +1,10 @@ -# This file is automatically @generated by Poetry 1.7.1 and should not be changed by hand. +# This file is automatically @generated by Poetry 1.8.2 and should not be changed by hand. [[package]] name = "aiofiles" version = "23.2.1" description = "File support for asyncio." -optional = true +optional = false python-versions = ">=3.7" files = [ {file = "aiofiles-23.2.1-py3-none-any.whl", hash = "sha256:19297512c647d4b27a2cf7c34caa7e405c0d60b5560618a29a9fe027b18b0107"}, @@ -175,13 +175,13 @@ files = [ [[package]] name = "anyio" -version = "3.7.1" +version = "4.3.0" description = "High level compatibility layer for multiple asynchronous event loop implementations" optional = false -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "anyio-3.7.1-py3-none-any.whl", hash = "sha256:91dee416e570e92c64041bd18b900d1d6fa78dff7048769ce5ac5ddad004fbb5"}, - {file = "anyio-3.7.1.tar.gz", hash = "sha256:44a3c9aba0f5defa43261a8b3efb97891f2bd7d804e0e1f56419befa1adfc780"}, + {file = "anyio-4.3.0-py3-none-any.whl", hash = "sha256:048e05d0f6caeed70d731f3db756d35dcc1f35747c8c403364a8332c630441b8"}, + {file = "anyio-4.3.0.tar.gz", hash = "sha256:f75253795a87df48568485fd18cdd2a3fa5c4f7c5be8e5e36637733fce06fed6"}, ] [package.dependencies] @@ -189,9 +189,9 @@ idna = ">=2.8" sniffio = ">=1.1" [package.extras] -doc = ["Sphinx", "packaging", "sphinx-autodoc-typehints (>=1.2.0)", "sphinx-rtd-theme (>=1.2.2)", "sphinxcontrib-jquery"] -test = ["anyio[trio]", "coverage[toml] (>=4.5)", "hypothesis (>=4.0)", "mock (>=4)", "psutil (>=5.9)", "pytest (>=7.0)", "pytest-mock (>=3.6.1)", "trustme", "uvloop (>=0.17)"] -trio = ["trio (<0.22)"] +doc = ["Sphinx (>=7)", "packaging", "sphinx-autodoc-typehints (>=1.2.0)", "sphinx-rtd-theme"] +test = ["anyio[trio]", "coverage[toml] (>=7)", "exceptiongroup (>=1.2.0)", "hypothesis (>=4.0)", "psutil (>=5.9)", "pytest (>=7.0)", "pytest-mock (>=3.6.1)", "trustme", "uvloop (>=0.17)"] +trio = ["trio (>=0.23)"] [[package]] name = "asgiref" @@ -395,17 +395,17 @@ uvloop = ["uvloop (>=0.15.2)"] [[package]] name = "boto3" -version = "1.34.51" +version = "1.34.64" description = "The AWS SDK for Python" optional = true python-versions = ">= 3.8" files = [ - {file = "boto3-1.34.51-py3-none-any.whl", hash = "sha256:67732634dc7d0afda879bd9a5e2d0818a2c14a98bef766b95a3e253ea5104cb9"}, - {file = "boto3-1.34.51.tar.gz", hash = "sha256:2cd9463e738a184cbce8a6824027c22163c5f73e277a35ff5aa0fb0e845b4301"}, + {file = "boto3-1.34.64-py3-none-any.whl", hash = "sha256:8c6fbd3d45399a4e4685010117fb2dc52fc6afdab5a9460957d463ae0c2cc55d"}, + {file = "boto3-1.34.64.tar.gz", hash = "sha256:e5d681f443645e6953ed0727bf756bf16d85efefcb69cf051d04a070ce65e545"}, ] [package.dependencies] -botocore = ">=1.34.51,<1.35.0" +botocore = ">=1.34.64,<1.35.0" jmespath = ">=0.7.1,<2.0.0" s3transfer = ">=0.10.0,<0.11.0" @@ -414,19 +414,19 @@ crt = ["botocore[crt] (>=1.21.0,<2.0a0)"] [[package]] name = "botocore" -version = "1.34.51" +version = "1.34.64" description = "Low-level, data-driven core of boto 3." optional = true python-versions = ">= 3.8" files = [ - {file = "botocore-1.34.51-py3-none-any.whl", hash = "sha256:01d5156247f991b3466a8404e3d7460a9ecbd9b214f9992d6ba797d9ddc6f120"}, - {file = "botocore-1.34.51.tar.gz", hash = "sha256:5086217442e67dd9de36ec7e87a0c663f76b7790d5fb6a12de565af95e87e319"}, + {file = "botocore-1.34.64-py3-none-any.whl", hash = "sha256:0ab760908749fe82325698591c49755a5bb20307d85a419aca9cc74e783b9407"}, + {file = "botocore-1.34.64.tar.gz", hash = "sha256:084f8c45216d62dc1add2350e236a2d5283526aacd0681e9818b37a6a5e5438b"}, ] [package.dependencies] jmespath = ">=0.7.1,<2.0.0" python-dateutil = ">=2.1,<3.0.0" -urllib3 = {version = ">=1.25.4,<2.1", markers = "python_version >= \"3.10\""} +urllib3 = {version = ">=1.25.4,<2.2.0 || >2.2.0,<3", markers = "python_version >= \"3.10\""} [package.extras] crt = ["awscrt (==0.19.19)"] @@ -578,13 +578,13 @@ beautifulsoup4 = "*" [[package]] name = "build" -version = "1.0.3" +version = "1.1.1" description = "A simple, correct Python build frontend" optional = true python-versions = ">= 3.7" files = [ - {file = "build-1.0.3-py3-none-any.whl", hash = "sha256:589bf99a67df7c9cf07ec0ac0e5e2ea5d4b37ac63301c4986d1acb126aa83f8f"}, - {file = "build-1.0.3.tar.gz", hash = "sha256:538aab1b64f9828977f84bc63ae570b060a8ed1be419e7870b8b4fc5e6ea553b"}, + {file = "build-1.1.1-py3-none-any.whl", hash = "sha256:8ed0851ee76e6e38adce47e4bee3b51c771d86c64cf578d0c2245567ee200e73"}, + {file = "build-1.1.1.tar.gz", hash = "sha256:8eea65bb45b1aac2e734ba2cc8dad3a6d97d97901a395bd0ed3e7b46953d2a31"}, ] [package.dependencies] @@ -600,13 +600,13 @@ virtualenv = ["virtualenv (>=20.0.35)"] [[package]] name = "cachetools" -version = "5.3.2" +version = "5.3.3" description = "Extensible memoizing collections and decorators" optional = true python-versions = ">=3.7" files = [ - {file = "cachetools-5.3.2-py3-none-any.whl", hash = "sha256:861f35a13a451f94e301ce2bec7cac63e881232ccce7ed67fab9b5df4d3beaa1"}, - {file = "cachetools-5.3.2.tar.gz", hash = "sha256:086ee420196f7b2ab9ca2db2520aca326318b68fe5ba8bc4d49cca91add450f2"}, + {file = "cachetools-5.3.3-py3-none-any.whl", hash = "sha256:0abad1021d3f8325b2fc1d2e9c8b9c9d57b04c3932657a72465447332c24d945"}, + {file = "cachetools-5.3.3.tar.gz", hash = "sha256:ba29e2dfa0b8b556606f097407ed1aa62080ee108ab0dc5ec9d6a723a007d105"}, ] [[package]] @@ -979,63 +979,63 @@ test-no-images = ["pytest", "pytest-cov", "pytest-xdist", "wurlitzer"] [[package]] name = "coverage" -version = "7.4.1" +version = "7.4.4" description = "Code coverage measurement for Python" optional = false python-versions = ">=3.8" files = [ - {file = "coverage-7.4.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:077d366e724f24fc02dbfe9d946534357fda71af9764ff99d73c3c596001bbd7"}, - {file = "coverage-7.4.1-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:0193657651f5399d433c92f8ae264aff31fc1d066deee4b831549526433f3f61"}, - {file = "coverage-7.4.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d17bbc946f52ca67adf72a5ee783cd7cd3477f8f8796f59b4974a9b59cacc9ee"}, - {file = "coverage-7.4.1-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a3277f5fa7483c927fe3a7b017b39351610265308f5267ac6d4c2b64cc1d8d25"}, - {file = "coverage-7.4.1-cp310-cp310-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:6dceb61d40cbfcf45f51e59933c784a50846dc03211054bd76b421a713dcdf19"}, - {file = "coverage-7.4.1-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:6008adeca04a445ea6ef31b2cbaf1d01d02986047606f7da266629afee982630"}, - {file = "coverage-7.4.1-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:c61f66d93d712f6e03369b6a7769233bfda880b12f417eefdd4f16d1deb2fc4c"}, - {file = "coverage-7.4.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:b9bb62fac84d5f2ff523304e59e5c439955fb3b7f44e3d7b2085184db74d733b"}, - {file = "coverage-7.4.1-cp310-cp310-win32.whl", hash = "sha256:f86f368e1c7ce897bf2457b9eb61169a44e2ef797099fb5728482b8d69f3f016"}, - {file = "coverage-7.4.1-cp310-cp310-win_amd64.whl", hash = "sha256:869b5046d41abfea3e381dd143407b0d29b8282a904a19cb908fa24d090cc018"}, - {file = "coverage-7.4.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:b8ffb498a83d7e0305968289441914154fb0ef5d8b3157df02a90c6695978295"}, - {file = "coverage-7.4.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:3cacfaefe6089d477264001f90f55b7881ba615953414999c46cc9713ff93c8c"}, - {file = "coverage-7.4.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:5d6850e6e36e332d5511a48a251790ddc545e16e8beaf046c03985c69ccb2676"}, - {file = "coverage-7.4.1-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:18e961aa13b6d47f758cc5879383d27b5b3f3dcd9ce8cdbfdc2571fe86feb4dd"}, - {file = "coverage-7.4.1-cp311-cp311-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:dfd1e1b9f0898817babf840b77ce9fe655ecbe8b1b327983df485b30df8cc011"}, - {file = "coverage-7.4.1-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:6b00e21f86598b6330f0019b40fb397e705135040dbedc2ca9a93c7441178e74"}, - {file = "coverage-7.4.1-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:536d609c6963c50055bab766d9951b6c394759190d03311f3e9fcf194ca909e1"}, - {file = "coverage-7.4.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:7ac8f8eb153724f84885a1374999b7e45734bf93a87d8df1e7ce2146860edef6"}, - {file = "coverage-7.4.1-cp311-cp311-win32.whl", hash = "sha256:f3771b23bb3675a06f5d885c3630b1d01ea6cac9e84a01aaf5508706dba546c5"}, - {file = "coverage-7.4.1-cp311-cp311-win_amd64.whl", hash = "sha256:9d2f9d4cc2a53b38cabc2d6d80f7f9b7e3da26b2f53d48f05876fef7956b6968"}, - {file = "coverage-7.4.1-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:f68ef3660677e6624c8cace943e4765545f8191313a07288a53d3da188bd8581"}, - {file = "coverage-7.4.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:23b27b8a698e749b61809fb637eb98ebf0e505710ec46a8aa6f1be7dc0dc43a6"}, - {file = "coverage-7.4.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:3e3424c554391dc9ef4a92ad28665756566a28fecf47308f91841f6c49288e66"}, - {file = "coverage-7.4.1-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:e0860a348bf7004c812c8368d1fc7f77fe8e4c095d661a579196a9533778e156"}, - {file = "coverage-7.4.1-cp312-cp312-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fe558371c1bdf3b8fa03e097c523fb9645b8730399c14fe7721ee9c9e2a545d3"}, - {file = "coverage-7.4.1-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:3468cc8720402af37b6c6e7e2a9cdb9f6c16c728638a2ebc768ba1ef6f26c3a1"}, - {file = "coverage-7.4.1-cp312-cp312-musllinux_1_1_i686.whl", hash = "sha256:02f2edb575d62172aa28fe00efe821ae31f25dc3d589055b3fb64d51e52e4ab1"}, - {file = "coverage-7.4.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:ca6e61dc52f601d1d224526360cdeab0d0712ec104a2ce6cc5ccef6ed9a233bc"}, - {file = "coverage-7.4.1-cp312-cp312-win32.whl", hash = "sha256:ca7b26a5e456a843b9b6683eada193fc1f65c761b3a473941efe5a291f604c74"}, - {file = "coverage-7.4.1-cp312-cp312-win_amd64.whl", hash = "sha256:85ccc5fa54c2ed64bd91ed3b4a627b9cce04646a659512a051fa82a92c04a448"}, - {file = "coverage-7.4.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:8bdb0285a0202888d19ec6b6d23d5990410decb932b709f2b0dfe216d031d218"}, - {file = "coverage-7.4.1-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:918440dea04521f499721c039863ef95433314b1db00ff826a02580c1f503e45"}, - {file = "coverage-7.4.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:379d4c7abad5afbe9d88cc31ea8ca262296480a86af945b08214eb1a556a3e4d"}, - {file = "coverage-7.4.1-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:b094116f0b6155e36a304ff912f89bbb5067157aff5f94060ff20bbabdc8da06"}, - {file = "coverage-7.4.1-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:f2f5968608b1fe2a1d00d01ad1017ee27efd99b3437e08b83ded9b7af3f6f766"}, - {file = "coverage-7.4.1-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:10e88e7f41e6197ea0429ae18f21ff521d4f4490aa33048f6c6f94c6045a6a75"}, - {file = "coverage-7.4.1-cp38-cp38-musllinux_1_1_i686.whl", hash = "sha256:a4a3907011d39dbc3e37bdc5df0a8c93853c369039b59efa33a7b6669de04c60"}, - {file = "coverage-7.4.1-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:6d224f0c4c9c98290a6990259073f496fcec1b5cc613eecbd22786d398ded3ad"}, - {file = "coverage-7.4.1-cp38-cp38-win32.whl", hash = "sha256:23f5881362dcb0e1a92b84b3c2809bdc90db892332daab81ad8f642d8ed55042"}, - {file = "coverage-7.4.1-cp38-cp38-win_amd64.whl", hash = "sha256:a07f61fc452c43cd5328b392e52555f7d1952400a1ad09086c4a8addccbd138d"}, - {file = "coverage-7.4.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:8e738a492b6221f8dcf281b67129510835461132b03024830ac0e554311a5c54"}, - {file = "coverage-7.4.1-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:46342fed0fff72efcda77040b14728049200cbba1279e0bf1188f1f2078c1d70"}, - {file = "coverage-7.4.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:9641e21670c68c7e57d2053ddf6c443e4f0a6e18e547e86af3fad0795414a628"}, - {file = "coverage-7.4.1-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:aeb2c2688ed93b027eb0d26aa188ada34acb22dceea256d76390eea135083950"}, - {file = "coverage-7.4.1-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:d12c923757de24e4e2110cf8832d83a886a4cf215c6e61ed506006872b43a6d1"}, - {file = "coverage-7.4.1-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:0491275c3b9971cdbd28a4595c2cb5838f08036bca31765bad5e17edf900b2c7"}, - {file = "coverage-7.4.1-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:8dfc5e195bbef80aabd81596ef52a1277ee7143fe419efc3c4d8ba2754671756"}, - {file = "coverage-7.4.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:1a78b656a4d12b0490ca72651fe4d9f5e07e3c6461063a9b6265ee45eb2bdd35"}, - {file = "coverage-7.4.1-cp39-cp39-win32.whl", hash = "sha256:f90515974b39f4dea2f27c0959688621b46d96d5a626cf9c53dbc653a895c05c"}, - {file = "coverage-7.4.1-cp39-cp39-win_amd64.whl", hash = "sha256:64e723ca82a84053dd7bfcc986bdb34af8d9da83c521c19d6b472bc6880e191a"}, - {file = "coverage-7.4.1-pp38.pp39.pp310-none-any.whl", hash = "sha256:32a8d985462e37cfdab611a6f95b09d7c091d07668fdc26e47a725ee575fe166"}, - {file = "coverage-7.4.1.tar.gz", hash = "sha256:1ed4b95480952b1a26d863e546fa5094564aa0065e1e5f0d4d0041f293251d04"}, + {file = "coverage-7.4.4-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:e0be5efd5127542ef31f165de269f77560d6cdef525fffa446de6f7e9186cfb2"}, + {file = "coverage-7.4.4-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:ccd341521be3d1b3daeb41960ae94a5e87abe2f46f17224ba5d6f2b8398016cf"}, + {file = "coverage-7.4.4-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:09fa497a8ab37784fbb20ab699c246053ac294d13fc7eb40ec007a5043ec91f8"}, + {file = "coverage-7.4.4-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:b1a93009cb80730c9bca5d6d4665494b725b6e8e157c1cb7f2db5b4b122ea562"}, + {file = "coverage-7.4.4-cp310-cp310-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:690db6517f09336559dc0b5f55342df62370a48f5469fabf502db2c6d1cffcd2"}, + {file = "coverage-7.4.4-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:09c3255458533cb76ef55da8cc49ffab9e33f083739c8bd4f58e79fecfe288f7"}, + {file = "coverage-7.4.4-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:8ce1415194b4a6bd0cdcc3a1dfbf58b63f910dcb7330fe15bdff542c56949f87"}, + {file = "coverage-7.4.4-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:b91cbc4b195444e7e258ba27ac33769c41b94967919f10037e6355e998af255c"}, + {file = "coverage-7.4.4-cp310-cp310-win32.whl", hash = "sha256:598825b51b81c808cb6f078dcb972f96af96b078faa47af7dfcdf282835baa8d"}, + {file = "coverage-7.4.4-cp310-cp310-win_amd64.whl", hash = "sha256:09ef9199ed6653989ebbcaacc9b62b514bb63ea2f90256e71fea3ed74bd8ff6f"}, + {file = "coverage-7.4.4-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:0f9f50e7ef2a71e2fae92774c99170eb8304e3fdf9c8c3c7ae9bab3e7229c5cf"}, + {file = "coverage-7.4.4-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:623512f8ba53c422fcfb2ce68362c97945095b864cda94a92edbaf5994201083"}, + {file = "coverage-7.4.4-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:0513b9508b93da4e1716744ef6ebc507aff016ba115ffe8ecff744d1322a7b63"}, + {file = "coverage-7.4.4-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:40209e141059b9370a2657c9b15607815359ab3ef9918f0196b6fccce8d3230f"}, + {file = "coverage-7.4.4-cp311-cp311-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:8a2b2b78c78293782fd3767d53e6474582f62443d0504b1554370bde86cc8227"}, + {file = "coverage-7.4.4-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:73bfb9c09951125d06ee473bed216e2c3742f530fc5acc1383883125de76d9cd"}, + {file = "coverage-7.4.4-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:1f384c3cc76aeedce208643697fb3e8437604b512255de6d18dae3f27655a384"}, + {file = "coverage-7.4.4-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:54eb8d1bf7cacfbf2a3186019bcf01d11c666bd495ed18717162f7eb1e9dd00b"}, + {file = "coverage-7.4.4-cp311-cp311-win32.whl", hash = "sha256:cac99918c7bba15302a2d81f0312c08054a3359eaa1929c7e4b26ebe41e9b286"}, + {file = "coverage-7.4.4-cp311-cp311-win_amd64.whl", hash = "sha256:b14706df8b2de49869ae03a5ccbc211f4041750cd4a66f698df89d44f4bd30ec"}, + {file = "coverage-7.4.4-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:201bef2eea65e0e9c56343115ba3814e896afe6d36ffd37bab783261db430f76"}, + {file = "coverage-7.4.4-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:41c9c5f3de16b903b610d09650e5e27adbfa7f500302718c9ffd1c12cf9d6818"}, + {file = "coverage-7.4.4-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d898fe162d26929b5960e4e138651f7427048e72c853607f2b200909794ed978"}, + {file = "coverage-7.4.4-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:3ea79bb50e805cd6ac058dfa3b5c8f6c040cb87fe83de10845857f5535d1db70"}, + {file = "coverage-7.4.4-cp312-cp312-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:ce4b94265ca988c3f8e479e741693d143026632672e3ff924f25fab50518dd51"}, + {file = "coverage-7.4.4-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:00838a35b882694afda09f85e469c96367daa3f3f2b097d846a7216993d37f4c"}, + {file = "coverage-7.4.4-cp312-cp312-musllinux_1_1_i686.whl", hash = "sha256:fdfafb32984684eb03c2d83e1e51f64f0906b11e64482df3c5db936ce3839d48"}, + {file = "coverage-7.4.4-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:69eb372f7e2ece89f14751fbcbe470295d73ed41ecd37ca36ed2eb47512a6ab9"}, + {file = "coverage-7.4.4-cp312-cp312-win32.whl", hash = "sha256:137eb07173141545e07403cca94ab625cc1cc6bc4c1e97b6e3846270e7e1fea0"}, + {file = "coverage-7.4.4-cp312-cp312-win_amd64.whl", hash = "sha256:d71eec7d83298f1af3326ce0ff1d0ea83c7cb98f72b577097f9083b20bdaf05e"}, + {file = "coverage-7.4.4-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:d5ae728ff3b5401cc320d792866987e7e7e880e6ebd24433b70a33b643bb0384"}, + {file = "coverage-7.4.4-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:cc4f1358cb0c78edef3ed237ef2c86056206bb8d9140e73b6b89fbcfcbdd40e1"}, + {file = "coverage-7.4.4-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:8130a2aa2acb8788e0b56938786c33c7c98562697bf9f4c7d6e8e5e3a0501e4a"}, + {file = "coverage-7.4.4-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:cf271892d13e43bc2b51e6908ec9a6a5094a4df1d8af0bfc360088ee6c684409"}, + {file = "coverage-7.4.4-cp38-cp38-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:a4cdc86d54b5da0df6d3d3a2f0b710949286094c3a6700c21e9015932b81447e"}, + {file = "coverage-7.4.4-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:ae71e7ddb7a413dd60052e90528f2f65270aad4b509563af6d03d53e979feafd"}, + {file = "coverage-7.4.4-cp38-cp38-musllinux_1_1_i686.whl", hash = "sha256:38dd60d7bf242c4ed5b38e094baf6401faa114fc09e9e6632374388a404f98e7"}, + {file = "coverage-7.4.4-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:aa5b1c1bfc28384f1f53b69a023d789f72b2e0ab1b3787aae16992a7ca21056c"}, + {file = "coverage-7.4.4-cp38-cp38-win32.whl", hash = "sha256:dfa8fe35a0bb90382837b238fff375de15f0dcdb9ae68ff85f7a63649c98527e"}, + {file = "coverage-7.4.4-cp38-cp38-win_amd64.whl", hash = "sha256:b2991665420a803495e0b90a79233c1433d6ed77ef282e8e152a324bbbc5e0c8"}, + {file = "coverage-7.4.4-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:3b799445b9f7ee8bf299cfaed6f5b226c0037b74886a4e11515e569b36fe310d"}, + {file = "coverage-7.4.4-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:b4d33f418f46362995f1e9d4f3a35a1b6322cb959c31d88ae56b0298e1c22357"}, + {file = "coverage-7.4.4-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:aadacf9a2f407a4688d700e4ebab33a7e2e408f2ca04dbf4aef17585389eff3e"}, + {file = "coverage-7.4.4-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:7c95949560050d04d46b919301826525597f07b33beba6187d04fa64d47ac82e"}, + {file = "coverage-7.4.4-cp39-cp39-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:ff7687ca3d7028d8a5f0ebae95a6e4827c5616b31a4ee1192bdfde697db110d4"}, + {file = "coverage-7.4.4-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:5fc1de20b2d4a061b3df27ab9b7c7111e9a710f10dc2b84d33a4ab25065994ec"}, + {file = "coverage-7.4.4-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:c74880fc64d4958159fbd537a091d2a585448a8f8508bf248d72112723974cbd"}, + {file = "coverage-7.4.4-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:742a76a12aa45b44d236815d282b03cfb1de3b4323f3e4ec933acfae08e54ade"}, + {file = "coverage-7.4.4-cp39-cp39-win32.whl", hash = "sha256:d89d7b2974cae412400e88f35d86af72208e1ede1a541954af5d944a8ba46c57"}, + {file = "coverage-7.4.4-cp39-cp39-win_amd64.whl", hash = "sha256:9ca28a302acb19b6af89e90f33ee3e1906961f94b54ea37de6737b7ca9d8827c"}, + {file = "coverage-7.4.4-pp38.pp39.pp310-none-any.whl", hash = "sha256:b2c5edc4ac10a7ef6605a966c58929ec6c1bd0917fb8c15cb3363f65aa40e677"}, + {file = "coverage-7.4.4.tar.gz", hash = "sha256:c901df83d097649e257e803be22592aedfd5182f07b3cc87d640bbb9afd50f49"}, ] [package.extras] @@ -1077,13 +1077,13 @@ tests = ["pytest", "pytest-cov", "pytest-xdist"] [[package]] name = "dataclasses-json" -version = "0.5.14" +version = "0.6.4" description = "Easily serialize dataclasses to and from JSON." optional = false -python-versions = ">=3.7,<3.13" +python-versions = ">=3.7,<4.0" files = [ - {file = "dataclasses_json-0.5.14-py3-none-any.whl", hash = "sha256:5ec6fed642adb1dbdb4182badb01e0861badfd8fda82e3b67f44b2d1e9d10d21"}, - {file = "dataclasses_json-0.5.14.tar.gz", hash = "sha256:d82896a94c992ffaf689cd1fafc180164e2abdd415b8f94a7f78586af5886236"}, + {file = "dataclasses_json-0.6.4-py3-none-any.whl", hash = "sha256:f90578b8a3177f7552f4e1a6e535e84293cd5da421fcce0642d49c0d7bdf8df2"}, + {file = "dataclasses_json-0.6.4.tar.gz", hash = "sha256:73696ebf24936560cca79a2430cbc4f3dd23ac7bf46ed17f38e5e5e7657a6377"}, ] [package.dependencies] @@ -1164,22 +1164,22 @@ files = [ [[package]] name = "dnspython" -version = "2.5.0" +version = "2.6.1" description = "DNS toolkit" optional = false python-versions = ">=3.8" files = [ - {file = "dnspython-2.5.0-py3-none-any.whl", hash = "sha256:6facdf76b73c742ccf2d07add296f178e629da60be23ce4b0a9c927b1e02c3a6"}, - {file = "dnspython-2.5.0.tar.gz", hash = "sha256:a0034815a59ba9ae888946be7ccca8f7c157b286f8455b379c692efb51022a15"}, + {file = "dnspython-2.6.1-py3-none-any.whl", hash = "sha256:5ef3b9680161f6fa89daf8ad451b5f1a33b18ae8a1c6778cdf4b43f08c0a6e50"}, + {file = "dnspython-2.6.1.tar.gz", hash = "sha256:e8f0f9c23a7b7cb99ded64e6c3a6f3e701d78f50c55e002b839dea7225cff7cc"}, ] [package.extras] -dev = ["black (>=23.1.0)", "coverage (>=7.0)", "flake8 (>=5.0.3)", "mypy (>=1.0.1)", "pylint (>=2.7)", "pytest (>=6.2.5)", "pytest-cov (>=3.0.0)", "sphinx (>=7.0.0)", "twine (>=4.0.0)", "wheel (>=0.41.0)"] +dev = ["black (>=23.1.0)", "coverage (>=7.0)", "flake8 (>=7)", "mypy (>=1.8)", "pylint (>=3)", "pytest (>=7.4)", "pytest-cov (>=4.1.0)", "sphinx (>=7.2.0)", "twine (>=4.0.0)", "wheel (>=0.42.0)"] dnssec = ["cryptography (>=41)"] -doh = ["h2 (>=4.1.0)", "httpcore (>=0.17.3)", "httpx (>=0.25.1)"] -doq = ["aioquic (>=0.9.20)"] -idna = ["idna (>=2.1)"] -trio = ["trio (>=0.14)"] +doh = ["h2 (>=4.1.0)", "httpcore (>=1.0.0)", "httpx (>=0.26.0)"] +doq = ["aioquic (>=0.9.25)"] +idna = ["idna (>=3.6)"] +trio = ["trio (>=0.23)"] wmi = ["wmi (>=1.5.1)"] [[package]] @@ -1212,13 +1212,13 @@ gmpy2 = ["gmpy2"] [[package]] name = "email-validator" -version = "2.1.0.post1" +version = "2.1.1" description = "A robust email address syntax and deliverability validation library." optional = false python-versions = ">=3.8" files = [ - {file = "email_validator-2.1.0.post1-py3-none-any.whl", hash = "sha256:c973053efbeddfef924dc0bd93f6e77a1ea7ee0fce935aea7103c7a3d6d2d637"}, - {file = "email_validator-2.1.0.post1.tar.gz", hash = "sha256:a4b0bd1cf55f073b924258d19321b1f3aa74b4b5a71a42c305575dba920e1a44"}, + {file = "email_validator-2.1.1-py3-none-any.whl", hash = "sha256:97d882d174e2a65732fb43bfce81a3a834cbc1bde8bf419e30ef5ea976370a05"}, + {file = "email_validator-2.1.1.tar.gz", hash = "sha256:200a70680ba08904be6d1eef729205cc0d687634399a5924d842533efb824b84"}, ] [package.dependencies] @@ -1283,64 +1283,64 @@ typing = ["typing-extensions (>=4.8)"] [[package]] name = "flatbuffers" -version = "23.5.26" +version = "24.3.7" description = "The FlatBuffers serialization format for Python" optional = true python-versions = "*" files = [ - {file = "flatbuffers-23.5.26-py2.py3-none-any.whl", hash = "sha256:c0ff356da363087b915fde4b8b45bdda73432fc17cddb3c8157472eab1422ad1"}, - {file = "flatbuffers-23.5.26.tar.gz", hash = "sha256:9ea1144cac05ce5d86e2859f431c6cd5e66cd9c78c558317c7955fb8d4c78d89"}, + {file = "flatbuffers-24.3.7-py2.py3-none-any.whl", hash = "sha256:80c4f5dcad0ee76b7e349671a0d657f2fbba927a0244f88dd3f5ed6a3694e1fc"}, + {file = "flatbuffers-24.3.7.tar.gz", hash = "sha256:0895c22b9a6019ff2f4de2e5e2f7cd15914043e6e7033a94c0c6369422690f22"}, ] [[package]] name = "fonttools" -version = "4.48.1" +version = "4.50.0" description = "Tools to manipulate font files" optional = false python-versions = ">=3.8" files = [ - {file = "fonttools-4.48.1-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:702ae93058c81f46461dc4b2c79f11d3c3d8fd7296eaf8f75b4ba5bbf813cd5f"}, - {file = "fonttools-4.48.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:97f0a49fa6aa2d6205c6f72f4f98b74ef4b9bfdcb06fd78e6fe6c7af4989b63e"}, - {file = "fonttools-4.48.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d3260db55f1843e57115256e91247ad9f68cb02a434b51262fe0019e95a98738"}, - {file = "fonttools-4.48.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:e740a7602c2bb71e1091269b5dbe89549749a8817dc294b34628ffd8b2bf7124"}, - {file = "fonttools-4.48.1-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:4108b1d247953dd7c90ec8f457a2dec5fceb373485973cc852b14200118a51ee"}, - {file = "fonttools-4.48.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:56339ec557f0c342bddd7c175f5e41c45fc21282bee58a86bd9aa322bec715f2"}, - {file = "fonttools-4.48.1-cp310-cp310-win32.whl", hash = "sha256:bff5b38d0e76eb18e0b8abbf35d384e60b3371be92f7be36128ee3e67483b3ec"}, - {file = "fonttools-4.48.1-cp310-cp310-win_amd64.whl", hash = "sha256:f7449493886da6a17472004d3818cc050ba3f4a0aa03fb47972e4fa5578e6703"}, - {file = "fonttools-4.48.1-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:18b35fd1a850ed7233a99bbd6774485271756f717dac8b594958224b54118b61"}, - {file = "fonttools-4.48.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:cad5cfd044ea2e306fda44482b3dd32ee47830fa82dfa4679374b41baa294f5f"}, - {file = "fonttools-4.48.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:6f30e605c7565d0da6f0aec75a30ec372072d016957cd8fc4469721a36ea59b7"}, - {file = "fonttools-4.48.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:aee76fd81a8571c68841d6ef0da750d5ff08ff2c5f025576473016f16ac3bcf7"}, - {file = "fonttools-4.48.1-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:5057ade278e67923000041e2b195c9ea53e87f227690d499b6a4edd3702f7f01"}, - {file = "fonttools-4.48.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:b10633aafc5932995a391ec07eba5e79f52af0003a1735b2306b3dab8a056d48"}, - {file = "fonttools-4.48.1-cp311-cp311-win32.whl", hash = "sha256:0d533f89819f9b3ee2dbedf0fed3825c425850e32bdda24c558563c71be0064e"}, - {file = "fonttools-4.48.1-cp311-cp311-win_amd64.whl", hash = "sha256:d20588466367f05025bb1efdf4e5d498ca6d14bde07b6928b79199c588800f0a"}, - {file = "fonttools-4.48.1-cp312-cp312-macosx_10_9_universal2.whl", hash = "sha256:0a2417547462e468edf35b32e3dd06a6215ac26aa6316b41e03b8eeaf9f079ea"}, - {file = "fonttools-4.48.1-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:cf5a0cd974f85a80b74785db2d5c3c1fd6cc09a2ba3c837359b2b5da629ee1b0"}, - {file = "fonttools-4.48.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:0452fcbfbce752ba596737a7c5ec5cf76bc5f83847ce1781f4f90eab14ece252"}, - {file = "fonttools-4.48.1-cp312-cp312-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:578c00f93868f64a4102ecc5aa600a03b49162c654676c3fadc33de2ddb88a81"}, - {file = "fonttools-4.48.1-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:63dc592a16cd08388d8c4c7502b59ac74190b23e16dfc863c69fe1ea74605b68"}, - {file = "fonttools-4.48.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:9b58638d8a85e3a1b32ec0a91d9f8171a877b4b81c408d4cb3257d0dee63e092"}, - {file = "fonttools-4.48.1-cp312-cp312-win32.whl", hash = "sha256:d10979ef14a8beaaa32f613bb698743f7241d92f437a3b5e32356dfb9769c65d"}, - {file = "fonttools-4.48.1-cp312-cp312-win_amd64.whl", hash = "sha256:cdfd7557d1bd294a200bd211aa665ca3b02998dcc18f8211a5532da5b8fad5c5"}, - {file = "fonttools-4.48.1-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:3cdb9a92521b81bf717ebccf592bd0292e853244d84115bfb4db0c426de58348"}, - {file = "fonttools-4.48.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:9b4ec6d42a7555f5ae35f3b805482f0aad0f1baeeef54859492ea3b782959d4a"}, - {file = "fonttools-4.48.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:902e9c4e9928301912f34a6638741b8ae0b64824112b42aaf240e06b735774b1"}, - {file = "fonttools-4.48.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:a8c8b54bd1420c184a995f980f1a8076f87363e2bb24239ef8c171a369d85a31"}, - {file = "fonttools-4.48.1-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:12ee86abca46193359ea69216b3a724e90c66ab05ab220d39e3fc068c1eb72ac"}, - {file = "fonttools-4.48.1-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:6978bade7b6c0335095bdd0bd97f8f3d590d2877b370f17e03e0865241694eb5"}, - {file = "fonttools-4.48.1-cp38-cp38-win32.whl", hash = "sha256:bcd77f89fc1a6b18428e7a55dde8ef56dae95640293bfb8f4e929929eba5e2a2"}, - {file = "fonttools-4.48.1-cp38-cp38-win_amd64.whl", hash = "sha256:f40441437b039930428e04fb05ac3a132e77458fb57666c808d74a556779e784"}, - {file = "fonttools-4.48.1-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:0d2b01428f7da26f229a5656defc824427b741e454b4e210ad2b25ed6ea2aed4"}, - {file = "fonttools-4.48.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:df48798f9a4fc4c315ab46e17873436c8746f5df6eddd02fad91299b2af7af95"}, - {file = "fonttools-4.48.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:2eb4167bde04e172a93cf22c875d8b0cff76a2491f67f5eb069566215302d45d"}, - {file = "fonttools-4.48.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:c900508c46274d32d308ae8e82335117f11aaee1f7d369ac16502c9a78930b0a"}, - {file = "fonttools-4.48.1-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:594206b31c95fcfa65f484385171fabb4ec69f7d2d7f56d27f17db26b7a31814"}, - {file = "fonttools-4.48.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:292922dc356d7f11f5063b4111a8b719efb8faea92a2a88ed296408d449d8c2e"}, - {file = "fonttools-4.48.1-cp39-cp39-win32.whl", hash = "sha256:4709c5bf123ba10eac210d2d5c9027d3f472591d9f1a04262122710fa3d23199"}, - {file = "fonttools-4.48.1-cp39-cp39-win_amd64.whl", hash = "sha256:63c73b9dd56a94a3cbd2f90544b5fca83666948a9e03370888994143b8d7c070"}, - {file = "fonttools-4.48.1-py3-none-any.whl", hash = "sha256:e3e33862fc5261d46d9aae3544acb36203b1a337d00bdb5d3753aae50dac860e"}, - {file = "fonttools-4.48.1.tar.gz", hash = "sha256:8b8a45254218679c7f1127812761e7854ed5c8e34349aebf581e8c9204e7495a"}, + {file = "fonttools-4.50.0-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:effd303fb422f8ce06543a36ca69148471144c534cc25f30e5be752bc4f46736"}, + {file = "fonttools-4.50.0-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:7913992ab836f621d06aabac118fc258b9947a775a607e1a737eb3a91c360335"}, + {file = "fonttools-4.50.0-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:8e0a1c5bd2f63da4043b63888534b52c5a1fd7ae187c8ffc64cbb7ae475b9dab"}, + {file = "fonttools-4.50.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:d40fc98540fa5360e7ecf2c56ddf3c6e7dd04929543618fd7b5cc76e66390562"}, + {file = "fonttools-4.50.0-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:9fff65fbb7afe137bac3113827855e0204482727bddd00a806034ab0d3951d0d"}, + {file = "fonttools-4.50.0-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:b1aeae3dd2ee719074a9372c89ad94f7c581903306d76befdaca2a559f802472"}, + {file = "fonttools-4.50.0-cp310-cp310-win32.whl", hash = "sha256:e9623afa319405da33b43c85cceb0585a6f5d3a1d7c604daf4f7e1dd55c03d1f"}, + {file = "fonttools-4.50.0-cp310-cp310-win_amd64.whl", hash = "sha256:778c5f43e7e654ef7fe0605e80894930bc3a7772e2f496238e57218610140f54"}, + {file = "fonttools-4.50.0-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:3dfb102e7f63b78c832e4539969167ffcc0375b013080e6472350965a5fe8048"}, + {file = "fonttools-4.50.0-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:9e58fe34cb379ba3d01d5d319d67dd3ce7ca9a47ad044ea2b22635cd2d1247fc"}, + {file = "fonttools-4.50.0-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:2c673ab40d15a442a4e6eb09bf007c1dda47c84ac1e2eecbdf359adacb799c24"}, + {file = "fonttools-4.50.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:9b3ac35cdcd1a4c90c23a5200212c1bb74fa05833cc7c14291d7043a52ca2aaa"}, + {file = "fonttools-4.50.0-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:8844e7a2c5f7ecf977e82eb6b3014f025c8b454e046d941ece05b768be5847ae"}, + {file = "fonttools-4.50.0-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:f849bd3c5c2249b49c98eca5aaebb920d2bfd92b3c69e84ca9bddf133e9f83f0"}, + {file = "fonttools-4.50.0-cp311-cp311-win32.whl", hash = "sha256:39293ff231b36b035575e81c14626dfc14407a20de5262f9596c2cbb199c3625"}, + {file = "fonttools-4.50.0-cp311-cp311-win_amd64.whl", hash = "sha256:c33d5023523b44d3481624f840c8646656a1def7630ca562f222eb3ead16c438"}, + {file = "fonttools-4.50.0-cp312-cp312-macosx_10_9_universal2.whl", hash = "sha256:b4a886a6dbe60100ba1cd24de962f8cd18139bd32808da80de1fa9f9f27bf1dc"}, + {file = "fonttools-4.50.0-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:b2ca1837bfbe5eafa11313dbc7edada79052709a1fffa10cea691210af4aa1fa"}, + {file = "fonttools-4.50.0-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:a0493dd97ac8977e48ffc1476b932b37c847cbb87fd68673dee5182004906828"}, + {file = "fonttools-4.50.0-cp312-cp312-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:77844e2f1b0889120b6c222fc49b2b75c3d88b930615e98893b899b9352a27ea"}, + {file = "fonttools-4.50.0-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:3566bfb8c55ed9100afe1ba6f0f12265cd63a1387b9661eb6031a1578a28bad1"}, + {file = "fonttools-4.50.0-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:35e10ddbc129cf61775d58a14f2d44121178d89874d32cae1eac722e687d9019"}, + {file = "fonttools-4.50.0-cp312-cp312-win32.whl", hash = "sha256:cc8140baf9fa8f9b903f2b393a6c413a220fa990264b215bf48484f3d0bf8710"}, + {file = "fonttools-4.50.0-cp312-cp312-win_amd64.whl", hash = "sha256:0ccc85fd96373ab73c59833b824d7a73846670a0cb1f3afbaee2b2c426a8f931"}, + {file = "fonttools-4.50.0-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:e270a406219af37581d96c810172001ec536e29e5593aa40d4c01cca3e145aa6"}, + {file = "fonttools-4.50.0-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:ac2463de667233372e9e1c7e9de3d914b708437ef52a3199fdbf5a60184f190c"}, + {file = "fonttools-4.50.0-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:47abd6669195abe87c22750dbcd366dc3a0648f1b7c93c2baa97429c4dc1506e"}, + {file = "fonttools-4.50.0-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:074841375e2e3d559aecc86e1224caf78e8b8417bb391e7d2506412538f21adc"}, + {file = "fonttools-4.50.0-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:0743fd2191ad7ab43d78cd747215b12033ddee24fa1e088605a3efe80d6984de"}, + {file = "fonttools-4.50.0-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:3d7080cce7be5ed65bee3496f09f79a82865a514863197ff4d4d177389e981b0"}, + {file = "fonttools-4.50.0-cp38-cp38-win32.whl", hash = "sha256:a467ba4e2eadc1d5cc1a11d355abb945f680473fbe30d15617e104c81f483045"}, + {file = "fonttools-4.50.0-cp38-cp38-win_amd64.whl", hash = "sha256:f77e048f805e00870659d6318fd89ef28ca4ee16a22b4c5e1905b735495fc422"}, + {file = "fonttools-4.50.0-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:b6245eafd553c4e9a0708e93be51392bd2288c773523892fbd616d33fd2fda59"}, + {file = "fonttools-4.50.0-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:a4062cc7e8de26f1603323ef3ae2171c9d29c8a9f5e067d555a2813cd5c7a7e0"}, + {file = "fonttools-4.50.0-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:34692850dfd64ba06af61e5791a441f664cb7d21e7b544e8f385718430e8f8e4"}, + {file = "fonttools-4.50.0-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:678dd95f26a67e02c50dcb5bf250f95231d455642afbc65a3b0bcdacd4e4dd38"}, + {file = "fonttools-4.50.0-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:4f2ce7b0b295fe64ac0a85aef46a0f2614995774bd7bc643b85679c0283287f9"}, + {file = "fonttools-4.50.0-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:d346f4dc2221bfb7ab652d1e37d327578434ce559baf7113b0f55768437fe6a0"}, + {file = "fonttools-4.50.0-cp39-cp39-win32.whl", hash = "sha256:a51eeaf52ba3afd70bf489be20e52fdfafe6c03d652b02477c6ce23c995222f4"}, + {file = "fonttools-4.50.0-cp39-cp39-win_amd64.whl", hash = "sha256:8639be40d583e5d9da67795aa3eeeda0488fb577a1d42ae11a5036f18fb16d93"}, + {file = "fonttools-4.50.0-py3-none-any.whl", hash = "sha256:48fa36da06247aa8282766cfd63efff1bb24e55f020f29a335939ed3844d20d3"}, + {file = "fonttools-4.50.0.tar.gz", hash = "sha256:fa5cf61058c7dbb104c2ac4e782bf1b2016a8cf2f69de6e4dd6a865d2c969bb5"}, ] [package.dependencies] @@ -1450,13 +1450,13 @@ files = [ [[package]] name = "fsspec" -version = "2024.2.0" +version = "2024.3.0" description = "File-system specification" optional = false python-versions = ">=3.8" files = [ - {file = "fsspec-2024.2.0-py3-none-any.whl", hash = "sha256:817f969556fa5916bc682e02ca2045f96ff7f586d45110fcb76022063ad2c7d8"}, - {file = "fsspec-2024.2.0.tar.gz", hash = "sha256:b6ad1a679f760dda52b1168c859d01b7b80648ea6f7f7c7f5a8a91dc3f3ecb84"}, + {file = "fsspec-2024.3.0-py3-none-any.whl", hash = "sha256:779001bd0122c9c4975cf03827d5e86c3afb914a3ae27040f15d341ab506a693"}, + {file = "fsspec-2024.3.0.tar.gz", hash = "sha256:f13a130c0ed07e15c4e1aeb0472a823e9c426b0b5792a1f40d902b0a71972d43"}, ] [package.extras] @@ -1485,13 +1485,13 @@ tqdm = ["tqdm"] [[package]] name = "google-auth" -version = "2.27.0" +version = "2.28.2" description = "Google Authentication Library" optional = true python-versions = ">=3.7" files = [ - {file = "google-auth-2.27.0.tar.gz", hash = "sha256:e863a56ccc2d8efa83df7a80272601e43487fa9a728a376205c86c26aaefa821"}, - {file = "google_auth-2.27.0-py2.py3-none-any.whl", hash = "sha256:8e4bad367015430ff253fe49d500fdc3396c1a434db5740828c728e45bcce245"}, + {file = "google-auth-2.28.2.tar.gz", hash = "sha256:80b8b4969aa9ed5938c7828308f20f035bc79f9d8fb8120bf9dc8db20b41ba30"}, + {file = "google_auth-2.28.2-py2.py3-none-any.whl", hash = "sha256:9fd67bbcd40f16d9d42f950228e9cf02a2ded4ae49198b27432d0cded5a74c38"}, ] [package.dependencies] @@ -1508,13 +1508,13 @@ requests = ["requests (>=2.20.0,<3.0.0.dev0)"] [[package]] name = "googleapis-common-protos" -version = "1.62.0" +version = "1.63.0" description = "Common protobufs used in Google APIs" optional = true python-versions = ">=3.7" files = [ - {file = "googleapis-common-protos-1.62.0.tar.gz", hash = "sha256:83f0ece9f94e5672cced82f592d2a5edf527a96ed1794f0bab36d5735c996277"}, - {file = "googleapis_common_protos-1.62.0-py2.py3-none-any.whl", hash = "sha256:4750113612205514f9f6aa4cb00d523a94f3e8c06c5ad2fee466387dc4875f07"}, + {file = "googleapis-common-protos-1.63.0.tar.gz", hash = "sha256:17ad01b11d5f1d0171c06d3ba5c04c54474e883b66b949722b4938ee2694ef4e"}, + {file = "googleapis_common_protos-1.63.0-py2.py3-none-any.whl", hash = "sha256:ae45f75702f7c08b541f750854a678bd8f534a1a6bace6afe975f1d0a82d6632"}, ] [package.dependencies] @@ -1525,13 +1525,13 @@ grpc = ["grpcio (>=1.44.0,<2.0.0.dev0)"] [[package]] name = "gradio" -version = "4.19.2" +version = "4.21.0" description = "Python library for easily interacting with trained machine learning models" optional = true python-versions = ">=3.8" files = [ - {file = "gradio-4.19.2-py3-none-any.whl", hash = "sha256:acab4a35f556dbc3ae637469312738d154bcb73f0b8d5f4f65e4d067ecb1e0b1"}, - {file = "gradio-4.19.2.tar.gz", hash = "sha256:6fe5815bb4dfaeed1fc74223bffd91da70a1b463158af8c5e03d01bb09068a1d"}, + {file = "gradio-4.21.0-py3-none-any.whl", hash = "sha256:521376440e4d5347f48798a15439497910041db4a522187fd8e3807a909c4a8e"}, + {file = "gradio-4.21.0.tar.gz", hash = "sha256:81acbfbf87d07d472889e14c696a3da09acc6f1abd1d7e3d7f1a963e7b727363"}, ] [package.dependencies] @@ -1539,7 +1539,7 @@ aiofiles = ">=22.0,<24.0" altair = ">=4.2.0,<6.0" fastapi = "*" ffmpy = "*" -gradio-client = "0.10.1" +gradio-client = "0.12.0" httpx = ">=0.24.1" huggingface-hub = ">=0.19.3" importlib-resources = ">=1.3,<7.0" @@ -1567,13 +1567,13 @@ oauth = ["authlib", "itsdangerous"] [[package]] name = "gradio-client" -version = "0.10.1" +version = "0.12.0" description = "Python library for easily interacting with trained machine learning models" optional = true python-versions = ">=3.8" files = [ - {file = "gradio_client-0.10.1-py3-none-any.whl", hash = "sha256:a0413fffdde3360e0f6aaec8b8c23d8a320049a571de2d111d85ebd295002165"}, - {file = "gradio_client-0.10.1.tar.gz", hash = "sha256:879eb56fae5d6b1603bb9375b88d1de0d034f3dac4b3afc8dbc66f36f6e54d5d"}, + {file = "gradio_client-0.12.0-py3-none-any.whl", hash = "sha256:ead1d3016cd42e9275cf62dd3227ab4472d4093da1a1c6c3c0fe6ca516e9d31f"}, + {file = "gradio_client-0.12.0.tar.gz", hash = "sha256:7a7e3406829a176153ba1a67f1e1779c2e897d775c7f70f3aeb7e7b2e1ce906b"}, ] [package.dependencies] @@ -1657,135 +1657,135 @@ test = ["objgraph", "psutil"] [[package]] name = "grpcio" -version = "1.60.1" +version = "1.62.1" description = "HTTP/2-based RPC framework" optional = true python-versions = ">=3.7" files = [ - {file = "grpcio-1.60.1-cp310-cp310-linux_armv7l.whl", hash = "sha256:14e8f2c84c0832773fb3958240c69def72357bc11392571f87b2d7b91e0bb092"}, - {file = "grpcio-1.60.1-cp310-cp310-macosx_12_0_universal2.whl", hash = "sha256:33aed0a431f5befeffd9d346b0fa44b2c01aa4aeae5ea5b2c03d3e25e0071216"}, - {file = "grpcio-1.60.1-cp310-cp310-manylinux_2_17_aarch64.whl", hash = "sha256:fead980fbc68512dfd4e0c7b1f5754c2a8e5015a04dea454b9cada54a8423525"}, - {file = "grpcio-1.60.1-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:082081e6a36b6eb5cf0fd9a897fe777dbb3802176ffd08e3ec6567edd85bc104"}, - {file = "grpcio-1.60.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:55ccb7db5a665079d68b5c7c86359ebd5ebf31a19bc1a91c982fd622f1e31ff2"}, - {file = "grpcio-1.60.1-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:9b54577032d4f235452f77a83169b6527bf4b77d73aeada97d45b2aaf1bf5ce0"}, - {file = "grpcio-1.60.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:7d142bcd604166417929b071cd396aa13c565749a4c840d6c702727a59d835eb"}, - {file = "grpcio-1.60.1-cp310-cp310-win32.whl", hash = "sha256:2a6087f234cb570008a6041c8ffd1b7d657b397fdd6d26e83d72283dae3527b1"}, - {file = "grpcio-1.60.1-cp310-cp310-win_amd64.whl", hash = "sha256:f2212796593ad1d0235068c79836861f2201fc7137a99aa2fea7beeb3b101177"}, - {file = "grpcio-1.60.1-cp311-cp311-linux_armv7l.whl", hash = "sha256:79ae0dc785504cb1e1788758c588c711f4e4a0195d70dff53db203c95a0bd303"}, - {file = "grpcio-1.60.1-cp311-cp311-macosx_10_10_universal2.whl", hash = "sha256:4eec8b8c1c2c9b7125508ff7c89d5701bf933c99d3910e446ed531cd16ad5d87"}, - {file = "grpcio-1.60.1-cp311-cp311-manylinux_2_17_aarch64.whl", hash = "sha256:8c9554ca8e26241dabe7951aa1fa03a1ba0856688ecd7e7bdbdd286ebc272e4c"}, - {file = "grpcio-1.60.1-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:91422ba785a8e7a18725b1dc40fbd88f08a5bb4c7f1b3e8739cab24b04fa8a03"}, - {file = "grpcio-1.60.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:cba6209c96828711cb7c8fcb45ecef8c8859238baf15119daa1bef0f6c84bfe7"}, - {file = "grpcio-1.60.1-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:c71be3f86d67d8d1311c6076a4ba3b75ba5703c0b856b4e691c9097f9b1e8bd2"}, - {file = "grpcio-1.60.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:af5ef6cfaf0d023c00002ba25d0751e5995fa0e4c9eec6cd263c30352662cbce"}, - {file = "grpcio-1.60.1-cp311-cp311-win32.whl", hash = "sha256:a09506eb48fa5493c58f946c46754ef22f3ec0df64f2b5149373ff31fb67f3dd"}, - {file = "grpcio-1.60.1-cp311-cp311-win_amd64.whl", hash = "sha256:49c9b6a510e3ed8df5f6f4f3c34d7fbf2d2cae048ee90a45cd7415abab72912c"}, - {file = "grpcio-1.60.1-cp312-cp312-linux_armv7l.whl", hash = "sha256:b58b855d0071575ea9c7bc0d84a06d2edfbfccec52e9657864386381a7ce1ae9"}, - {file = "grpcio-1.60.1-cp312-cp312-macosx_10_10_universal2.whl", hash = "sha256:a731ac5cffc34dac62053e0da90f0c0b8560396a19f69d9703e88240c8f05858"}, - {file = "grpcio-1.60.1-cp312-cp312-manylinux_2_17_aarch64.whl", hash = "sha256:cf77f8cf2a651fbd869fbdcb4a1931464189cd210abc4cfad357f1cacc8642a6"}, - {file = "grpcio-1.60.1-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:c557e94e91a983e5b1e9c60076a8fd79fea1e7e06848eb2e48d0ccfb30f6e073"}, - {file = "grpcio-1.60.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:069fe2aeee02dfd2135d562d0663fe70fbb69d5eed6eb3389042a7e963b54de8"}, - {file = "grpcio-1.60.1-cp312-cp312-musllinux_1_1_i686.whl", hash = "sha256:cb0af13433dbbd1c806e671d81ec75bd324af6ef75171fd7815ca3074fe32bfe"}, - {file = "grpcio-1.60.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:2f44c32aef186bbba254129cea1df08a20be414144ac3bdf0e84b24e3f3b2e05"}, - {file = "grpcio-1.60.1-cp312-cp312-win32.whl", hash = "sha256:a212e5dea1a4182e40cd3e4067ee46be9d10418092ce3627475e995cca95de21"}, - {file = "grpcio-1.60.1-cp312-cp312-win_amd64.whl", hash = "sha256:6e490fa5f7f5326222cb9f0b78f207a2b218a14edf39602e083d5f617354306f"}, - {file = "grpcio-1.60.1-cp37-cp37m-linux_armv7l.whl", hash = "sha256:4216e67ad9a4769117433814956031cb300f85edc855252a645a9a724b3b6594"}, - {file = "grpcio-1.60.1-cp37-cp37m-macosx_10_10_universal2.whl", hash = "sha256:73e14acd3d4247169955fae8fb103a2b900cfad21d0c35f0dcd0fdd54cd60367"}, - {file = "grpcio-1.60.1-cp37-cp37m-manylinux_2_17_aarch64.whl", hash = "sha256:6ecf21d20d02d1733e9c820fb5c114c749d888704a7ec824b545c12e78734d1c"}, - {file = "grpcio-1.60.1-cp37-cp37m-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:33bdea30dcfd4f87b045d404388469eb48a48c33a6195a043d116ed1b9a0196c"}, - {file = "grpcio-1.60.1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:53b69e79d00f78c81eecfb38f4516080dc7f36a198b6b37b928f1c13b3c063e9"}, - {file = "grpcio-1.60.1-cp37-cp37m-musllinux_1_1_i686.whl", hash = "sha256:39aa848794b887120b1d35b1b994e445cc028ff602ef267f87c38122c1add50d"}, - {file = "grpcio-1.60.1-cp37-cp37m-musllinux_1_1_x86_64.whl", hash = "sha256:72153a0d2e425f45b884540a61c6639436ddafa1829a42056aa5764b84108b8e"}, - {file = "grpcio-1.60.1-cp37-cp37m-win_amd64.whl", hash = "sha256:50d56280b482875d1f9128ce596e59031a226a8b84bec88cb2bf76c289f5d0de"}, - {file = "grpcio-1.60.1-cp38-cp38-linux_armv7l.whl", hash = "sha256:6d140bdeb26cad8b93c1455fa00573c05592793c32053d6e0016ce05ba267549"}, - {file = "grpcio-1.60.1-cp38-cp38-macosx_10_10_universal2.whl", hash = "sha256:bc808924470643b82b14fe121923c30ec211d8c693e747eba8a7414bc4351a23"}, - {file = "grpcio-1.60.1-cp38-cp38-manylinux_2_17_aarch64.whl", hash = "sha256:70c83bb530572917be20c21f3b6be92cd86b9aecb44b0c18b1d3b2cc3ae47df0"}, - {file = "grpcio-1.60.1-cp38-cp38-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:9b106bc52e7f28170e624ba61cc7dc6829566e535a6ec68528f8e1afbed1c41f"}, - {file = "grpcio-1.60.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:30e980cd6db1088c144b92fe376747328d5554bc7960ce583ec7b7d81cd47287"}, - {file = "grpcio-1.60.1-cp38-cp38-musllinux_1_1_i686.whl", hash = "sha256:0c5807e9152eff15f1d48f6b9ad3749196f79a4a050469d99eecb679be592acc"}, - {file = "grpcio-1.60.1-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:f1c3dc536b3ee124e8b24feb7533e5c70b9f2ef833e3b2e5513b2897fd46763a"}, - {file = "grpcio-1.60.1-cp38-cp38-win32.whl", hash = "sha256:d7404cebcdb11bb5bd40bf94131faf7e9a7c10a6c60358580fe83913f360f929"}, - {file = "grpcio-1.60.1-cp38-cp38-win_amd64.whl", hash = "sha256:c8754c75f55781515a3005063d9a05878b2cfb3cb7e41d5401ad0cf19de14872"}, - {file = "grpcio-1.60.1-cp39-cp39-linux_armv7l.whl", hash = "sha256:0250a7a70b14000fa311de04b169cc7480be6c1a769b190769d347939d3232a8"}, - {file = "grpcio-1.60.1-cp39-cp39-macosx_10_10_universal2.whl", hash = "sha256:660fc6b9c2a9ea3bb2a7e64ba878c98339abaf1811edca904ac85e9e662f1d73"}, - {file = "grpcio-1.60.1-cp39-cp39-manylinux_2_17_aarch64.whl", hash = "sha256:76eaaba891083fcbe167aa0f03363311a9f12da975b025d30e94b93ac7a765fc"}, - {file = "grpcio-1.60.1-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:e5d97c65ea7e097056f3d1ead77040ebc236feaf7f71489383d20f3b4c28412a"}, - {file = "grpcio-1.60.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:2bb2a2911b028f01c8c64d126f6b632fcd8a9ac975aa1b3855766c94e4107180"}, - {file = "grpcio-1.60.1-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:5a1ebbae7e2214f51b1f23b57bf98eeed2cf1ba84e4d523c48c36d5b2f8829ff"}, - {file = "grpcio-1.60.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:9a66f4d2a005bc78e61d805ed95dedfcb35efa84b7bba0403c6d60d13a3de2d6"}, - {file = "grpcio-1.60.1-cp39-cp39-win32.whl", hash = "sha256:8d488fbdbf04283f0d20742b64968d44825617aa6717b07c006168ed16488804"}, - {file = "grpcio-1.60.1-cp39-cp39-win_amd64.whl", hash = "sha256:61b7199cd2a55e62e45bfb629a35b71fc2c0cb88f686a047f25b1112d3810904"}, - {file = "grpcio-1.60.1.tar.gz", hash = "sha256:dd1d3a8d1d2e50ad9b59e10aa7f07c7d1be2b367f3f2d33c5fade96ed5460962"}, + {file = "grpcio-1.62.1-cp310-cp310-linux_armv7l.whl", hash = "sha256:179bee6f5ed7b5f618844f760b6acf7e910988de77a4f75b95bbfaa8106f3c1e"}, + {file = "grpcio-1.62.1-cp310-cp310-macosx_12_0_universal2.whl", hash = "sha256:48611e4fa010e823ba2de8fd3f77c1322dd60cb0d180dc6630a7e157b205f7ea"}, + {file = "grpcio-1.62.1-cp310-cp310-manylinux_2_17_aarch64.whl", hash = "sha256:b2a0e71b0a2158aa4bce48be9f8f9eb45cbd17c78c7443616d00abbe2a509f6d"}, + {file = "grpcio-1.62.1-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:fbe80577c7880911d3ad65e5ecc997416c98f354efeba2f8d0f9112a67ed65a5"}, + {file = "grpcio-1.62.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:58f6c693d446964e3292425e1d16e21a97a48ba9172f2d0df9d7b640acb99243"}, + {file = "grpcio-1.62.1-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:77c339403db5a20ef4fed02e4d1a9a3d9866bf9c0afc77a42234677313ea22f3"}, + {file = "grpcio-1.62.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:b5a4ea906db7dec694098435d84bf2854fe158eb3cd51e1107e571246d4d1d70"}, + {file = "grpcio-1.62.1-cp310-cp310-win32.whl", hash = "sha256:4187201a53f8561c015bc745b81a1b2d278967b8de35f3399b84b0695e281d5f"}, + {file = "grpcio-1.62.1-cp310-cp310-win_amd64.whl", hash = "sha256:844d1f3fb11bd1ed362d3fdc495d0770cfab75761836193af166fee113421d66"}, + {file = "grpcio-1.62.1-cp311-cp311-linux_armv7l.whl", hash = "sha256:833379943d1728a005e44103f17ecd73d058d37d95783eb8f0b28ddc1f54d7b2"}, + {file = "grpcio-1.62.1-cp311-cp311-macosx_10_10_universal2.whl", hash = "sha256:c7fcc6a32e7b7b58f5a7d27530669337a5d587d4066060bcb9dee7a8c833dfb7"}, + {file = "grpcio-1.62.1-cp311-cp311-manylinux_2_17_aarch64.whl", hash = "sha256:fa7d28eb4d50b7cbe75bb8b45ed0da9a1dc5b219a0af59449676a29c2eed9698"}, + {file = "grpcio-1.62.1-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:48f7135c3de2f298b833be8b4ae20cafe37091634e91f61f5a7eb3d61ec6f660"}, + {file = "grpcio-1.62.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:71f11fd63365ade276c9d4a7b7df5c136f9030e3457107e1791b3737a9b9ed6a"}, + {file = "grpcio-1.62.1-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:4b49fd8fe9f9ac23b78437da94c54aa7e9996fbb220bac024a67469ce5d0825f"}, + {file = "grpcio-1.62.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:482ae2ae78679ba9ed5752099b32e5fe580443b4f798e1b71df412abf43375db"}, + {file = "grpcio-1.62.1-cp311-cp311-win32.whl", hash = "sha256:1faa02530b6c7426404372515fe5ddf66e199c2ee613f88f025c6f3bd816450c"}, + {file = "grpcio-1.62.1-cp311-cp311-win_amd64.whl", hash = "sha256:5bd90b8c395f39bc82a5fb32a0173e220e3f401ff697840f4003e15b96d1befc"}, + {file = "grpcio-1.62.1-cp312-cp312-linux_armv7l.whl", hash = "sha256:b134d5d71b4e0837fff574c00e49176051a1c532d26c052a1e43231f252d813b"}, + {file = "grpcio-1.62.1-cp312-cp312-macosx_10_10_universal2.whl", hash = "sha256:d1f6c96573dc09d50dbcbd91dbf71d5cf97640c9427c32584010fbbd4c0e0037"}, + {file = "grpcio-1.62.1-cp312-cp312-manylinux_2_17_aarch64.whl", hash = "sha256:359f821d4578f80f41909b9ee9b76fb249a21035a061a327f91c953493782c31"}, + {file = "grpcio-1.62.1-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a485f0c2010c696be269184bdb5ae72781344cb4e60db976c59d84dd6354fac9"}, + {file = "grpcio-1.62.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b50b09b4dc01767163d67e1532f948264167cd27f49e9377e3556c3cba1268e1"}, + {file = "grpcio-1.62.1-cp312-cp312-musllinux_1_1_i686.whl", hash = "sha256:3227c667dccbe38f2c4d943238b887bac588d97c104815aecc62d2fd976e014b"}, + {file = "grpcio-1.62.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:3952b581eb121324853ce2b191dae08badb75cd493cb4e0243368aa9e61cfd41"}, + {file = "grpcio-1.62.1-cp312-cp312-win32.whl", hash = "sha256:83a17b303425104d6329c10eb34bba186ffa67161e63fa6cdae7776ff76df73f"}, + {file = "grpcio-1.62.1-cp312-cp312-win_amd64.whl", hash = "sha256:6696ffe440333a19d8d128e88d440f91fb92c75a80ce4b44d55800e656a3ef1d"}, + {file = "grpcio-1.62.1-cp37-cp37m-linux_armv7l.whl", hash = "sha256:e3393b0823f938253370ebef033c9fd23d27f3eae8eb9a8f6264900c7ea3fb5a"}, + {file = "grpcio-1.62.1-cp37-cp37m-macosx_10_10_universal2.whl", hash = "sha256:83e7ccb85a74beaeae2634f10eb858a0ed1a63081172649ff4261f929bacfd22"}, + {file = "grpcio-1.62.1-cp37-cp37m-manylinux_2_17_aarch64.whl", hash = "sha256:882020c87999d54667a284c7ddf065b359bd00251fcd70279ac486776dbf84ec"}, + {file = "grpcio-1.62.1-cp37-cp37m-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a10383035e864f386fe096fed5c47d27a2bf7173c56a6e26cffaaa5a361addb1"}, + {file = "grpcio-1.62.1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:960edebedc6b9ada1ef58e1c71156f28689978188cd8cff3b646b57288a927d9"}, + {file = "grpcio-1.62.1-cp37-cp37m-musllinux_1_1_i686.whl", hash = "sha256:23e2e04b83f347d0aadde0c9b616f4726c3d76db04b438fd3904b289a725267f"}, + {file = "grpcio-1.62.1-cp37-cp37m-musllinux_1_1_x86_64.whl", hash = "sha256:978121758711916d34fe57c1f75b79cdfc73952f1481bb9583399331682d36f7"}, + {file = "grpcio-1.62.1-cp37-cp37m-win_amd64.whl", hash = "sha256:9084086190cc6d628f282e5615f987288b95457292e969b9205e45b442276407"}, + {file = "grpcio-1.62.1-cp38-cp38-linux_armv7l.whl", hash = "sha256:22bccdd7b23c420a27fd28540fb5dcbc97dc6be105f7698cb0e7d7a420d0e362"}, + {file = "grpcio-1.62.1-cp38-cp38-macosx_10_10_universal2.whl", hash = "sha256:8999bf1b57172dbc7c3e4bb3c732658e918f5c333b2942243f10d0d653953ba9"}, + {file = "grpcio-1.62.1-cp38-cp38-manylinux_2_17_aarch64.whl", hash = "sha256:d9e52558b8b8c2f4ac05ac86344a7417ccdd2b460a59616de49eb6933b07a0bd"}, + {file = "grpcio-1.62.1-cp38-cp38-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:1714e7bc935780bc3de1b3fcbc7674209adf5208ff825799d579ffd6cd0bd505"}, + {file = "grpcio-1.62.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:c8842ccbd8c0e253c1f189088228f9b433f7a93b7196b9e5b6f87dba393f5d5d"}, + {file = "grpcio-1.62.1-cp38-cp38-musllinux_1_1_i686.whl", hash = "sha256:1f1e7b36bdff50103af95a80923bf1853f6823dd62f2d2a2524b66ed74103e49"}, + {file = "grpcio-1.62.1-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:bba97b8e8883a8038606480d6b6772289f4c907f6ba780fa1f7b7da7dfd76f06"}, + {file = "grpcio-1.62.1-cp38-cp38-win32.whl", hash = "sha256:a7f615270fe534548112a74e790cd9d4f5509d744dd718cd442bf016626c22e4"}, + {file = "grpcio-1.62.1-cp38-cp38-win_amd64.whl", hash = "sha256:e6c8c8693df718c5ecbc7babb12c69a4e3677fd11de8886f05ab22d4e6b1c43b"}, + {file = "grpcio-1.62.1-cp39-cp39-linux_armv7l.whl", hash = "sha256:73db2dc1b201d20ab7083e7041946910bb991e7e9761a0394bbc3c2632326483"}, + {file = "grpcio-1.62.1-cp39-cp39-macosx_10_10_universal2.whl", hash = "sha256:407b26b7f7bbd4f4751dbc9767a1f0716f9fe72d3d7e96bb3ccfc4aace07c8de"}, + {file = "grpcio-1.62.1-cp39-cp39-manylinux_2_17_aarch64.whl", hash = "sha256:f8de7c8cef9261a2d0a62edf2ccea3d741a523c6b8a6477a340a1f2e417658de"}, + {file = "grpcio-1.62.1-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:9bd5c8a1af40ec305d001c60236308a67e25419003e9bb3ebfab5695a8d0b369"}, + {file = "grpcio-1.62.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:be0477cb31da67846a33b1a75c611f88bfbcd427fe17701b6317aefceee1b96f"}, + {file = "grpcio-1.62.1-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:60dcd824df166ba266ee0cfaf35a31406cd16ef602b49f5d4dfb21f014b0dedd"}, + {file = "grpcio-1.62.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:973c49086cabab773525f6077f95e5a993bfc03ba8fc32e32f2c279497780585"}, + {file = "grpcio-1.62.1-cp39-cp39-win32.whl", hash = "sha256:12859468e8918d3bd243d213cd6fd6ab07208195dc140763c00dfe901ce1e1b4"}, + {file = "grpcio-1.62.1-cp39-cp39-win_amd64.whl", hash = "sha256:b7209117bbeebdfa5d898205cc55153a51285757902dd73c47de498ad4d11332"}, + {file = "grpcio-1.62.1.tar.gz", hash = "sha256:6c455e008fa86d9e9a9d85bb76da4277c0d7d9668a3bfa70dbe86e9f3c759947"}, ] [package.extras] -protobuf = ["grpcio-tools (>=1.60.1)"] +protobuf = ["grpcio-tools (>=1.62.1)"] [[package]] name = "grpcio-tools" -version = "1.60.1" +version = "1.62.1" description = "Protobuf code generator for gRPC" optional = true python-versions = ">=3.7" files = [ - {file = "grpcio-tools-1.60.1.tar.gz", hash = "sha256:da08224ab8675c6d464b988bd8ca02cccd2bf0275bceefe8f6219bfd4a4f5e85"}, - {file = "grpcio_tools-1.60.1-cp310-cp310-linux_armv7l.whl", hash = "sha256:184b27333b627a7cc0972fb70d21a8bb7c02ac4a6febc16768d78ea8ff883ddd"}, - {file = "grpcio_tools-1.60.1-cp310-cp310-macosx_12_0_universal2.whl", hash = "sha256:18d7737f29ef5bbe3352547d0eccd080807834f00df223867dfc860bf81e9180"}, - {file = "grpcio_tools-1.60.1-cp310-cp310-manylinux_2_17_aarch64.whl", hash = "sha256:cc8ba358d2c658c6ecbc58e779bf0fc5a673fecac015a70db27fc5b4d37b76b6"}, - {file = "grpcio_tools-1.60.1-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:2973f75e8ba5c551033a1d59cc97654f6f386deaf2559082011d245d7ed87bba"}, - {file = "grpcio_tools-1.60.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:28ae665113affebdd109247386786e5ab4dccfcfad1b5f68e9cce2e326b57ee6"}, - {file = "grpcio_tools-1.60.1-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:5c7ed086fef5ff59f46d53a052b1934b73e0f7d12365d656d6af3a88057d5a3e"}, - {file = "grpcio_tools-1.60.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:8540f6480428a52614db71dd6394f52cbc0d2565b5ea1136a982f26390a42c7a"}, - {file = "grpcio_tools-1.60.1-cp310-cp310-win32.whl", hash = "sha256:5b4a939097005531edec331f22d0b82bff26e71ede009354d2f375b5d41e74f0"}, - {file = "grpcio_tools-1.60.1-cp310-cp310-win_amd64.whl", hash = "sha256:075bb67895970f96aabc1761ca674bf4db193f8fcad387f08e50402023b5f953"}, - {file = "grpcio_tools-1.60.1-cp311-cp311-linux_armv7l.whl", hash = "sha256:284749d20fb22418f17d3d351b9eb838caf4a0393a9cb02c36e5c32fa4bbe9db"}, - {file = "grpcio_tools-1.60.1-cp311-cp311-macosx_10_10_universal2.whl", hash = "sha256:b1041377cf32ee2338284ee26e6b9c10f9ea7728092376b19803dcb9b91d510d"}, - {file = "grpcio_tools-1.60.1-cp311-cp311-manylinux_2_17_aarch64.whl", hash = "sha256:e529cd3d4109a6f4a3f7bdaca68946eb33734e2d7ffe861785a0586abe99ee67"}, - {file = "grpcio_tools-1.60.1-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:31294b534f25f02ead204e58dcbe0e5437a95a1a6f276bb9378905595b02ff6d"}, - {file = "grpcio_tools-1.60.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:3fb6f4d2df0388c35c2804ba170f511238a681b679ead013bfe5e39d0ea9cf48"}, - {file = "grpcio_tools-1.60.1-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:40cd8268a675269ce59c4fa50877597ec638bb1099c52237bb726c8ac9791868"}, - {file = "grpcio_tools-1.60.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:985ac476da365267a2367ab20060f9096fbfc2e190fb02dd394f9ec05edf03ca"}, - {file = "grpcio_tools-1.60.1-cp311-cp311-win32.whl", hash = "sha256:bd85f6c368b93ae45edf8568473053cb1cc075ef3489efb18f9832d4ecce062f"}, - {file = "grpcio_tools-1.60.1-cp311-cp311-win_amd64.whl", hash = "sha256:c20e752ff5057758845f4e5c7a298739bfba291f373ed18ea9c7c7acbe69e8ab"}, - {file = "grpcio_tools-1.60.1-cp312-cp312-linux_armv7l.whl", hash = "sha256:aafc94616c5f89c891d859057b194a153c451f9921053454e9d7d4cbf79047eb"}, - {file = "grpcio_tools-1.60.1-cp312-cp312-macosx_10_10_universal2.whl", hash = "sha256:9bba347000f57dae8aea79c0d76ef7d72895597524d30d0170c7d1974a3a03f3"}, - {file = "grpcio_tools-1.60.1-cp312-cp312-manylinux_2_17_aarch64.whl", hash = "sha256:1e96a532d38411f0543fe1903ff522f7142a9901afb0ed94de58d79caf1905be"}, - {file = "grpcio_tools-1.60.1-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:5ea6e397d87f458bb2c387a4a6e1b65df74ce5b5194a1f16850c38309012e981"}, - {file = "grpcio_tools-1.60.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:3aeecd5b8faa2aab67e6c8b8a57e888c00ce70d39f331ede0a21312e92def1a6"}, - {file = "grpcio_tools-1.60.1-cp312-cp312-musllinux_1_1_i686.whl", hash = "sha256:d2c26ce5f774c98bd2d3d8d1703048394018b55d297ebdb41ed2ba35b9a34f68"}, - {file = "grpcio_tools-1.60.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:214281cdafb7acfdcde848eca2de7c888a6e2b5cd25ab579712b965ea09a9cd4"}, - {file = "grpcio_tools-1.60.1-cp312-cp312-win32.whl", hash = "sha256:8c4b917aa4fcdc77990773063f0f14540aab8d4a8bf6c862b964a45d891a31d2"}, - {file = "grpcio_tools-1.60.1-cp312-cp312-win_amd64.whl", hash = "sha256:0aa34c7c21cff2177a4096b2b0d51dfbc9f8a41f929847a434e89b352c5a215d"}, - {file = "grpcio_tools-1.60.1-cp37-cp37m-linux_armv7l.whl", hash = "sha256:acdba77584981fe799104aa545d9d97910bcf88c69b668b768c1f3e7d7e5afac"}, - {file = "grpcio_tools-1.60.1-cp37-cp37m-macosx_10_10_universal2.whl", hash = "sha256:2a7fa55bc62d4b8ebe6fb26f8cf89df3cf3b504eb6c5f3a2f0174689d35fddb0"}, - {file = "grpcio_tools-1.60.1-cp37-cp37m-manylinux_2_17_aarch64.whl", hash = "sha256:dffa326cf901fe08a0e218d9fdf593f12276088a8caa07fcbec7d051149cf9ef"}, - {file = "grpcio_tools-1.60.1-cp37-cp37m-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:cf945bd22f396c0d0c691e0990db2bfc4e77816b1edc2aea8a69c35ae721aac9"}, - {file = "grpcio_tools-1.60.1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:6801cfc5a85f0fb6fd12cade45942aaa1c814422328d594d12d364815fe34123"}, - {file = "grpcio_tools-1.60.1-cp37-cp37m-musllinux_1_1_i686.whl", hash = "sha256:f95bdc6c7c50b7fc442e53537bc5b4eb8cab2a671c1da80d40b5a4ab1fd5d416"}, - {file = "grpcio_tools-1.60.1-cp37-cp37m-musllinux_1_1_x86_64.whl", hash = "sha256:402efeec36d8b12b792bae8a900085416fc2f57a34b599445ace2e847b6b0d75"}, - {file = "grpcio_tools-1.60.1-cp37-cp37m-win_amd64.whl", hash = "sha256:af88a2062b9c35034a80b25f289034b9c3c00c42bb88efaa465503a06fbd6a87"}, - {file = "grpcio_tools-1.60.1-cp38-cp38-linux_armv7l.whl", hash = "sha256:46b495bae31c5d3f6ac0240eb848f0642b5410f80dff2aacdea20cdea3938c1d"}, - {file = "grpcio_tools-1.60.1-cp38-cp38-macosx_10_10_universal2.whl", hash = "sha256:b5ae375207af9aa82f516dcd513d2e0c83690b7788d45844daad846ed87550f8"}, - {file = "grpcio_tools-1.60.1-cp38-cp38-manylinux_2_17_aarch64.whl", hash = "sha256:15f13e8f3d77b96adcb1e3615acec5b100bd836c6010c58a51465bcb9c06d128"}, - {file = "grpcio_tools-1.60.1-cp38-cp38-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:c354505e6a3d170da374f20404ea6a78135502df4f5534e5c532bdf24c4cc2a5"}, - {file = "grpcio_tools-1.60.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:a8cfab27ba2bd36a3e3b522aed686133531e8b919703d0247a0885dae8815317"}, - {file = "grpcio_tools-1.60.1-cp38-cp38-musllinux_1_1_i686.whl", hash = "sha256:b6ef213cb0aecb2832ee82a2eac32f29f31f50b17ce020604d82205096a6bd0c"}, - {file = "grpcio_tools-1.60.1-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:0b62cb2d43a7f0eacc6a6962dfff7c2564874012e1a72ae4167e762f449e2912"}, - {file = "grpcio_tools-1.60.1-cp38-cp38-win32.whl", hash = "sha256:3fcabf484720a9fa1690e2825fc940027a05a0c79a1075a730008ef634bd8ad2"}, - {file = "grpcio_tools-1.60.1-cp38-cp38-win_amd64.whl", hash = "sha256:22ce3e3d861321d208d8bfd6161ab976623520b179712c90b2c175151463a6b1"}, - {file = "grpcio_tools-1.60.1-cp39-cp39-linux_armv7l.whl", hash = "sha256:4e66fe204da15e08e599adb3060109a42927c0868fe8933e2d341ea649eceb03"}, - {file = "grpcio_tools-1.60.1-cp39-cp39-macosx_10_10_universal2.whl", hash = "sha256:c1047bd831de5d9da761e9dc246988d5f07d722186938dfd5f34807398101010"}, - {file = "grpcio_tools-1.60.1-cp39-cp39-manylinux_2_17_aarch64.whl", hash = "sha256:eba5fafd70585fbd4cb6ae45e3c5e11d8598e2426c9f289b78f682c0606e81cb"}, - {file = "grpcio_tools-1.60.1-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:bba7230c60238c7a4ffa29f1aff6d78edb41f2c79cbe4443406472b1c80ccb5d"}, - {file = "grpcio_tools-1.60.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:a2bb8efc2cd64bd8f2779b426dd7e94e60924078ba5150cbbb60a846e62d1ed2"}, - {file = "grpcio_tools-1.60.1-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:26f91161a91f1601777751230eaaafdf416fed08a15c3ba2ae391088e4a906c6"}, - {file = "grpcio_tools-1.60.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:2c19be2bba5583e30f88bb5d71b430176c396f0d6d0db3785e5845bfa3d28cd2"}, - {file = "grpcio_tools-1.60.1-cp39-cp39-win32.whl", hash = "sha256:9aadc9c00baa2064baa4414cff7c269455449f14805a355226674d89c507342c"}, - {file = "grpcio_tools-1.60.1-cp39-cp39-win_amd64.whl", hash = "sha256:652b08c9fef39186ce4f97f05f5440c0ed41f117db0f7d6cb0e0d75dbc6afd3f"}, + {file = "grpcio-tools-1.62.1.tar.gz", hash = "sha256:a4991e5ee8a97ab791296d3bf7e8700b1445635cc1828cc98df945ca1802d7f2"}, + {file = "grpcio_tools-1.62.1-cp310-cp310-linux_armv7l.whl", hash = "sha256:f2b404bcae7e2ef9b0b9803b2a95119eb7507e6dc80ea4a64a78be052c30cebc"}, + {file = "grpcio_tools-1.62.1-cp310-cp310-macosx_12_0_universal2.whl", hash = "sha256:fdd987a580b4474769adfd40144486f54bcc73838d5ec5d3647a17883ea78e76"}, + {file = "grpcio_tools-1.62.1-cp310-cp310-manylinux_2_17_aarch64.whl", hash = "sha256:07af1a6442e2313cff22af93c2c4dd37ae32b5239b38e0d99e2cbf93de65429f"}, + {file = "grpcio_tools-1.62.1-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:41384c9ee18e61ef20cad2774ef71bd8854b63efce263b5177aa06fccb84df1f"}, + {file = "grpcio_tools-1.62.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:5c38006f7702d2ff52122e4c77a47348709374050c76216e84b30a9f06e45afa"}, + {file = "grpcio_tools-1.62.1-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:08fecc3c5b4e6dd3278f2b9d12837e423c7dcff551ca1e587018b4a0fc5f8019"}, + {file = "grpcio_tools-1.62.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:a01e8dcd0f041f6fa6d815c54a2017d032950e310c41d514a8bc041e872c4d12"}, + {file = "grpcio_tools-1.62.1-cp310-cp310-win32.whl", hash = "sha256:dd933b8e0b3c13fe3543d58f849a6a5e0d7987688cb6801834278378c724f695"}, + {file = "grpcio_tools-1.62.1-cp310-cp310-win_amd64.whl", hash = "sha256:2b04844a9382f1bde4b4174e476e654ab3976168d2469cb4b29e352f4f35a5aa"}, + {file = "grpcio_tools-1.62.1-cp311-cp311-linux_armv7l.whl", hash = "sha256:024380536ba71a96cdf736f0954f6ad03f5da609c09edbcc2ca02fdd639e0eed"}, + {file = "grpcio_tools-1.62.1-cp311-cp311-macosx_10_10_universal2.whl", hash = "sha256:21f14b99e0cd38ad56754cc0b62b2bf3cf75f9f7fc40647da54669e0da0726fe"}, + {file = "grpcio_tools-1.62.1-cp311-cp311-manylinux_2_17_aarch64.whl", hash = "sha256:975ac5fb482c23f3608c16e06a43c8bab4d79c2e2564cdbc25cf753c6e998775"}, + {file = "grpcio_tools-1.62.1-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:50739aaab0c8076ad5957204e71f2e0c9876e11fd8338f7f09de12c2d75163c5"}, + {file = "grpcio_tools-1.62.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:598c54318f0326cf5020aa43fc95a15e933aba4a71943d3bff2677d2d21ddfa1"}, + {file = "grpcio_tools-1.62.1-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:f309bdb33a61f8e049480d41498ee2e525cfb5e959958b326abfdf552bf9b9cb"}, + {file = "grpcio_tools-1.62.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:f358effd3c11d66c150e0227f983d54a5cd30e14038566dadcf25f9f6844e6e8"}, + {file = "grpcio_tools-1.62.1-cp311-cp311-win32.whl", hash = "sha256:b76aead9b73f1650a091870fe4e9ed15ac4d8ed136f962042367255199c23594"}, + {file = "grpcio_tools-1.62.1-cp311-cp311-win_amd64.whl", hash = "sha256:d66a5d47eaa427039752fa0a83a425ff2a487b6a0ac30556fd3be2f3a27a0130"}, + {file = "grpcio_tools-1.62.1-cp312-cp312-linux_armv7l.whl", hash = "sha256:575535d039b97d63e6a9abee626d6c7cd47bd8cb73dd00a5c84a98254a2164a4"}, + {file = "grpcio_tools-1.62.1-cp312-cp312-macosx_10_10_universal2.whl", hash = "sha256:22644c90e43d1a888477899af917979e17364fdd6e9bbb92679cd6a54c4d36c3"}, + {file = "grpcio_tools-1.62.1-cp312-cp312-manylinux_2_17_aarch64.whl", hash = "sha256:156d3e1b227c16e903003a56881dbe60e40f2b4bd66f0bc3b27c53e466e6384d"}, + {file = "grpcio_tools-1.62.1-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:5ad7c5691625a85327e5b683443baf73ae790fd5afc938252041ed5cd665e377"}, + {file = "grpcio_tools-1.62.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0e140bbc08eea8abf51c0274f45fb1e8350220e64758998d7f3c7f985a0b2496"}, + {file = "grpcio_tools-1.62.1-cp312-cp312-musllinux_1_1_i686.whl", hash = "sha256:7444fcab861911525470d398e5638b70d5cbea3b4674a3de92b5c58c5c515d4d"}, + {file = "grpcio_tools-1.62.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:e643cd14a5d1e59865cba68a5a6f0175d987f36c5f4cb0db80dee9ed60b4c174"}, + {file = "grpcio_tools-1.62.1-cp312-cp312-win32.whl", hash = "sha256:1344a773d2caa9bb7fbea7e879b84f33740c808c34a5bd2a2768e526117a6b44"}, + {file = "grpcio_tools-1.62.1-cp312-cp312-win_amd64.whl", hash = "sha256:2eea1db3748b2f37b4dce84d8e0c15d9bc811094807cabafe7b0ea47f424dfd5"}, + {file = "grpcio_tools-1.62.1-cp37-cp37m-linux_armv7l.whl", hash = "sha256:45d2e6cf04d27286b6f73e6e20ba3f0a1f6d8f5535e5dcb1356200419bb457f4"}, + {file = "grpcio_tools-1.62.1-cp37-cp37m-macosx_10_10_universal2.whl", hash = "sha256:46ae58e6926773e7315e9005f0f17aacedbc0895a8752bec087d24efa2f1fb21"}, + {file = "grpcio_tools-1.62.1-cp37-cp37m-manylinux_2_17_aarch64.whl", hash = "sha256:4c28086df31478023a36f45e50767872ab3aed2419afff09814cb61c88b77db4"}, + {file = "grpcio_tools-1.62.1-cp37-cp37m-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a4fba5b339f4797548591036c9481e6895bf920fab7d3dc664d2697f8fb7c0bf"}, + {file = "grpcio_tools-1.62.1-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:23eb3d47f78f509fcd201749b1f1e44b76f447913f7fbb3b8bae20f109086295"}, + {file = "grpcio_tools-1.62.1-cp37-cp37m-musllinux_1_1_i686.whl", hash = "sha256:fd5d47707bd6bc2b707ece765c362d2a1d2e8f6cd92b04c99fab49a929f3610c"}, + {file = "grpcio_tools-1.62.1-cp37-cp37m-musllinux_1_1_x86_64.whl", hash = "sha256:d1924a6a943df7c73b9ef0048302327c75962b567451479710da729ead241228"}, + {file = "grpcio_tools-1.62.1-cp37-cp37m-win_amd64.whl", hash = "sha256:fe71ca30aabe42591e84ecb9694c0297dc699cc20c5b24d2cb267fb0fc01f947"}, + {file = "grpcio_tools-1.62.1-cp38-cp38-linux_armv7l.whl", hash = "sha256:1819fd055c1ae672d1d725ec75eefd1f700c18acba0ed9332202be31d69c401d"}, + {file = "grpcio_tools-1.62.1-cp38-cp38-macosx_10_10_universal2.whl", hash = "sha256:5dbe1f7481dd14b6d477b4bace96d275090bc7636b9883975a08b802c94e7b78"}, + {file = "grpcio_tools-1.62.1-cp38-cp38-manylinux_2_17_aarch64.whl", hash = "sha256:771c051c5ece27ad03e4f2e33624a925f0ad636c01757ab7dbb04a37964af4ba"}, + {file = "grpcio_tools-1.62.1-cp38-cp38-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:98209c438b38b6f1276dbc27b1c04e346a75bfaafe72a25a548f2dc5ce71d226"}, + {file = "grpcio_tools-1.62.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:2152308e5321cb90fb45aaa84d03d6dedb19735a8779aaf36c624f97b831842d"}, + {file = "grpcio_tools-1.62.1-cp38-cp38-musllinux_1_1_i686.whl", hash = "sha256:ed1f27dc2b2262c8b8d9036276619c1bb18791311c16ccbf1f31b660f2aad7cf"}, + {file = "grpcio_tools-1.62.1-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:2744947b6c5e907af21133431809ccca535a037356864e32c122efed8cb9de1f"}, + {file = "grpcio_tools-1.62.1-cp38-cp38-win32.whl", hash = "sha256:13b20e269d14ad629ff9a2c9a2450f3dbb119d5948de63b27ffe624fa7aea85a"}, + {file = "grpcio_tools-1.62.1-cp38-cp38-win_amd64.whl", hash = "sha256:999823758e9eacd0095863d06cd6d388be769f80c9abb65cdb11c4f2cfce3fea"}, + {file = "grpcio_tools-1.62.1-cp39-cp39-linux_armv7l.whl", hash = "sha256:941f8a5c31986053e75fa466bcfa743c2bf1b513b7978cf1f4ab4e96a8219d27"}, + {file = "grpcio_tools-1.62.1-cp39-cp39-macosx_10_10_universal2.whl", hash = "sha256:b9c02c88c77ef6057c6cbeea8922d7c2424aabf46bfc40ddf42a32765ba91061"}, + {file = "grpcio_tools-1.62.1-cp39-cp39-manylinux_2_17_aarch64.whl", hash = "sha256:6abd4eb3ccb444383a40156139acc3aaa73745d395139cb6bc8e2a3429e1e627"}, + {file = "grpcio_tools-1.62.1-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:449503213d142f8470b331a1c2f346f8457f16c7fe20f531bc2500e271f7c14c"}, + {file = "grpcio_tools-1.62.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:9a11bcf609d00cfc9baed77ab308223cabc1f0b22a05774a26dd4c94c0c80f1f"}, + {file = "grpcio_tools-1.62.1-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:5d7bdea33354b55acf40bb4dd3ba7324d6f1ef6b4a1a4da0807591f8c7e87b9a"}, + {file = "grpcio_tools-1.62.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:d03b645852d605f43003020e78fe6d573cae6ee6b944193e36b8b317e7549a20"}, + {file = "grpcio_tools-1.62.1-cp39-cp39-win32.whl", hash = "sha256:52b185dfc3bf32e70929310367dbc66185afba60492a6a75a9b1141d407e160c"}, + {file = "grpcio_tools-1.62.1-cp39-cp39-win_amd64.whl", hash = "sha256:63a273b70896d3640b7a883eb4a080c3c263d91662d870a2e9c84b7bbd978e7b"}, ] [package.dependencies] -grpcio = ">=1.60.1" +grpcio = ">=1.62.1" protobuf = ">=4.21.6,<5.0dev" setuptools = "*" @@ -1886,13 +1886,13 @@ lxml = ["lxml"] [[package]] name = "httpcore" -version = "1.0.3" +version = "1.0.4" description = "A minimal low-level HTTP client." optional = false python-versions = ">=3.8" files = [ - {file = "httpcore-1.0.3-py3-none-any.whl", hash = "sha256:9a6a501c3099307d9fd76ac244e08503427679b1e81ceb1d922485e2f2462ad2"}, - {file = "httpcore-1.0.3.tar.gz", hash = "sha256:5c0f9546ad17dac4d0772b0808856eb616eb8b48ce94f49ed819fd6982a8a544"}, + {file = "httpcore-1.0.4-py3-none-any.whl", hash = "sha256:ac418c1db41bade2ad53ae2f3834a3a0f5ae76b56cf5aa497d2d033384fc7d73"}, + {file = "httpcore-1.0.4.tar.gz", hash = "sha256:cb2839ccfcba0d2d3c1131d3c3e26dfc327326fbe7a5dc0dbfe9f6c9151bb022"}, ] [package.dependencies] @@ -1903,7 +1903,7 @@ h11 = ">=0.13,<0.15" asyncio = ["anyio (>=4.0,<5.0)"] http2 = ["h2 (>=3,<5)"] socks = ["socksio (==1.*)"] -trio = ["trio (>=0.22.0,<0.24.0)"] +trio = ["trio (>=0.22.0,<0.25.0)"] [[package]] name = "httptools" @@ -1955,13 +1955,13 @@ test = ["Cython (>=0.29.24,<0.30.0)"] [[package]] name = "httpx" -version = "0.26.0" +version = "0.27.0" description = "The next generation HTTP client." optional = false python-versions = ">=3.8" files = [ - {file = "httpx-0.26.0-py3-none-any.whl", hash = "sha256:8915f5a3627c4d47b73e8202457cb28f1266982d1159bd5779d86a80c0eab1cd"}, - {file = "httpx-0.26.0.tar.gz", hash = "sha256:451b55c30d5185ea6b23c2c793abf9bb237d2a7dfb901ced6ff69ad37ec1dfaf"}, + {file = "httpx-0.27.0-py3-none-any.whl", hash = "sha256:71d5465162c13681bff01ad59b2cc68dd838ea1f10e51574bac27103f00c91a5"}, + {file = "httpx-0.27.0.tar.gz", hash = "sha256:a0cb88a46f32dc874e04ee956e4c2764aba2aa228f650b06788ba6bda2962ab5"}, ] [package.dependencies] @@ -1980,13 +1980,13 @@ socks = ["socksio (==1.*)"] [[package]] name = "huggingface-hub" -version = "0.20.3" +version = "0.21.4" description = "Client library to download and publish models, datasets and other repos on the huggingface.co hub" optional = false python-versions = ">=3.8.0" files = [ - {file = "huggingface_hub-0.20.3-py3-none-any.whl", hash = "sha256:d988ae4f00d3e307b0c80c6a05ca6dbb7edba8bba3079f74cda7d9c2e562a7b6"}, - {file = "huggingface_hub-0.20.3.tar.gz", hash = "sha256:94e7f8e074475fbc67d6a71957b678e1b4a74ff1b64a644fd6cbb83da962d05d"}, + {file = "huggingface_hub-0.21.4-py3-none-any.whl", hash = "sha256:df37c2c37fc6c82163cdd8a67ede261687d80d1e262526d6c0ce73b6b3630a7b"}, + {file = "huggingface_hub-0.21.4.tar.gz", hash = "sha256:e1f4968c93726565a80edf6dc309763c7b546d0cfe79aa221206034d50155531"}, ] [package.dependencies] @@ -2005,11 +2005,12 @@ all = ["InquirerPy (==0.3.4)", "Jinja2", "Pillow", "aiohttp", "gradio", "jedi", cli = ["InquirerPy (==0.3.4)"] dev = ["InquirerPy (==0.3.4)", "Jinja2", "Pillow", "aiohttp", "gradio", "jedi", "mypy (==1.5.1)", "numpy", "pydantic (>1.1,<2.0)", "pydantic (>1.1,<3.0)", "pytest", "pytest-asyncio", "pytest-cov", "pytest-env", "pytest-rerunfailures", "pytest-vcr", "pytest-xdist", "ruff (>=0.1.3)", "soundfile", "types-PyYAML", "types-requests", "types-simplejson", "types-toml", "types-tqdm", "types-urllib3", "typing-extensions (>=4.8.0)", "urllib3 (<2.0)"] fastai = ["fastai (>=2.4)", "fastcore (>=1.3.27)", "toml"] +hf-transfer = ["hf-transfer (>=0.1.4)"] inference = ["aiohttp", "pydantic (>1.1,<2.0)", "pydantic (>1.1,<3.0)"] quality = ["mypy (==1.5.1)", "ruff (>=0.1.3)"] tensorflow = ["graphviz", "pydot", "tensorflow"] testing = ["InquirerPy (==0.3.4)", "Jinja2", "Pillow", "aiohttp", "gradio", "jedi", "numpy", "pydantic (>1.1,<2.0)", "pydantic (>1.1,<3.0)", "pytest", "pytest-asyncio", "pytest-cov", "pytest-env", "pytest-rerunfailures", "pytest-vcr", "pytest-xdist", "soundfile", "urllib3 (<2.0)"] -torch = ["torch"] +torch = ["safetensors", "torch"] typing = ["types-PyYAML", "types-requests", "types-simplejson", "types-toml", "types-tqdm", "types-urllib3", "typing-extensions (>=4.8.0)"] [[package]] @@ -2039,13 +2040,13 @@ files = [ [[package]] name = "identify" -version = "2.5.34" +version = "2.5.35" description = "File identification library for Python" optional = false python-versions = ">=3.8" files = [ - {file = "identify-2.5.34-py2.py3-none-any.whl", hash = "sha256:a4316013779e433d08b96e5eabb7f641e6c7942e4ab5d4c509ebd2e7a8994aed"}, - {file = "identify-2.5.34.tar.gz", hash = "sha256:ee17bc9d499899bc9eaec1ac7bf2dc9eedd480db9d88b96d123d3b64a9d34f5d"}, + {file = "identify-2.5.35-py2.py3-none-any.whl", hash = "sha256:c4de0081837b211594f8e877a6b4fad7ca32bbfc1a9307fdd61c28bfe923f13e"}, + {file = "identify-2.5.35.tar.gz", hash = "sha256:10a7ca245cfcd756a554a7288159f72ff105ad233c7c4b9c6f0f4d108f5f6791"}, ] [package.extras] @@ -2083,18 +2084,18 @@ testing = ["flufl.flake8", "importlib-resources (>=1.3)", "packaging", "pyfakefs [[package]] name = "importlib-resources" -version = "6.1.1" +version = "6.3.1" description = "Read resources from Python packages" optional = true python-versions = ">=3.8" files = [ - {file = "importlib_resources-6.1.1-py3-none-any.whl", hash = "sha256:e8bf90d8213b486f428c9c39714b920041cb02c184686a3dee24905aaa8105d6"}, - {file = "importlib_resources-6.1.1.tar.gz", hash = "sha256:3893a00122eafde6894c59914446a512f728a0c1a45f9bb9b63721b6bacf0b4a"}, + {file = "importlib_resources-6.3.1-py3-none-any.whl", hash = "sha256:4811639ca7fa830abdb8e9ca0a104dc6ad13de691d9fe0d3173a71304f068159"}, + {file = "importlib_resources-6.3.1.tar.gz", hash = "sha256:29a3d16556e330c3c8fb8202118c5ff41241cc34cbfb25989bbad226d99b7995"}, ] [package.extras] docs = ["furo", "jaraco.packaging (>=9.3)", "jaraco.tidelift (>=1.4)", "rst.linker (>=1.9)", "sphinx (<7.2.5)", "sphinx (>=3.5)", "sphinx-lint"] -testing = ["pytest (>=6)", "pytest-black (>=0.3.7)", "pytest-checkdocs (>=2.4)", "pytest-cov", "pytest-enabler (>=2.2)", "pytest-mypy (>=0.9.1)", "pytest-ruff", "zipp (>=3.17)"] +testing = ["jaraco.collections", "pytest (>=6)", "pytest-checkdocs (>=2.4)", "pytest-cov", "pytest-enabler (>=2.2)", "pytest-mypy", "pytest-ruff (>=0.2.1)", "zipp (>=3.17)"] [[package]] name = "inflect" @@ -2394,12 +2395,12 @@ pyasn1 = ">=0.4.6" [[package]] name = "llama-cpp-python" -version = "0.2.53" +version = "0.2.56" description = "Python bindings for the llama.cpp library" optional = true python-versions = ">=3.8" files = [ - {file = "llama_cpp_python-0.2.53.tar.gz", hash = "sha256:f7ff8eda538ca6c80521a8bbf80d3ef4527ecb28f6d08fa9b3bb1f0cfc3b684e"}, + {file = "llama_cpp_python-0.2.56.tar.gz", hash = "sha256:9c82db80e929ae93c2ab069a76a8a52aac82479cf9d0523c3550af48554cc785"}, ] [package.dependencies] @@ -2416,13 +2417,13 @@ test = ["httpx (>=0.24.1)", "pytest (>=7.4.0)", "scipy (>=1.10)"] [[package]] name = "llama-index-core" -version = "0.10.14.post1" +version = "0.10.20.post2" description = "Interface between LLMs and your data" optional = false python-versions = ">=3.8.1,<4.0" files = [ - {file = "llama_index_core-0.10.14.post1-py3-none-any.whl", hash = "sha256:7b12ebebe023e8f5e50c0fcff4af7a67e4842b2e1ca6a84b09442394d2689de6"}, - {file = "llama_index_core-0.10.14.post1.tar.gz", hash = "sha256:adb931fced7bff092b26599e7f89952c171bf2994872906b5712ecc8107d4727"}, + {file = "llama_index_core-0.10.20.post2-py3-none-any.whl", hash = "sha256:6d05e53271250dd340ea75f0395d9529eea6788546c1fe9020dc7597fa47907b"}, + {file = "llama_index_core-0.10.20.post2.tar.gz", hash = "sha256:d7d83a2f89269a3abc64663ef122ab6b132d6fbc1d32b5f0ba2909c4e8c6c55a"}, ] [package.dependencies] @@ -2454,7 +2455,7 @@ gradientai = ["gradientai (>=1.4.0)"] html = ["beautifulsoup4 (>=4.12.2,<5.0.0)"] langchain = ["langchain (>=0.0.303)"] local-models = ["optimum[onnxruntime] (>=1.13.2,<2.0.0)", "sentencepiece (>=0.1.99,<0.2.0)", "transformers[torch] (>=4.33.1,<5.0.0)"] -postgres = ["asyncpg (>=0.28.0,<0.29.0)", "pgvector (>=0.1.0,<0.2.0)", "psycopg2-binary (>=2.9.9,<3.0.0)"] +postgres = ["asyncpg (>=0.29.0,<0.30.0)", "pgvector (>=0.2.4,<0.3.0)", "psycopg2-binary (>=2.9.9,<3.0.0)"] query-tools = ["guidance (>=0.0.64,<0.0.65)", "jsonpath-ng (>=1.6.0,<2.0.0)", "lm-format-enforcer (>=0.4.3,<0.5.0)", "rank-bm25 (>=0.2.2,<0.3.0)", "scikit-learn", "spacy (>=3.7.1,<4.0.0)"] [[package]] @@ -2533,17 +2534,17 @@ llama-index-core = ">=0.10.1,<0.11.0" [[package]] name = "llama-index-llms-openai" -version = "0.1.6" +version = "0.1.12" description = "llama-index llms openai integration" optional = true python-versions = ">=3.8.1,<4.0" files = [ - {file = "llama_index_llms_openai-0.1.6-py3-none-any.whl", hash = "sha256:4260ad31c3444e97ec8a8d061cb6dbf1074262b82341a2b69d2b27e8a23efe62"}, - {file = "llama_index_llms_openai-0.1.6.tar.gz", hash = "sha256:15530dfa3893b15c5576ebc71e01b77acbf47abd689219436fdf7b6ca567a9fd"}, + {file = "llama_index_llms_openai-0.1.12-py3-none-any.whl", hash = "sha256:75cf9ad8de0578fc8aae959f3f5f0900f496d8674cfdf97f3e064004e54d7b64"}, + {file = "llama_index_llms_openai-0.1.12.tar.gz", hash = "sha256:400ca0083951bd668ce8bc24875ce70b636e7db328b27c6a50e6d1a2b081b9e6"}, ] [package.dependencies] -llama-index-core = ">=0.10.1,<0.11.0" +llama-index-core = ">=0.10.20.post1,<0.11.0" [[package]] name = "llama-index-llms-openai-like" @@ -2563,13 +2564,13 @@ transformers = ">=4.37.0,<5.0.0" [[package]] name = "llama-index-readers-file" -version = "0.1.6" +version = "0.1.11" description = "llama-index readers file integration" optional = false python-versions = ">=3.8.1,<4.0" files = [ - {file = "llama_index_readers_file-0.1.6-py3-none-any.whl", hash = "sha256:f583bd90353a0c0985213af02c97aa2f2f22e702d4311fe719de91382c9ad8dd"}, - {file = "llama_index_readers_file-0.1.6.tar.gz", hash = "sha256:d9fc0ca84926d04bd757c57fe87841cd9dbc2606aab5f2ce927deec14aaa1a74"}, + {file = "llama_index_readers_file-0.1.11-py3-none-any.whl", hash = "sha256:69fe380ac46b7f6db43384e18bc37f880b2627d60677cb0b2c6074fbb42a5971"}, + {file = "llama_index_readers_file-0.1.11.tar.gz", hash = "sha256:2414ea0d82aa151935cf3ff1669d324a01fd12b0059705ba5f62741ef980f8bd"}, ] [package.dependencies] @@ -2578,33 +2579,32 @@ bs4 = ">=0.0.2,<0.0.3" llama-index-core = ">=0.10.1,<0.11.0" pymupdf = ">=1.23.21,<2.0.0" pypdf = ">=4.0.1,<5.0.0" +striprtf = ">=0.0.26,<0.0.27" [[package]] name = "llama-index-vector-stores-chroma" -version = "0.1.4" +version = "0.1.6" description = "llama-index vector_stores chroma integration" optional = true python-versions = ">=3.8.1,<4.0" files = [ - {file = "llama_index_vector_stores_chroma-0.1.4-py3-none-any.whl", hash = "sha256:f475a450431ee4d9b2915ba9da2112dfdfacaee1ea220b8603720be1c116786c"}, - {file = "llama_index_vector_stores_chroma-0.1.4.tar.gz", hash = "sha256:7364f2a3f8a51b83d350da39da7e7046704cfa9c848ebe8fd1c6cb39ad4878f9"}, + {file = "llama_index_vector_stores_chroma-0.1.6-py3-none-any.whl", hash = "sha256:506b1cb9a7a552ecb3afa70ddf479c1c683fcbfe7313654e3543e62e3ec07eae"}, + {file = "llama_index_vector_stores_chroma-0.1.6.tar.gz", hash = "sha256:6dff3dc9d79c4039fa46cd528e5e4b6ded6473e5ef632424134491007da4ebdb"}, ] [package.dependencies] chromadb = ">=0.4.22,<0.5.0" llama-index-core = ">=0.10.1,<0.11.0" -onnxruntime = ">=1.17.0,<2.0.0" -tokenizers = ">=0.15.1,<0.16.0" [[package]] name = "llama-index-vector-stores-postgres" -version = "0.1.2" +version = "0.1.3" description = "llama-index vector_stores postgres integration" optional = true python-versions = ">=3.8.1,<4.0" files = [ - {file = "llama_index_vector_stores_postgres-0.1.2-py3-none-any.whl", hash = "sha256:75e8c73b553e4ca29ca4e55aedcd6abcdaf5bba7b12baf89a66c81f9b0ef5054"}, - {file = "llama_index_vector_stores_postgres-0.1.2.tar.gz", hash = "sha256:05ec3d091984bfa6ec7055c350136062ead6cc81c06380519680e8ce8dd65ff9"}, + {file = "llama_index_vector_stores_postgres-0.1.3-py3-none-any.whl", hash = "sha256:efe3eb0aa4e9647bf5707b5b6bace495536461a4cb1e9777c6ad6f09c51d8f26"}, + {file = "llama_index_vector_stores_postgres-0.1.3.tar.gz", hash = "sha256:bd6a8271d6bd7433cb71ea0e120322be906690b6cab3fa68123cc293fab81f02"}, ] [package.dependencies] @@ -2616,13 +2616,13 @@ sqlalchemy = {version = ">=2.0.25,<3.0.0", extras = ["asyncio"]} [[package]] name = "llama-index-vector-stores-qdrant" -version = "0.1.3" +version = "0.1.4" description = "llama-index vector_stores qdrant integration" optional = true -python-versions = ">=3.8.1,<4.0" +python-versions = ">=3.9,<4.0" files = [ - {file = "llama_index_vector_stores_qdrant-0.1.3-py3-none-any.whl", hash = "sha256:15805a37310830085e4e3399c0e4c87bb1dcaae008b89808b2a883726381cbe7"}, - {file = "llama_index_vector_stores_qdrant-0.1.3.tar.gz", hash = "sha256:19c8047e7061b41d1d0f559b3e7aa75dd41ce7eb96a386cdf63fedd350514f75"}, + {file = "llama_index_vector_stores_qdrant-0.1.4-py3-none-any.whl", hash = "sha256:cb1adad8f6812fdda888079195fdb0697d7e9409e437a0e48dddd1288276bdab"}, + {file = "llama_index_vector_stores_qdrant-0.1.4.tar.gz", hash = "sha256:5088842fb65470642eb3286cf5c16c3ce67cab11fba2ea029d031e9a5868d250"}, ] [package.dependencies] @@ -2852,22 +2852,21 @@ files = [ [[package]] name = "marshmallow" -version = "3.20.2" +version = "3.21.1" description = "A lightweight library for converting complex datatypes to and from native Python datatypes." optional = false python-versions = ">=3.8" files = [ - {file = "marshmallow-3.20.2-py3-none-any.whl", hash = "sha256:c21d4b98fee747c130e6bc8f45c4b3199ea66bc00c12ee1f639f0aeca034d5e9"}, - {file = "marshmallow-3.20.2.tar.gz", hash = "sha256:4c1daff273513dc5eb24b219a8035559dc573c8f322558ef85f5438ddd1236dd"}, + {file = "marshmallow-3.21.1-py3-none-any.whl", hash = "sha256:f085493f79efb0644f270a9bf2892843142d80d7174bbbd2f3713f2a589dc633"}, + {file = "marshmallow-3.21.1.tar.gz", hash = "sha256:4e65e9e0d80fc9e609574b9983cf32579f305c718afb30d7233ab818571768c3"}, ] [package.dependencies] packaging = ">=17.0" [package.extras] -dev = ["pre-commit (>=2.4,<4.0)", "pytest", "pytz", "simplejson", "tox"] -docs = ["alabaster (==0.7.15)", "autodocsumm (==0.2.12)", "sphinx (==7.2.6)", "sphinx-issues (==3.0.1)", "sphinx-version-warning (==1.1.2)"] -lint = ["pre-commit (>=2.4,<4.0)"] +dev = ["marshmallow[tests]", "pre-commit (>=3.5,<4.0)", "tox"] +docs = ["alabaster (==0.7.16)", "autodocsumm (==0.2.12)", "sphinx (==7.2.6)", "sphinx-issues (==4.0.0)", "sphinx-version-warning (==1.1.2)"] tests = ["pytest", "pytz", "simplejson"] [[package]] @@ -3166,38 +3165,38 @@ files = [ [[package]] name = "mypy" -version = "1.8.0" +version = "1.9.0" description = "Optional static typing for Python" optional = false python-versions = ">=3.8" files = [ - {file = "mypy-1.8.0-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:485a8942f671120f76afffff70f259e1cd0f0cfe08f81c05d8816d958d4577d3"}, - {file = "mypy-1.8.0-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:df9824ac11deaf007443e7ed2a4a26bebff98d2bc43c6da21b2b64185da011c4"}, - {file = "mypy-1.8.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:2afecd6354bbfb6e0160f4e4ad9ba6e4e003b767dd80d85516e71f2e955ab50d"}, - {file = "mypy-1.8.0-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:8963b83d53ee733a6e4196954502b33567ad07dfd74851f32be18eb932fb1cb9"}, - {file = "mypy-1.8.0-cp310-cp310-win_amd64.whl", hash = "sha256:e46f44b54ebddbeedbd3d5b289a893219065ef805d95094d16a0af6630f5d410"}, - {file = "mypy-1.8.0-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:855fe27b80375e5c5878492f0729540db47b186509c98dae341254c8f45f42ae"}, - {file = "mypy-1.8.0-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:4c886c6cce2d070bd7df4ec4a05a13ee20c0aa60cb587e8d1265b6c03cf91da3"}, - {file = "mypy-1.8.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:d19c413b3c07cbecf1f991e2221746b0d2a9410b59cb3f4fb9557f0365a1a817"}, - {file = "mypy-1.8.0-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:9261ed810972061388918c83c3f5cd46079d875026ba97380f3e3978a72f503d"}, - {file = "mypy-1.8.0-cp311-cp311-win_amd64.whl", hash = "sha256:51720c776d148bad2372ca21ca29256ed483aa9a4cdefefcef49006dff2a6835"}, - {file = "mypy-1.8.0-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:52825b01f5c4c1c4eb0db253ec09c7aa17e1a7304d247c48b6f3599ef40db8bd"}, - {file = "mypy-1.8.0-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:f5ac9a4eeb1ec0f1ccdc6f326bcdb464de5f80eb07fb38b5ddd7b0de6bc61e55"}, - {file = "mypy-1.8.0-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:afe3fe972c645b4632c563d3f3eff1cdca2fa058f730df2b93a35e3b0c538218"}, - {file = "mypy-1.8.0-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:42c6680d256ab35637ef88891c6bd02514ccb7e1122133ac96055ff458f93fc3"}, - {file = "mypy-1.8.0-cp312-cp312-win_amd64.whl", hash = "sha256:720a5ca70e136b675af3af63db533c1c8c9181314d207568bbe79051f122669e"}, - {file = "mypy-1.8.0-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:028cf9f2cae89e202d7b6593cd98db6759379f17a319b5faf4f9978d7084cdc6"}, - {file = "mypy-1.8.0-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:4e6d97288757e1ddba10dd9549ac27982e3e74a49d8d0179fc14d4365c7add66"}, - {file = "mypy-1.8.0-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7f1478736fcebb90f97e40aff11a5f253af890c845ee0c850fe80aa060a267c6"}, - {file = "mypy-1.8.0-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:42419861b43e6962a649068a61f4a4839205a3ef525b858377a960b9e2de6e0d"}, - {file = "mypy-1.8.0-cp38-cp38-win_amd64.whl", hash = "sha256:2b5b6c721bd4aabaadead3a5e6fa85c11c6c795e0c81a7215776ef8afc66de02"}, - {file = "mypy-1.8.0-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:5c1538c38584029352878a0466f03a8ee7547d7bd9f641f57a0f3017a7c905b8"}, - {file = "mypy-1.8.0-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:4ef4be7baf08a203170f29e89d79064463b7fc7a0908b9d0d5114e8009c3a259"}, - {file = "mypy-1.8.0-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7178def594014aa6c35a8ff411cf37d682f428b3b5617ca79029d8ae72f5402b"}, - {file = "mypy-1.8.0-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:ab3c84fa13c04aeeeabb2a7f67a25ef5d77ac9d6486ff33ded762ef353aa5592"}, - {file = "mypy-1.8.0-cp39-cp39-win_amd64.whl", hash = "sha256:99b00bc72855812a60d253420d8a2eae839b0afa4938f09f4d2aa9bb4654263a"}, - {file = "mypy-1.8.0-py3-none-any.whl", hash = "sha256:538fd81bb5e430cc1381a443971c0475582ff9f434c16cd46d2c66763ce85d9d"}, - {file = "mypy-1.8.0.tar.gz", hash = "sha256:6ff8b244d7085a0b425b56d327b480c3b29cafbd2eff27316a004f9a7391ae07"}, + {file = "mypy-1.9.0-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:f8a67616990062232ee4c3952f41c779afac41405806042a8126fe96e098419f"}, + {file = "mypy-1.9.0-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:d357423fa57a489e8c47b7c85dfb96698caba13d66e086b412298a1a0ea3b0ed"}, + {file = "mypy-1.9.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:49c87c15aed320de9b438ae7b00c1ac91cd393c1b854c2ce538e2a72d55df150"}, + {file = "mypy-1.9.0-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:48533cdd345c3c2e5ef48ba3b0d3880b257b423e7995dada04248725c6f77374"}, + {file = "mypy-1.9.0-cp310-cp310-win_amd64.whl", hash = "sha256:4d3dbd346cfec7cb98e6cbb6e0f3c23618af826316188d587d1c1bc34f0ede03"}, + {file = "mypy-1.9.0-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:653265f9a2784db65bfca694d1edd23093ce49740b2244cde583aeb134c008f3"}, + {file = "mypy-1.9.0-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:3a3c007ff3ee90f69cf0a15cbcdf0995749569b86b6d2f327af01fd1b8aee9dc"}, + {file = "mypy-1.9.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:2418488264eb41f69cc64a69a745fad4a8f86649af4b1041a4c64ee61fc61129"}, + {file = "mypy-1.9.0-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:68edad3dc7d70f2f17ae4c6c1b9471a56138ca22722487eebacfd1eb5321d612"}, + {file = "mypy-1.9.0-cp311-cp311-win_amd64.whl", hash = "sha256:85ca5fcc24f0b4aeedc1d02f93707bccc04733f21d41c88334c5482219b1ccb3"}, + {file = "mypy-1.9.0-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:aceb1db093b04db5cd390821464504111b8ec3e351eb85afd1433490163d60cd"}, + {file = "mypy-1.9.0-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:0235391f1c6f6ce487b23b9dbd1327b4ec33bb93934aa986efe8a9563d9349e6"}, + {file = "mypy-1.9.0-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:d4d5ddc13421ba3e2e082a6c2d74c2ddb3979c39b582dacd53dd5d9431237185"}, + {file = "mypy-1.9.0-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:190da1ee69b427d7efa8aa0d5e5ccd67a4fb04038c380237a0d96829cb157913"}, + {file = "mypy-1.9.0-cp312-cp312-win_amd64.whl", hash = "sha256:fe28657de3bfec596bbeef01cb219833ad9d38dd5393fc649f4b366840baefe6"}, + {file = "mypy-1.9.0-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:e54396d70be04b34f31d2edf3362c1edd023246c82f1730bbf8768c28db5361b"}, + {file = "mypy-1.9.0-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:5e6061f44f2313b94f920e91b204ec600982961e07a17e0f6cd83371cb23f5c2"}, + {file = "mypy-1.9.0-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:81a10926e5473c5fc3da8abb04119a1f5811a236dc3a38d92015cb1e6ba4cb9e"}, + {file = "mypy-1.9.0-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:b685154e22e4e9199fc95f298661deea28aaede5ae16ccc8cbb1045e716b3e04"}, + {file = "mypy-1.9.0-cp38-cp38-win_amd64.whl", hash = "sha256:5d741d3fc7c4da608764073089e5f58ef6352bedc223ff58f2f038c2c4698a89"}, + {file = "mypy-1.9.0-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:587ce887f75dd9700252a3abbc9c97bbe165a4a630597845c61279cf32dfbf02"}, + {file = "mypy-1.9.0-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:f88566144752999351725ac623471661c9d1cd8caa0134ff98cceeea181789f4"}, + {file = "mypy-1.9.0-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:61758fabd58ce4b0720ae1e2fea5cfd4431591d6d590b197775329264f86311d"}, + {file = "mypy-1.9.0-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:e49499be624dead83927e70c756970a0bc8240e9f769389cdf5714b0784ca6bf"}, + {file = "mypy-1.9.0-cp39-cp39-win_amd64.whl", hash = "sha256:571741dc4194b4f82d344b15e8837e8c5fcc462d66d076748142327626a1b6e9"}, + {file = "mypy-1.9.0-py3-none-any.whl", hash = "sha256:a260627a570559181a9ea5de61ac6297aa5af202f06fd7ab093ce74e7181e43e"}, + {file = "mypy-1.9.0.tar.gz", hash = "sha256:3cc5da0127e6a478cddd906068496a97a7618a21ce9b54bde5bf7e539c7af974"}, ] [package.dependencies] @@ -3291,43 +3290,47 @@ setuptools = "*" [[package]] name = "numpy" -version = "1.26.0" +version = "1.26.4" description = "Fundamental package for array computing in Python" optional = false -python-versions = "<3.13,>=3.9" +python-versions = ">=3.9" files = [ - {file = "numpy-1.26.0-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:f8db2f125746e44dce707dd44d4f4efeea8d7e2b43aace3f8d1f235cfa2733dd"}, - {file = "numpy-1.26.0-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:0621f7daf973d34d18b4e4bafb210bbaf1ef5e0100b5fa750bd9cde84c7ac292"}, - {file = "numpy-1.26.0-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:51be5f8c349fdd1a5568e72713a21f518e7d6707bcf8503b528b88d33b57dc68"}, - {file = "numpy-1.26.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:767254ad364991ccfc4d81b8152912e53e103ec192d1bb4ea6b1f5a7117040be"}, - {file = "numpy-1.26.0-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:436c8e9a4bdeeee84e3e59614d38c3dbd3235838a877af8c211cfcac8a80b8d3"}, - {file = "numpy-1.26.0-cp310-cp310-win32.whl", hash = "sha256:c2e698cb0c6dda9372ea98a0344245ee65bdc1c9dd939cceed6bb91256837896"}, - {file = "numpy-1.26.0-cp310-cp310-win_amd64.whl", hash = "sha256:09aaee96c2cbdea95de76ecb8a586cb687d281c881f5f17bfc0fb7f5890f6b91"}, - {file = "numpy-1.26.0-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:637c58b468a69869258b8ae26f4a4c6ff8abffd4a8334c830ffb63e0feefe99a"}, - {file = "numpy-1.26.0-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:306545e234503a24fe9ae95ebf84d25cba1fdc27db971aa2d9f1ab6bba19a9dd"}, - {file = "numpy-1.26.0-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:8c6adc33561bd1d46f81131d5352348350fc23df4d742bb246cdfca606ea1208"}, - {file = "numpy-1.26.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:e062aa24638bb5018b7841977c360d2f5917268d125c833a686b7cbabbec496c"}, - {file = "numpy-1.26.0-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:546b7dd7e22f3c6861463bebb000646fa730e55df5ee4a0224408b5694cc6148"}, - {file = "numpy-1.26.0-cp311-cp311-win32.whl", hash = "sha256:c0b45c8b65b79337dee5134d038346d30e109e9e2e9d43464a2970e5c0e93229"}, - {file = "numpy-1.26.0-cp311-cp311-win_amd64.whl", hash = "sha256:eae430ecf5794cb7ae7fa3808740b015aa80747e5266153128ef055975a72b99"}, - {file = "numpy-1.26.0-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:166b36197e9debc4e384e9c652ba60c0bacc216d0fc89e78f973a9760b503388"}, - {file = "numpy-1.26.0-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:f042f66d0b4ae6d48e70e28d487376204d3cbf43b84c03bac57e28dac6151581"}, - {file = "numpy-1.26.0-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e5e18e5b14a7560d8acf1c596688f4dfd19b4f2945b245a71e5af4ddb7422feb"}, - {file = "numpy-1.26.0-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7f6bad22a791226d0a5c7c27a80a20e11cfe09ad5ef9084d4d3fc4a299cca505"}, - {file = "numpy-1.26.0-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:4acc65dd65da28060e206c8f27a573455ed724e6179941edb19f97e58161bb69"}, - {file = "numpy-1.26.0-cp312-cp312-win32.whl", hash = "sha256:bb0d9a1aaf5f1cb7967320e80690a1d7ff69f1d47ebc5a9bea013e3a21faec95"}, - {file = "numpy-1.26.0-cp312-cp312-win_amd64.whl", hash = "sha256:ee84ca3c58fe48b8ddafdeb1db87388dce2c3c3f701bf447b05e4cfcc3679112"}, - {file = "numpy-1.26.0-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:4a873a8180479bc829313e8d9798d5234dfacfc2e8a7ac188418189bb8eafbd2"}, - {file = "numpy-1.26.0-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:914b28d3215e0c721dc75db3ad6d62f51f630cb0c277e6b3bcb39519bed10bd8"}, - {file = "numpy-1.26.0-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:c78a22e95182fb2e7874712433eaa610478a3caf86f28c621708d35fa4fd6e7f"}, - {file = "numpy-1.26.0-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:86f737708b366c36b76e953c46ba5827d8c27b7a8c9d0f471810728e5a2fe57c"}, - {file = "numpy-1.26.0-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:b44e6a09afc12952a7d2a58ca0a2429ee0d49a4f89d83a0a11052da696440e49"}, - {file = "numpy-1.26.0-cp39-cp39-win32.whl", hash = "sha256:5671338034b820c8d58c81ad1dafc0ed5a00771a82fccc71d6438df00302094b"}, - {file = "numpy-1.26.0-cp39-cp39-win_amd64.whl", hash = "sha256:020cdbee66ed46b671429c7265cf00d8ac91c046901c55684954c3958525dab2"}, - {file = "numpy-1.26.0-pp39-pypy39_pp73-macosx_10_9_x86_64.whl", hash = "sha256:0792824ce2f7ea0c82ed2e4fecc29bb86bee0567a080dacaf2e0a01fe7654369"}, - {file = "numpy-1.26.0-pp39-pypy39_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7d484292eaeb3e84a51432a94f53578689ffdea3f90e10c8b203a99be5af57d8"}, - {file = "numpy-1.26.0-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:186ba67fad3c60dbe8a3abff3b67a91351100f2661c8e2a80364ae6279720299"}, - {file = "numpy-1.26.0.tar.gz", hash = "sha256:f93fc78fe8bf15afe2b8d6b6499f1c73953169fad1e9a8dd086cdff3190e7fdf"}, + {file = "numpy-1.26.4-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:9ff0f4f29c51e2803569d7a51c2304de5554655a60c5d776e35b4a41413830d0"}, + {file = "numpy-1.26.4-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:2e4ee3380d6de9c9ec04745830fd9e2eccb3e6cf790d39d7b98ffd19b0dd754a"}, + {file = "numpy-1.26.4-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d209d8969599b27ad20994c8e41936ee0964e6da07478d6c35016bc386b66ad4"}, + {file = "numpy-1.26.4-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:ffa75af20b44f8dba823498024771d5ac50620e6915abac414251bd971b4529f"}, + {file = "numpy-1.26.4-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:62b8e4b1e28009ef2846b4c7852046736bab361f7aeadeb6a5b89ebec3c7055a"}, + {file = "numpy-1.26.4-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:a4abb4f9001ad2858e7ac189089c42178fcce737e4169dc61321660f1a96c7d2"}, + {file = "numpy-1.26.4-cp310-cp310-win32.whl", hash = "sha256:bfe25acf8b437eb2a8b2d49d443800a5f18508cd811fea3181723922a8a82b07"}, + {file = "numpy-1.26.4-cp310-cp310-win_amd64.whl", hash = "sha256:b97fe8060236edf3662adfc2c633f56a08ae30560c56310562cb4f95500022d5"}, + {file = "numpy-1.26.4-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:4c66707fabe114439db9068ee468c26bbdf909cac0fb58686a42a24de1760c71"}, + {file = "numpy-1.26.4-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:edd8b5fe47dab091176d21bb6de568acdd906d1887a4584a15a9a96a1dca06ef"}, + {file = "numpy-1.26.4-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:7ab55401287bfec946ced39700c053796e7cc0e3acbef09993a9ad2adba6ca6e"}, + {file = "numpy-1.26.4-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:666dbfb6ec68962c033a450943ded891bed2d54e6755e35e5835d63f4f6931d5"}, + {file = "numpy-1.26.4-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:96ff0b2ad353d8f990b63294c8986f1ec3cb19d749234014f4e7eb0112ceba5a"}, + {file = "numpy-1.26.4-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:60dedbb91afcbfdc9bc0b1f3f402804070deed7392c23eb7a7f07fa857868e8a"}, + {file = "numpy-1.26.4-cp311-cp311-win32.whl", hash = "sha256:1af303d6b2210eb850fcf03064d364652b7120803a0b872f5211f5234b399f20"}, + {file = "numpy-1.26.4-cp311-cp311-win_amd64.whl", hash = "sha256:cd25bcecc4974d09257ffcd1f098ee778f7834c3ad767fe5db785be9a4aa9cb2"}, + {file = "numpy-1.26.4-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:b3ce300f3644fb06443ee2222c2201dd3a89ea6040541412b8fa189341847218"}, + {file = "numpy-1.26.4-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:03a8c78d01d9781b28a6989f6fa1bb2c4f2d51201cf99d3dd875df6fbd96b23b"}, + {file = "numpy-1.26.4-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:9fad7dcb1aac3c7f0584a5a8133e3a43eeb2fe127f47e3632d43d677c66c102b"}, + {file = "numpy-1.26.4-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:675d61ffbfa78604709862923189bad94014bef562cc35cf61d3a07bba02a7ed"}, + {file = "numpy-1.26.4-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:ab47dbe5cc8210f55aa58e4805fe224dac469cde56b9f731a4c098b91917159a"}, + {file = "numpy-1.26.4-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:1dda2e7b4ec9dd512f84935c5f126c8bd8b9f2fc001e9f54af255e8c5f16b0e0"}, + {file = "numpy-1.26.4-cp312-cp312-win32.whl", hash = "sha256:50193e430acfc1346175fcbdaa28ffec49947a06918b7b92130744e81e640110"}, + {file = "numpy-1.26.4-cp312-cp312-win_amd64.whl", hash = "sha256:08beddf13648eb95f8d867350f6a018a4be2e5ad54c8d8caed89ebca558b2818"}, + {file = "numpy-1.26.4-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:7349ab0fa0c429c82442a27a9673fc802ffdb7c7775fad780226cb234965e53c"}, + {file = "numpy-1.26.4-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:52b8b60467cd7dd1e9ed082188b4e6bb35aa5cdd01777621a1658910745b90be"}, + {file = "numpy-1.26.4-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d5241e0a80d808d70546c697135da2c613f30e28251ff8307eb72ba696945764"}, + {file = "numpy-1.26.4-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:f870204a840a60da0b12273ef34f7051e98c3b5961b61b0c2c1be6dfd64fbcd3"}, + {file = "numpy-1.26.4-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:679b0076f67ecc0138fd2ede3a8fd196dddc2ad3254069bcb9faf9a79b1cebcd"}, + {file = "numpy-1.26.4-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:47711010ad8555514b434df65f7d7b076bb8261df1ca9bb78f53d3b2db02e95c"}, + {file = "numpy-1.26.4-cp39-cp39-win32.whl", hash = "sha256:a354325ee03388678242a4d7ebcd08b5c727033fcff3b2f536aea978e15ee9e6"}, + {file = "numpy-1.26.4-cp39-cp39-win_amd64.whl", hash = "sha256:3373d5d70a5fe74a2c1bb6d2cfd9609ecf686d47a2d7b1d37a8f3b6bf6003aea"}, + {file = "numpy-1.26.4-pp39-pypy39_pp73-macosx_10_9_x86_64.whl", hash = "sha256:afedb719a9dcfc7eaf2287b839d8198e06dcd4cb5d276a3df279231138e83d30"}, + {file = "numpy-1.26.4-pp39-pypy39_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:95a7476c59002f2f6c590b9b7b998306fba6a5aa646b1e22ddfeaf8f78c3a29c"}, + {file = "numpy-1.26.4-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:7e50d0a0cc3189f9cb0aeb3a6a6af18c16f59f004b866cd2be1c14b36134a4a0"}, + {file = "numpy-1.26.4.tar.gz", hash = "sha256:2a02aba9ed12e4ac4eb3ea9421c420301a0c6460d9830d74a9df87efa4912010"}, ] [[package]] @@ -3451,13 +3454,14 @@ files = [ [[package]] name = "nvidia-nvjitlink-cu12" -version = "12.3.101" +version = "12.4.99" description = "Nvidia JIT LTO Library" optional = false python-versions = ">=3" files = [ - {file = "nvidia_nvjitlink_cu12-12.3.101-py3-none-manylinux1_x86_64.whl", hash = "sha256:64335a8088e2b9d196ae8665430bc6a2b7e6ef2eb877a9c735c804bd4ff6467c"}, - {file = "nvidia_nvjitlink_cu12-12.3.101-py3-none-win_amd64.whl", hash = "sha256:1b2e317e437433753530792f13eece58f0aec21a2b05903be7bffe58a606cbd1"}, + {file = "nvidia_nvjitlink_cu12-12.4.99-py3-none-manylinux2014_aarch64.whl", hash = "sha256:75d6498c96d9adb9435f2bbdbddb479805ddfb97b5c1b32395c694185c20ca57"}, + {file = "nvidia_nvjitlink_cu12-12.4.99-py3-none-manylinux2014_x86_64.whl", hash = "sha256:c6428836d20fe7e327191c175791d38570e10762edc588fb46749217cd444c74"}, + {file = "nvidia_nvjitlink_cu12-12.4.99-py3-none-win_amd64.whl", hash = "sha256:991905ffa2144cb603d8ca7962d75c35334ae82bf92820b6ba78157277da1ad2"}, ] [[package]] @@ -3531,13 +3535,13 @@ sympy = "*" [[package]] name = "openai" -version = "1.12.0" +version = "1.14.1" description = "The official Python library for the openai API" optional = false python-versions = ">=3.7.1" files = [ - {file = "openai-1.12.0-py3-none-any.whl", hash = "sha256:a54002c814e05222e413664f651b5916714e4700d041d5cf5724d3ae1a3e3481"}, - {file = "openai-1.12.0.tar.gz", hash = "sha256:99c5d257d09ea6533d689d1cc77caa0ac679fa21efef8893d8b0832a86877f1b"}, + {file = "openai-1.14.1-py3-none-any.whl", hash = "sha256:f9322b0bf3b82bbd06930fad535369a023f35a3a96d3ef0b827644a15d7aae97"}, + {file = "openai-1.14.1.tar.gz", hash = "sha256:1fab5dd623cdc0c7c6e7da5d8d11fa6900f94191c2dfb6510d7eac33195fa175"}, ] [package.dependencies] @@ -3573,13 +3577,13 @@ numpy = {version = ">=1.23.5", markers = "python_version >= \"3.11\""} [[package]] name = "opentelemetry-api" -version = "1.22.0" +version = "1.23.0" description = "OpenTelemetry Python API" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_api-1.22.0-py3-none-any.whl", hash = "sha256:43621514301a7e9f5d06dd8013a1b450f30c2e9372b8e30aaeb4562abf2ce034"}, - {file = "opentelemetry_api-1.22.0.tar.gz", hash = "sha256:15ae4ca925ecf9cfdfb7a709250846fbb08072260fca08ade78056c502b86bed"}, + {file = "opentelemetry_api-1.23.0-py3-none-any.whl", hash = "sha256:cc03ea4025353048aadb9c64919099663664672ea1c6be6ddd8fee8e4cd5e774"}, + {file = "opentelemetry_api-1.23.0.tar.gz", hash = "sha256:14a766548c8dd2eb4dfc349739eb4c3893712a0daa996e5dbf945f9da665da9d"}, ] [package.dependencies] @@ -3588,52 +3592,50 @@ importlib-metadata = ">=6.0,<7.0" [[package]] name = "opentelemetry-exporter-otlp-proto-common" -version = "1.22.0" +version = "1.23.0" description = "OpenTelemetry Protobuf encoding" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_exporter_otlp_proto_common-1.22.0-py3-none-any.whl", hash = "sha256:3f2538bec5312587f8676c332b3747f54c89fe6364803a807e217af4603201fa"}, - {file = "opentelemetry_exporter_otlp_proto_common-1.22.0.tar.gz", hash = "sha256:71ae2f81bc6d6fe408d06388826edc8933759b2ca3a97d24054507dc7cfce52d"}, + {file = "opentelemetry_exporter_otlp_proto_common-1.23.0-py3-none-any.whl", hash = "sha256:2a9e7e9d5a8b026b572684b6b24dcdefcaa58613d5ce3d644130b0c373c056c1"}, + {file = "opentelemetry_exporter_otlp_proto_common-1.23.0.tar.gz", hash = "sha256:35e4ea909e7a0b24235bd0aaf17fba49676527feb1823b46565ff246d5a1ab18"}, ] [package.dependencies] -backoff = {version = ">=1.10.0,<3.0.0", markers = "python_version >= \"3.7\""} -opentelemetry-proto = "1.22.0" +opentelemetry-proto = "1.23.0" [[package]] name = "opentelemetry-exporter-otlp-proto-grpc" -version = "1.22.0" +version = "1.23.0" description = "OpenTelemetry Collector Protobuf over gRPC Exporter" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_exporter_otlp_proto_grpc-1.22.0-py3-none-any.whl", hash = "sha256:b5bcadc129272004316a455e9081216d3380c1fc2231a928ea6a70aa90e173fb"}, - {file = "opentelemetry_exporter_otlp_proto_grpc-1.22.0.tar.gz", hash = "sha256:1e0e5aa4bbabc74942f06f268deffd94851d12a8dc30b02527472ef1729fe5b1"}, + {file = "opentelemetry_exporter_otlp_proto_grpc-1.23.0-py3-none-any.whl", hash = "sha256:40f9e3e7761eb34f2a1001f4543028783ac26e2db27e420d5374f2cca0182dad"}, + {file = "opentelemetry_exporter_otlp_proto_grpc-1.23.0.tar.gz", hash = "sha256:aa1a012eea5342bfef51fcf3f7f22601dcb0f0984a07ffe6025b2fbb6d91a2a9"}, ] [package.dependencies] -backoff = {version = ">=1.10.0,<3.0.0", markers = "python_version >= \"3.7\""} deprecated = ">=1.2.6" googleapis-common-protos = ">=1.52,<2.0" grpcio = ">=1.0.0,<2.0.0" opentelemetry-api = ">=1.15,<2.0" -opentelemetry-exporter-otlp-proto-common = "1.22.0" -opentelemetry-proto = "1.22.0" -opentelemetry-sdk = ">=1.22.0,<1.23.0" +opentelemetry-exporter-otlp-proto-common = "1.23.0" +opentelemetry-proto = "1.23.0" +opentelemetry-sdk = ">=1.23.0,<1.24.0" [package.extras] test = ["pytest-grpc"] [[package]] name = "opentelemetry-instrumentation" -version = "0.43b0" +version = "0.44b0" description = "Instrumentation Tools & Auto Instrumentation for OpenTelemetry Python" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_instrumentation-0.43b0-py3-none-any.whl", hash = "sha256:0ff1334d7e359e27640e9d420024efeb73eacae464309c2e14ede7ba6c93967e"}, - {file = "opentelemetry_instrumentation-0.43b0.tar.gz", hash = "sha256:c3755da6c4be8033be0216d0501e11f4832690f4e2eca5a3576fbf113498f0f6"}, + {file = "opentelemetry_instrumentation-0.44b0-py3-none-any.whl", hash = "sha256:79560f386425176bcc60c59190064597096114c4a8e5154f1cb281bb4e47d2fc"}, + {file = "opentelemetry_instrumentation-0.44b0.tar.gz", hash = "sha256:8213d02d8c0987b9b26386ae3e091e0477d6331673123df736479322e1a50b48"}, ] [package.dependencies] @@ -3643,57 +3645,57 @@ wrapt = ">=1.0.0,<2.0.0" [[package]] name = "opentelemetry-instrumentation-asgi" -version = "0.43b0" +version = "0.44b0" description = "ASGI instrumentation for OpenTelemetry" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_instrumentation_asgi-0.43b0-py3-none-any.whl", hash = "sha256:1f593829fa039e9367820736fb063e92acd15c25b53d7bcb5d319971b8e93fd7"}, - {file = "opentelemetry_instrumentation_asgi-0.43b0.tar.gz", hash = "sha256:3f6f19333dca31ef696672e4e36cb1c2613c71dc7e847c11ff36a37e1130dadc"}, + {file = "opentelemetry_instrumentation_asgi-0.44b0-py3-none-any.whl", hash = "sha256:0d95c84a8991008c8a8ac35e15d43cc7768a5bb46f95f129e802ad2990d7c366"}, + {file = "opentelemetry_instrumentation_asgi-0.44b0.tar.gz", hash = "sha256:72d4d28ec7ccd551eac11edc5ae8cac3586c0a228467d6a95fad7b6d4edd597a"}, ] [package.dependencies] asgiref = ">=3.0,<4.0" opentelemetry-api = ">=1.12,<2.0" -opentelemetry-instrumentation = "0.43b0" -opentelemetry-semantic-conventions = "0.43b0" -opentelemetry-util-http = "0.43b0" +opentelemetry-instrumentation = "0.44b0" +opentelemetry-semantic-conventions = "0.44b0" +opentelemetry-util-http = "0.44b0" [package.extras] instruments = ["asgiref (>=3.0,<4.0)"] -test = ["opentelemetry-instrumentation-asgi[instruments]", "opentelemetry-test-utils (==0.43b0)"] +test = ["opentelemetry-instrumentation-asgi[instruments]", "opentelemetry-test-utils (==0.44b0)"] [[package]] name = "opentelemetry-instrumentation-fastapi" -version = "0.43b0" +version = "0.44b0" description = "OpenTelemetry FastAPI Instrumentation" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_instrumentation_fastapi-0.43b0-py3-none-any.whl", hash = "sha256:b79c044df68a52e07b35fa12a424e7cc0dd27ff0a171c5fdcc41dea9de8fc938"}, - {file = "opentelemetry_instrumentation_fastapi-0.43b0.tar.gz", hash = "sha256:2afaaf470622e1a2732182c68f6d2431ffe5e026a7edacd0f83605632b66347f"}, + {file = "opentelemetry_instrumentation_fastapi-0.44b0-py3-none-any.whl", hash = "sha256:4441482944bea6676816668d56deb94af990e8c6e9582c581047e5d84c91d3c9"}, + {file = "opentelemetry_instrumentation_fastapi-0.44b0.tar.gz", hash = "sha256:67ed10b93ad9d35238ae0be73cf8acbbb65a4a61fb7444d0aee5b0c492e294db"}, ] [package.dependencies] opentelemetry-api = ">=1.12,<2.0" -opentelemetry-instrumentation = "0.43b0" -opentelemetry-instrumentation-asgi = "0.43b0" -opentelemetry-semantic-conventions = "0.43b0" -opentelemetry-util-http = "0.43b0" +opentelemetry-instrumentation = "0.44b0" +opentelemetry-instrumentation-asgi = "0.44b0" +opentelemetry-semantic-conventions = "0.44b0" +opentelemetry-util-http = "0.44b0" [package.extras] instruments = ["fastapi (>=0.58,<1.0)"] -test = ["httpx (>=0.22,<1.0)", "opentelemetry-instrumentation-fastapi[instruments]", "opentelemetry-test-utils (==0.43b0)", "requests (>=2.23,<3.0)"] +test = ["httpx (>=0.22,<1.0)", "opentelemetry-instrumentation-fastapi[instruments]", "opentelemetry-test-utils (==0.44b0)", "requests (>=2.23,<3.0)"] [[package]] name = "opentelemetry-proto" -version = "1.22.0" +version = "1.23.0" description = "OpenTelemetry Python Proto" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_proto-1.22.0-py3-none-any.whl", hash = "sha256:ce7188d22c75b6d0fe53e7fb58501613d0feade5139538e79dedd9420610fa0c"}, - {file = "opentelemetry_proto-1.22.0.tar.gz", hash = "sha256:9ec29169286029f17ca34ec1f3455802ffb90131642d2f545ece9a63e8f69003"}, + {file = "opentelemetry_proto-1.23.0-py3-none-any.whl", hash = "sha256:4c017deca052cb287a6003b7c989ed8b47af65baeb5d57ebf93dde0793f78509"}, + {file = "opentelemetry_proto-1.23.0.tar.gz", hash = "sha256:e6aaf8b7ace8d021942d546161401b83eed90f9f2cc6f13275008cea730e4651"}, ] [package.dependencies] @@ -3701,40 +3703,40 @@ protobuf = ">=3.19,<5.0" [[package]] name = "opentelemetry-sdk" -version = "1.22.0" +version = "1.23.0" description = "OpenTelemetry Python SDK" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_sdk-1.22.0-py3-none-any.whl", hash = "sha256:a730555713d7c8931657612a88a141e3a4fe6eb5523d9e2d5a8b1e673d76efa6"}, - {file = "opentelemetry_sdk-1.22.0.tar.gz", hash = "sha256:45267ac1f38a431fc2eb5d6e0c0d83afc0b78de57ac345488aa58c28c17991d0"}, + {file = "opentelemetry_sdk-1.23.0-py3-none-any.whl", hash = "sha256:a93c96990ac0f07c6d679e2f1015864ff7a4f5587122dd5af968034436efb1fd"}, + {file = "opentelemetry_sdk-1.23.0.tar.gz", hash = "sha256:9ddf60195837b59e72fd2033d6a47e2b59a0f74f0ec37d89387d89e3da8cab7f"}, ] [package.dependencies] -opentelemetry-api = "1.22.0" -opentelemetry-semantic-conventions = "0.43b0" +opentelemetry-api = "1.23.0" +opentelemetry-semantic-conventions = "0.44b0" typing-extensions = ">=3.7.4" [[package]] name = "opentelemetry-semantic-conventions" -version = "0.43b0" +version = "0.44b0" description = "OpenTelemetry Semantic Conventions" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_semantic_conventions-0.43b0-py3-none-any.whl", hash = "sha256:291284d7c1bf15fdaddf309b3bd6d3b7ce12a253cec6d27144439819a15d8445"}, - {file = "opentelemetry_semantic_conventions-0.43b0.tar.gz", hash = "sha256:b9576fb890df479626fa624e88dde42d3d60b8b6c8ae1152ad157a8b97358635"}, + {file = "opentelemetry_semantic_conventions-0.44b0-py3-none-any.whl", hash = "sha256:7c434546c9cbd797ab980cc88bf9ff3f4a5a28f941117cad21694e43d5d92019"}, + {file = "opentelemetry_semantic_conventions-0.44b0.tar.gz", hash = "sha256:2e997cb28cd4ca81a25a9a43365f593d0c2b76be0685015349a89abdf1aa4ffa"}, ] [[package]] name = "opentelemetry-util-http" -version = "0.43b0" +version = "0.44b0" description = "Web util for OpenTelemetry" optional = true -python-versions = ">=3.7" +python-versions = ">=3.8" files = [ - {file = "opentelemetry_util_http-0.43b0-py3-none-any.whl", hash = "sha256:f25a820784b030f6cb86b3d76e5676c769b75ed3f55a210bcdae0a5e175ebadb"}, - {file = "opentelemetry_util_http-0.43b0.tar.gz", hash = "sha256:3ff6ab361dbe99fc81200d625603c0fb890c055c6e416a3e6d661ddf47a6c7f7"}, + {file = "opentelemetry_util_http-0.44b0-py3-none-any.whl", hash = "sha256:ff018ab6a2fa349537ff21adcef99a294248b599be53843c44f367aef6bccea5"}, + {file = "opentelemetry_util_http-0.44b0.tar.gz", hash = "sha256:75896dffcbbeb5df5429ad4526e22307fc041a27114e0c5bfd90bb219381e68f"}, ] [[package]] @@ -3809,51 +3811,51 @@ files = [ [[package]] name = "packaging" -version = "23.2" +version = "24.0" description = "Core utilities for Python packages" optional = false python-versions = ">=3.7" files = [ - {file = "packaging-23.2-py3-none-any.whl", hash = "sha256:8c491190033a9af7e1d931d0b5dacc2ef47509b34dd0de67ed209b5203fc88c7"}, - {file = "packaging-23.2.tar.gz", hash = "sha256:048fb0e9405036518eaaf48a55953c750c11e1a1b68e0dd1a9d62ed0c092cfc5"}, + {file = "packaging-24.0-py3-none-any.whl", hash = "sha256:2ddfb553fdf02fb784c234c7ba6ccc288296ceabec964ad2eae3777778130bc5"}, + {file = "packaging-24.0.tar.gz", hash = "sha256:eb82c5e3e56209074766e6885bb04b8c38a0c015d0a30036ebe7ece34c9989e9"}, ] [[package]] name = "pandas" -version = "2.2.0" +version = "2.2.1" description = "Powerful data structures for data analysis, time series, and statistics" optional = false python-versions = ">=3.9" files = [ - {file = "pandas-2.2.0-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:8108ee1712bb4fa2c16981fba7e68b3f6ea330277f5ca34fa8d557e986a11670"}, - {file = "pandas-2.2.0-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:736da9ad4033aeab51d067fc3bd69a0ba36f5a60f66a527b3d72e2030e63280a"}, - {file = "pandas-2.2.0-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:38e0b4fc3ddceb56ec8a287313bc22abe17ab0eb184069f08fc6a9352a769b18"}, - {file = "pandas-2.2.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:20404d2adefe92aed3b38da41d0847a143a09be982a31b85bc7dd565bdba0f4e"}, - {file = "pandas-2.2.0-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:7ea3ee3f125032bfcade3a4cf85131ed064b4f8dd23e5ce6fa16473e48ebcaf5"}, - {file = "pandas-2.2.0-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:f9670b3ac00a387620489dfc1bca66db47a787f4e55911f1293063a78b108df1"}, - {file = "pandas-2.2.0-cp310-cp310-win_amd64.whl", hash = "sha256:5a946f210383c7e6d16312d30b238fd508d80d927014f3b33fb5b15c2f895430"}, - {file = "pandas-2.2.0-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:a1b438fa26b208005c997e78672f1aa8138f67002e833312e6230f3e57fa87d5"}, - {file = "pandas-2.2.0-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:8ce2fbc8d9bf303ce54a476116165220a1fedf15985b09656b4b4275300e920b"}, - {file = "pandas-2.2.0-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:2707514a7bec41a4ab81f2ccce8b382961a29fbe9492eab1305bb075b2b1ff4f"}, - {file = "pandas-2.2.0-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:85793cbdc2d5bc32620dc8ffa715423f0c680dacacf55056ba13454a5be5de88"}, - {file = "pandas-2.2.0-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:cfd6c2491dc821b10c716ad6776e7ab311f7df5d16038d0b7458bc0b67dc10f3"}, - {file = "pandas-2.2.0-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:a146b9dcacc3123aa2b399df1a284de5f46287a4ab4fbfc237eac98a92ebcb71"}, - {file = "pandas-2.2.0-cp311-cp311-win_amd64.whl", hash = "sha256:fbc1b53c0e1fdf16388c33c3cca160f798d38aea2978004dd3f4d3dec56454c9"}, - {file = "pandas-2.2.0-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:a41d06f308a024981dcaa6c41f2f2be46a6b186b902c94c2674e8cb5c42985bc"}, - {file = "pandas-2.2.0-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:159205c99d7a5ce89ecfc37cb08ed179de7783737cea403b295b5eda8e9c56d1"}, - {file = "pandas-2.2.0-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:eb1e1f3861ea9132b32f2133788f3b14911b68102d562715d71bd0013bc45440"}, - {file = "pandas-2.2.0-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:761cb99b42a69005dec2b08854fb1d4888fdf7b05db23a8c5a099e4b886a2106"}, - {file = "pandas-2.2.0-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:a20628faaf444da122b2a64b1e5360cde100ee6283ae8effa0d8745153809a2e"}, - {file = "pandas-2.2.0-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:f5be5d03ea2073627e7111f61b9f1f0d9625dc3c4d8dda72cc827b0c58a1d042"}, - {file = "pandas-2.2.0-cp312-cp312-win_amd64.whl", hash = "sha256:a626795722d893ed6aacb64d2401d017ddc8a2341b49e0384ab9bf7112bdec30"}, - {file = "pandas-2.2.0-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:9f66419d4a41132eb7e9a73dcec9486cf5019f52d90dd35547af11bc58f8637d"}, - {file = "pandas-2.2.0-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:57abcaeda83fb80d447f28ab0cc7b32b13978f6f733875ebd1ed14f8fbc0f4ab"}, - {file = "pandas-2.2.0-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e60f1f7dba3c2d5ca159e18c46a34e7ca7247a73b5dd1a22b6d59707ed6b899a"}, - {file = "pandas-2.2.0-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:eb61dc8567b798b969bcc1fc964788f5a68214d333cade8319c7ab33e2b5d88a"}, - {file = "pandas-2.2.0-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:52826b5f4ed658fa2b729264d63f6732b8b29949c7fd234510d57c61dbeadfcd"}, - {file = "pandas-2.2.0-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:bde2bc699dbd80d7bc7f9cab1e23a95c4375de615860ca089f34e7c64f4a8de7"}, - {file = "pandas-2.2.0-cp39-cp39-win_amd64.whl", hash = "sha256:3de918a754bbf2da2381e8a3dcc45eede8cd7775b047b923f9006d5f876802ae"}, - {file = "pandas-2.2.0.tar.gz", hash = "sha256:30b83f7c3eb217fb4d1b494a57a2fda5444f17834f5df2de6b2ffff68dc3c8e2"}, + {file = "pandas-2.2.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:8df8612be9cd1c7797c93e1c5df861b2ddda0b48b08f2c3eaa0702cf88fb5f88"}, + {file = "pandas-2.2.1-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:0f573ab277252ed9aaf38240f3b54cfc90fff8e5cab70411ee1d03f5d51f3944"}, + {file = "pandas-2.2.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:f02a3a6c83df4026e55b63c1f06476c9aa3ed6af3d89b4f04ea656ccdaaaa359"}, + {file = "pandas-2.2.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:c38ce92cb22a4bea4e3929429aa1067a454dcc9c335799af93ba9be21b6beb51"}, + {file = "pandas-2.2.1-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:c2ce852e1cf2509a69e98358e8458775f89599566ac3775e70419b98615f4b06"}, + {file = "pandas-2.2.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:53680dc9b2519cbf609c62db3ed7c0b499077c7fefda564e330286e619ff0dd9"}, + {file = "pandas-2.2.1-cp310-cp310-win_amd64.whl", hash = "sha256:94e714a1cca63e4f5939cdce5f29ba8d415d85166be3441165edd427dc9f6bc0"}, + {file = "pandas-2.2.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:f821213d48f4ab353d20ebc24e4faf94ba40d76680642fb7ce2ea31a3ad94f9b"}, + {file = "pandas-2.2.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:c70e00c2d894cb230e5c15e4b1e1e6b2b478e09cf27cc593a11ef955b9ecc81a"}, + {file = "pandas-2.2.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e97fbb5387c69209f134893abc788a6486dbf2f9e511070ca05eed4b930b1b02"}, + {file = "pandas-2.2.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:101d0eb9c5361aa0146f500773395a03839a5e6ecde4d4b6ced88b7e5a1a6403"}, + {file = "pandas-2.2.1-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:7d2ed41c319c9fb4fd454fe25372028dfa417aacb9790f68171b2e3f06eae8cd"}, + {file = "pandas-2.2.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:af5d3c00557d657c8773ef9ee702c61dd13b9d7426794c9dfeb1dc4a0bf0ebc7"}, + {file = "pandas-2.2.1-cp311-cp311-win_amd64.whl", hash = "sha256:06cf591dbaefb6da9de8472535b185cba556d0ce2e6ed28e21d919704fef1a9e"}, + {file = "pandas-2.2.1-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:88ecb5c01bb9ca927ebc4098136038519aa5d66b44671861ffab754cae75102c"}, + {file = "pandas-2.2.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:04f6ec3baec203c13e3f8b139fb0f9f86cd8c0b94603ae3ae8ce9a422e9f5bee"}, + {file = "pandas-2.2.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:a935a90a76c44fe170d01e90a3594beef9e9a6220021acfb26053d01426f7dc2"}, + {file = "pandas-2.2.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:c391f594aae2fd9f679d419e9a4d5ba4bce5bb13f6a989195656e7dc4b95c8f0"}, + {file = "pandas-2.2.1-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:9d1265545f579edf3f8f0cb6f89f234f5e44ba725a34d86535b1a1d38decbccc"}, + {file = "pandas-2.2.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:11940e9e3056576ac3244baef2fedade891977bcc1cb7e5cc8f8cc7d603edc89"}, + {file = "pandas-2.2.1-cp312-cp312-win_amd64.whl", hash = "sha256:4acf681325ee1c7f950d058b05a820441075b0dd9a2adf5c4835b9bc056bf4fb"}, + {file = "pandas-2.2.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:9bd8a40f47080825af4317d0340c656744f2bfdb6819f818e6ba3cd24c0e1397"}, + {file = "pandas-2.2.1-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:df0c37ebd19e11d089ceba66eba59a168242fc6b7155cba4ffffa6eccdfb8f16"}, + {file = "pandas-2.2.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:739cc70eaf17d57608639e74d63387b0d8594ce02f69e7a0b046f117974b3019"}, + {file = "pandas-2.2.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:f9d3558d263073ed95e46f4650becff0c5e1ffe0fc3a015de3c79283dfbdb3df"}, + {file = "pandas-2.2.1-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:4aa1d8707812a658debf03824016bf5ea0d516afdea29b7dc14cf687bc4d4ec6"}, + {file = "pandas-2.2.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:76f27a809cda87e07f192f001d11adc2b930e93a2b0c4a236fde5429527423be"}, + {file = "pandas-2.2.1-cp39-cp39-win_amd64.whl", hash = "sha256:1ba21b1d5c0e43416218db63037dbe1a01fc101dc6e6024bcad08123e48004ab"}, + {file = "pandas-2.2.1.tar.gz", hash = "sha256:0ab90f87093c13f3e8fa45b48ba9f39181046e8f3317d3aadb2fffbb1b978572"}, ] [package.dependencies] @@ -3881,6 +3883,7 @@ parquet = ["pyarrow (>=10.0.1)"] performance = ["bottleneck (>=1.3.6)", "numba (>=0.56.4)", "numexpr (>=2.8.4)"] plot = ["matplotlib (>=3.6.3)"] postgresql = ["SQLAlchemy (>=2.0.0)", "adbc-driver-postgresql (>=0.8.0)", "psycopg2 (>=2.9.6)"] +pyarrow = ["pyarrow (>=10.0.1)"] spss = ["pyreadstat (>=1.2.0)"] sql-other = ["SQLAlchemy (>=2.0.0)", "adbc-driver-postgresql (>=0.8.0)", "adbc-driver-sqlite (>=0.8.0)"] test = ["hypothesis (>=6.46.1)", "pytest (>=7.3.2)", "pytest-xdist (>=2.2.0)"] @@ -4063,13 +4066,13 @@ tests = ["pytest (>=5.4.1)", "pytest-cov (>=2.8.1)", "pytest-mypy (>=0.8.0)", "p [[package]] name = "posthog" -version = "3.4.1" +version = "3.5.0" description = "Integrate PostHog into any python application." optional = true python-versions = "*" files = [ - {file = "posthog-3.4.1-py2.py3-none-any.whl", hash = "sha256:8f9e01fc223d113ad1b7fc66516bd2b7b745cb460802b757795d4cec16d91696"}, - {file = "posthog-3.4.1.tar.gz", hash = "sha256:cbdae309e65172dcb7b921c611914139eb46a8a8f38266c2b51d78b60582af9d"}, + {file = "posthog-3.5.0-py2.py3-none-any.whl", hash = "sha256:3c672be7ba6f95d555ea207d4486c171d06657eb34b3ce25eb043bfe7b6b5b76"}, + {file = "posthog-3.5.0.tar.gz", hash = "sha256:8f7e3b2c6e8714d0c0c542a2109b83a7549f63b7113a133ab2763a89245ef2ef"}, ] [package.dependencies] @@ -4104,22 +4107,22 @@ virtualenv = ">=20.10.0" [[package]] name = "protobuf" -version = "4.25.2" +version = "4.25.3" description = "" optional = true python-versions = ">=3.8" files = [ - {file = "protobuf-4.25.2-cp310-abi3-win32.whl", hash = "sha256:b50c949608682b12efb0b2717f53256f03636af5f60ac0c1d900df6213910fd6"}, - {file = "protobuf-4.25.2-cp310-abi3-win_amd64.whl", hash = "sha256:8f62574857ee1de9f770baf04dde4165e30b15ad97ba03ceac65f760ff018ac9"}, - {file = "protobuf-4.25.2-cp37-abi3-macosx_10_9_universal2.whl", hash = "sha256:2db9f8fa64fbdcdc93767d3cf81e0f2aef176284071507e3ede160811502fd3d"}, - {file = "protobuf-4.25.2-cp37-abi3-manylinux2014_aarch64.whl", hash = "sha256:10894a2885b7175d3984f2be8d9850712c57d5e7587a2410720af8be56cdaf62"}, - {file = "protobuf-4.25.2-cp37-abi3-manylinux2014_x86_64.whl", hash = "sha256:fc381d1dd0516343f1440019cedf08a7405f791cd49eef4ae1ea06520bc1c020"}, - {file = "protobuf-4.25.2-cp38-cp38-win32.whl", hash = "sha256:33a1aeef4b1927431d1be780e87b641e322b88d654203a9e9d93f218ee359e61"}, - {file = "protobuf-4.25.2-cp38-cp38-win_amd64.whl", hash = "sha256:47f3de503fe7c1245f6f03bea7e8d3ec11c6c4a2ea9ef910e3221c8a15516d62"}, - {file = "protobuf-4.25.2-cp39-cp39-win32.whl", hash = "sha256:5e5c933b4c30a988b52e0b7c02641760a5ba046edc5e43d3b94a74c9fc57c1b3"}, - {file = "protobuf-4.25.2-cp39-cp39-win_amd64.whl", hash = "sha256:d66a769b8d687df9024f2985d5137a337f957a0916cf5464d1513eee96a63ff0"}, - {file = "protobuf-4.25.2-py3-none-any.whl", hash = "sha256:a8b7a98d4ce823303145bf3c1a8bdb0f2f4642a414b196f04ad9853ed0c8f830"}, - {file = "protobuf-4.25.2.tar.gz", hash = "sha256:fe599e175cb347efc8ee524bcd4b902d11f7262c0e569ececcb89995c15f0a5e"}, + {file = "protobuf-4.25.3-cp310-abi3-win32.whl", hash = "sha256:d4198877797a83cbfe9bffa3803602bbe1625dc30d8a097365dbc762e5790faa"}, + {file = "protobuf-4.25.3-cp310-abi3-win_amd64.whl", hash = "sha256:209ba4cc916bab46f64e56b85b090607a676f66b473e6b762e6f1d9d591eb2e8"}, + {file = "protobuf-4.25.3-cp37-abi3-macosx_10_9_universal2.whl", hash = "sha256:f1279ab38ecbfae7e456a108c5c0681e4956d5b1090027c1de0f934dfdb4b35c"}, + {file = "protobuf-4.25.3-cp37-abi3-manylinux2014_aarch64.whl", hash = "sha256:e7cb0ae90dd83727f0c0718634ed56837bfeeee29a5f82a7514c03ee1364c019"}, + {file = "protobuf-4.25.3-cp37-abi3-manylinux2014_x86_64.whl", hash = "sha256:7c8daa26095f82482307bc717364e7c13f4f1c99659be82890dcfc215194554d"}, + {file = "protobuf-4.25.3-cp38-cp38-win32.whl", hash = "sha256:f4f118245c4a087776e0a8408be33cf09f6c547442c00395fbfb116fac2f8ac2"}, + {file = "protobuf-4.25.3-cp38-cp38-win_amd64.whl", hash = "sha256:c053062984e61144385022e53678fbded7aea14ebb3e0305ae3592fb219ccfa4"}, + {file = "protobuf-4.25.3-cp39-cp39-win32.whl", hash = "sha256:19b270aeaa0099f16d3ca02628546b8baefe2955bbe23224aaf856134eccf1e4"}, + {file = "protobuf-4.25.3-cp39-cp39-win_amd64.whl", hash = "sha256:e3c97a1555fd6388f857770ff8b9703083de6bf1f9274a002a332d65fbb56c8c"}, + {file = "protobuf-4.25.3-py3-none-any.whl", hash = "sha256:f0700d54bcf45424477e46a9f0944155b46fb0639d69728739c0e47bab83f2b9"}, + {file = "protobuf-4.25.3.tar.gz", hash = "sha256:25b5d0b42fd000320bd7830b349e3b696435f3b329810427a6bcce6a5492cc5c"}, ] [[package]] @@ -4341,18 +4344,18 @@ files = [ [[package]] name = "pydantic" -version = "2.6.1" +version = "2.6.4" description = "Data validation using Python type hints" optional = false python-versions = ">=3.8" files = [ - {file = "pydantic-2.6.1-py3-none-any.whl", hash = "sha256:0b6a909df3192245cb736509a92ff69e4fef76116feffec68e93a567347bae6f"}, - {file = "pydantic-2.6.1.tar.gz", hash = "sha256:4fd5c182a2488dc63e6d32737ff19937888001e2a6d86e94b3f233104a5d1fa9"}, + {file = "pydantic-2.6.4-py3-none-any.whl", hash = "sha256:cc46fce86607580867bdc3361ad462bab9c222ef042d3da86f2fb333e1d916c5"}, + {file = "pydantic-2.6.4.tar.gz", hash = "sha256:b1704e0847db01817624a6b86766967f552dd9dbf3afba4004409f908dcc84e6"}, ] [package.dependencies] annotated-types = ">=0.4.0" -pydantic-core = "2.16.2" +pydantic-core = "2.16.3" typing-extensions = ">=4.6.1" [package.extras] @@ -4360,90 +4363,90 @@ email = ["email-validator (>=2.0.0)"] [[package]] name = "pydantic-core" -version = "2.16.2" +version = "2.16.3" description = "" optional = false python-versions = ">=3.8" files = [ - {file = "pydantic_core-2.16.2-cp310-cp310-macosx_10_12_x86_64.whl", hash = "sha256:3fab4e75b8c525a4776e7630b9ee48aea50107fea6ca9f593c98da3f4d11bf7c"}, - {file = "pydantic_core-2.16.2-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:8bde5b48c65b8e807409e6f20baee5d2cd880e0fad00b1a811ebc43e39a00ab2"}, - {file = "pydantic_core-2.16.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:2924b89b16420712e9bb8192396026a8fbd6d8726224f918353ac19c4c043d2a"}, - {file = "pydantic_core-2.16.2-cp310-cp310-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:16aa02e7a0f539098e215fc193c8926c897175d64c7926d00a36188917717a05"}, - {file = "pydantic_core-2.16.2-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:936a787f83db1f2115ee829dd615c4f684ee48ac4de5779ab4300994d8af325b"}, - {file = "pydantic_core-2.16.2-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:459d6be6134ce3b38e0ef76f8a672924460c455d45f1ad8fdade36796df1ddc8"}, - {file = "pydantic_core-2.16.2-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:4f9ee4febb249c591d07b2d4dd36ebcad0ccd128962aaa1801508320896575ef"}, - {file = "pydantic_core-2.16.2-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:40a0bd0bed96dae5712dab2aba7d334a6c67cbcac2ddfca7dbcc4a8176445990"}, - {file = "pydantic_core-2.16.2-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:870dbfa94de9b8866b37b867a2cb37a60c401d9deb4a9ea392abf11a1f98037b"}, - {file = "pydantic_core-2.16.2-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:308974fdf98046db28440eb3377abba274808bf66262e042c412eb2adf852731"}, - {file = "pydantic_core-2.16.2-cp310-none-win32.whl", hash = "sha256:a477932664d9611d7a0816cc3c0eb1f8856f8a42435488280dfbf4395e141485"}, - {file = "pydantic_core-2.16.2-cp310-none-win_amd64.whl", hash = "sha256:8f9142a6ed83d90c94a3efd7af8873bf7cefed2d3d44387bf848888482e2d25f"}, - {file = "pydantic_core-2.16.2-cp311-cp311-macosx_10_12_x86_64.whl", hash = "sha256:406fac1d09edc613020ce9cf3f2ccf1a1b2f57ab00552b4c18e3d5276c67eb11"}, - {file = "pydantic_core-2.16.2-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:ce232a6170dd6532096cadbf6185271e4e8c70fc9217ebe105923ac105da9978"}, - {file = "pydantic_core-2.16.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:a90fec23b4b05a09ad988e7a4f4e081711a90eb2a55b9c984d8b74597599180f"}, - {file = "pydantic_core-2.16.2-cp311-cp311-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:8aafeedb6597a163a9c9727d8a8bd363a93277701b7bfd2749fbefee2396469e"}, - {file = "pydantic_core-2.16.2-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:9957433c3a1b67bdd4c63717eaf174ebb749510d5ea612cd4e83f2d9142f3fc8"}, - {file = "pydantic_core-2.16.2-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:b0d7a9165167269758145756db43a133608a531b1e5bb6a626b9ee24bc38a8f7"}, - {file = "pydantic_core-2.16.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:dffaf740fe2e147fedcb6b561353a16243e654f7fe8e701b1b9db148242e1272"}, - {file = "pydantic_core-2.16.2-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:f8ed79883b4328b7f0bd142733d99c8e6b22703e908ec63d930b06be3a0e7113"}, - {file = "pydantic_core-2.16.2-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:cf903310a34e14651c9de056fcc12ce090560864d5a2bb0174b971685684e1d8"}, - {file = "pydantic_core-2.16.2-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:46b0d5520dbcafea9a8645a8164658777686c5c524d381d983317d29687cce97"}, - {file = "pydantic_core-2.16.2-cp311-none-win32.whl", hash = "sha256:70651ff6e663428cea902dac297066d5c6e5423fda345a4ca62430575364d62b"}, - {file = "pydantic_core-2.16.2-cp311-none-win_amd64.whl", hash = "sha256:98dc6f4f2095fc7ad277782a7c2c88296badcad92316b5a6e530930b1d475ebc"}, - {file = "pydantic_core-2.16.2-cp311-none-win_arm64.whl", hash = "sha256:ef6113cd31411eaf9b39fc5a8848e71c72656fd418882488598758b2c8c6dfa0"}, - {file = "pydantic_core-2.16.2-cp312-cp312-macosx_10_12_x86_64.whl", hash = "sha256:88646cae28eb1dd5cd1e09605680c2b043b64d7481cdad7f5003ebef401a3039"}, - {file = "pydantic_core-2.16.2-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:7b883af50eaa6bb3299780651e5be921e88050ccf00e3e583b1e92020333304b"}, - {file = "pydantic_core-2.16.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:7bf26c2e2ea59d32807081ad51968133af3025c4ba5753e6a794683d2c91bf6e"}, - {file = "pydantic_core-2.16.2-cp312-cp312-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:99af961d72ac731aae2a1b55ccbdae0733d816f8bfb97b41909e143de735f522"}, - {file = "pydantic_core-2.16.2-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:02906e7306cb8c5901a1feb61f9ab5e5c690dbbeaa04d84c1b9ae2a01ebe9379"}, - {file = "pydantic_core-2.16.2-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:d5362d099c244a2d2f9659fb3c9db7c735f0004765bbe06b99be69fbd87c3f15"}, - {file = "pydantic_core-2.16.2-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:3ac426704840877a285d03a445e162eb258924f014e2f074e209d9b4ff7bf380"}, - {file = "pydantic_core-2.16.2-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:b94cbda27267423411c928208e89adddf2ea5dd5f74b9528513f0358bba019cb"}, - {file = "pydantic_core-2.16.2-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:6db58c22ac6c81aeac33912fb1af0e930bc9774166cdd56eade913d5f2fff35e"}, - {file = "pydantic_core-2.16.2-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:396fdf88b1b503c9c59c84a08b6833ec0c3b5ad1a83230252a9e17b7dfb4cffc"}, - {file = "pydantic_core-2.16.2-cp312-none-win32.whl", hash = "sha256:7c31669e0c8cc68400ef0c730c3a1e11317ba76b892deeefaf52dcb41d56ed5d"}, - {file = "pydantic_core-2.16.2-cp312-none-win_amd64.whl", hash = "sha256:a3b7352b48fbc8b446b75f3069124e87f599d25afb8baa96a550256c031bb890"}, - {file = "pydantic_core-2.16.2-cp312-none-win_arm64.whl", hash = "sha256:a9e523474998fb33f7c1a4d55f5504c908d57add624599e095c20fa575b8d943"}, - {file = "pydantic_core-2.16.2-cp38-cp38-macosx_10_12_x86_64.whl", hash = "sha256:ae34418b6b389d601b31153b84dce480351a352e0bb763684a1b993d6be30f17"}, - {file = "pydantic_core-2.16.2-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:732bd062c9e5d9582a30e8751461c1917dd1ccbdd6cafb032f02c86b20d2e7ec"}, - {file = "pydantic_core-2.16.2-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e4b52776a2e3230f4854907a1e0946eec04d41b1fc64069ee774876bbe0eab55"}, - {file = "pydantic_core-2.16.2-cp38-cp38-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:ef551c053692b1e39e3f7950ce2296536728871110e7d75c4e7753fb30ca87f4"}, - {file = "pydantic_core-2.16.2-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:ebb892ed8599b23fa8f1799e13a12c87a97a6c9d0f497525ce9858564c4575a4"}, - {file = "pydantic_core-2.16.2-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:aa6c8c582036275997a733427b88031a32ffa5dfc3124dc25a730658c47a572f"}, - {file = "pydantic_core-2.16.2-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:e4ba0884a91f1aecce75202473ab138724aa4fb26d7707f2e1fa6c3e68c84fbf"}, - {file = "pydantic_core-2.16.2-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:7924e54f7ce5d253d6160090ddc6df25ed2feea25bfb3339b424a9dd591688bc"}, - {file = "pydantic_core-2.16.2-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:69a7b96b59322a81c2203be537957313b07dd333105b73db0b69212c7d867b4b"}, - {file = "pydantic_core-2.16.2-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:7e6231aa5bdacda78e96ad7b07d0c312f34ba35d717115f4b4bff6cb87224f0f"}, - {file = "pydantic_core-2.16.2-cp38-none-win32.whl", hash = "sha256:41dac3b9fce187a25c6253ec79a3f9e2a7e761eb08690e90415069ea4a68ff7a"}, - {file = "pydantic_core-2.16.2-cp38-none-win_amd64.whl", hash = "sha256:f685dbc1fdadb1dcd5b5e51e0a378d4685a891b2ddaf8e2bba89bd3a7144e44a"}, - {file = "pydantic_core-2.16.2-cp39-cp39-macosx_10_12_x86_64.whl", hash = "sha256:55749f745ebf154c0d63d46c8c58594d8894b161928aa41adbb0709c1fe78b77"}, - {file = "pydantic_core-2.16.2-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:b30b0dd58a4509c3bd7eefddf6338565c4905406aee0c6e4a5293841411a1286"}, - {file = "pydantic_core-2.16.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:18de31781cdc7e7b28678df7c2d7882f9692ad060bc6ee3c94eb15a5d733f8f7"}, - {file = "pydantic_core-2.16.2-cp39-cp39-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:5864b0242f74b9dd0b78fd39db1768bc3f00d1ffc14e596fd3e3f2ce43436a33"}, - {file = "pydantic_core-2.16.2-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:b8f9186ca45aee030dc8234118b9c0784ad91a0bb27fc4e7d9d6608a5e3d386c"}, - {file = "pydantic_core-2.16.2-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:cc6f6c9be0ab6da37bc77c2dda5f14b1d532d5dbef00311ee6e13357a418e646"}, - {file = "pydantic_core-2.16.2-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:aa057095f621dad24a1e906747179a69780ef45cc8f69e97463692adbcdae878"}, - {file = "pydantic_core-2.16.2-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:6ad84731a26bcfb299f9eab56c7932d46f9cad51c52768cace09e92a19e4cf55"}, - {file = "pydantic_core-2.16.2-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:3b052c753c4babf2d1edc034c97851f867c87d6f3ea63a12e2700f159f5c41c3"}, - {file = "pydantic_core-2.16.2-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:e0f686549e32ccdb02ae6f25eee40cc33900910085de6aa3790effd391ae10c2"}, - {file = "pydantic_core-2.16.2-cp39-none-win32.whl", hash = "sha256:7afb844041e707ac9ad9acad2188a90bffce2c770e6dc2318be0c9916aef1469"}, - {file = "pydantic_core-2.16.2-cp39-none-win_amd64.whl", hash = "sha256:9da90d393a8227d717c19f5397688a38635afec89f2e2d7af0df037f3249c39a"}, - {file = "pydantic_core-2.16.2-pp310-pypy310_pp73-macosx_10_12_x86_64.whl", hash = "sha256:5f60f920691a620b03082692c378661947d09415743e437a7478c309eb0e4f82"}, - {file = "pydantic_core-2.16.2-pp310-pypy310_pp73-macosx_11_0_arm64.whl", hash = "sha256:47924039e785a04d4a4fa49455e51b4eb3422d6eaacfde9fc9abf8fdef164e8a"}, - {file = "pydantic_core-2.16.2-pp310-pypy310_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e6294e76b0380bb7a61eb8a39273c40b20beb35e8c87ee101062834ced19c545"}, - {file = "pydantic_core-2.16.2-pp310-pypy310_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fe56851c3f1d6f5384b3051c536cc81b3a93a73faf931f404fef95217cf1e10d"}, - {file = "pydantic_core-2.16.2-pp310-pypy310_pp73-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:9d776d30cde7e541b8180103c3f294ef7c1862fd45d81738d156d00551005784"}, - {file = "pydantic_core-2.16.2-pp310-pypy310_pp73-musllinux_1_1_aarch64.whl", hash = "sha256:72f7919af5de5ecfaf1eba47bf9a5d8aa089a3340277276e5636d16ee97614d7"}, - {file = "pydantic_core-2.16.2-pp310-pypy310_pp73-musllinux_1_1_x86_64.whl", hash = "sha256:4bfcbde6e06c56b30668a0c872d75a7ef3025dc3c1823a13cf29a0e9b33f67e8"}, - {file = "pydantic_core-2.16.2-pp310-pypy310_pp73-win_amd64.whl", hash = "sha256:ff7c97eb7a29aba230389a2661edf2e9e06ce616c7e35aa764879b6894a44b25"}, - {file = "pydantic_core-2.16.2-pp39-pypy39_pp73-macosx_10_12_x86_64.whl", hash = "sha256:9b5f13857da99325dcabe1cc4e9e6a3d7b2e2c726248ba5dd4be3e8e4a0b6d0e"}, - {file = "pydantic_core-2.16.2-pp39-pypy39_pp73-macosx_11_0_arm64.whl", hash = "sha256:a7e41e3ada4cca5f22b478c08e973c930e5e6c7ba3588fb8e35f2398cdcc1545"}, - {file = "pydantic_core-2.16.2-pp39-pypy39_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:60eb8ceaa40a41540b9acae6ae7c1f0a67d233c40dc4359c256ad2ad85bdf5e5"}, - {file = "pydantic_core-2.16.2-pp39-pypy39_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7beec26729d496a12fd23cf8da9944ee338c8b8a17035a560b585c36fe81af20"}, - {file = "pydantic_core-2.16.2-pp39-pypy39_pp73-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:22c5f022799f3cd6741e24f0443ead92ef42be93ffda0d29b2597208c94c3753"}, - {file = "pydantic_core-2.16.2-pp39-pypy39_pp73-musllinux_1_1_aarch64.whl", hash = "sha256:eca58e319f4fd6df004762419612122b2c7e7d95ffafc37e890252f869f3fb2a"}, - {file = "pydantic_core-2.16.2-pp39-pypy39_pp73-musllinux_1_1_x86_64.whl", hash = "sha256:ed957db4c33bc99895f3a1672eca7e80e8cda8bd1e29a80536b4ec2153fa9804"}, - {file = "pydantic_core-2.16.2-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:459c0d338cc55d099798618f714b21b7ece17eb1a87879f2da20a3ff4c7628e2"}, - {file = "pydantic_core-2.16.2.tar.gz", hash = "sha256:0ba503850d8b8dcc18391f10de896ae51d37fe5fe43dbfb6a35c5c5cad271a06"}, + {file = "pydantic_core-2.16.3-cp310-cp310-macosx_10_12_x86_64.whl", hash = "sha256:75b81e678d1c1ede0785c7f46690621e4c6e63ccd9192af1f0bd9d504bbb6bf4"}, + {file = "pydantic_core-2.16.3-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:9c865a7ee6f93783bd5d781af5a4c43dadc37053a5b42f7d18dc019f8c9d2bd1"}, + {file = "pydantic_core-2.16.3-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:162e498303d2b1c036b957a1278fa0899d02b2842f1ff901b6395104c5554a45"}, + {file = "pydantic_core-2.16.3-cp310-cp310-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:2f583bd01bbfbff4eaee0868e6fc607efdfcc2b03c1c766b06a707abbc856187"}, + {file = "pydantic_core-2.16.3-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:b926dd38db1519ed3043a4de50214e0d600d404099c3392f098a7f9d75029ff8"}, + {file = "pydantic_core-2.16.3-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:716b542728d4c742353448765aa7cdaa519a7b82f9564130e2b3f6766018c9ec"}, + {file = "pydantic_core-2.16.3-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fc4ad7f7ee1a13d9cb49d8198cd7d7e3aa93e425f371a68235f784e99741561f"}, + {file = "pydantic_core-2.16.3-cp310-cp310-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:bd87f48924f360e5d1c5f770d6155ce0e7d83f7b4e10c2f9ec001c73cf475c99"}, + {file = "pydantic_core-2.16.3-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:0df446663464884297c793874573549229f9eca73b59360878f382a0fc085979"}, + {file = "pydantic_core-2.16.3-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:4df8a199d9f6afc5ae9a65f8f95ee52cae389a8c6b20163762bde0426275b7db"}, + {file = "pydantic_core-2.16.3-cp310-none-win32.whl", hash = "sha256:456855f57b413f077dff513a5a28ed838dbbb15082ba00f80750377eed23d132"}, + {file = "pydantic_core-2.16.3-cp310-none-win_amd64.whl", hash = "sha256:732da3243e1b8d3eab8c6ae23ae6a58548849d2e4a4e03a1924c8ddf71a387cb"}, + {file = "pydantic_core-2.16.3-cp311-cp311-macosx_10_12_x86_64.whl", hash = "sha256:519ae0312616026bf4cedc0fe459e982734f3ca82ee8c7246c19b650b60a5ee4"}, + {file = "pydantic_core-2.16.3-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:b3992a322a5617ded0a9f23fd06dbc1e4bd7cf39bc4ccf344b10f80af58beacd"}, + {file = "pydantic_core-2.16.3-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:8d62da299c6ecb04df729e4b5c52dc0d53f4f8430b4492b93aa8de1f541c4aac"}, + {file = "pydantic_core-2.16.3-cp311-cp311-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:2acca2be4bb2f2147ada8cac612f8a98fc09f41c89f87add7256ad27332c2fda"}, + {file = "pydantic_core-2.16.3-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:1b662180108c55dfbf1280d865b2d116633d436cfc0bba82323554873967b340"}, + {file = "pydantic_core-2.16.3-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:e7c6ed0dc9d8e65f24f5824291550139fe6f37fac03788d4580da0d33bc00c97"}, + {file = "pydantic_core-2.16.3-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:a6b1bb0827f56654b4437955555dc3aeeebeddc47c2d7ed575477f082622c49e"}, + {file = "pydantic_core-2.16.3-cp311-cp311-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:e56f8186d6210ac7ece503193ec84104da7ceb98f68ce18c07282fcc2452e76f"}, + {file = "pydantic_core-2.16.3-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:936e5db01dd49476fa8f4383c259b8b1303d5dd5fb34c97de194560698cc2c5e"}, + {file = "pydantic_core-2.16.3-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:33809aebac276089b78db106ee692bdc9044710e26f24a9a2eaa35a0f9fa70ba"}, + {file = "pydantic_core-2.16.3-cp311-none-win32.whl", hash = "sha256:ded1c35f15c9dea16ead9bffcde9bb5c7c031bff076355dc58dcb1cb436c4721"}, + {file = "pydantic_core-2.16.3-cp311-none-win_amd64.whl", hash = "sha256:d89ca19cdd0dd5f31606a9329e309d4fcbb3df860960acec32630297d61820df"}, + {file = "pydantic_core-2.16.3-cp311-none-win_arm64.whl", hash = "sha256:6162f8d2dc27ba21027f261e4fa26f8bcb3cf9784b7f9499466a311ac284b5b9"}, + {file = "pydantic_core-2.16.3-cp312-cp312-macosx_10_12_x86_64.whl", hash = "sha256:0f56ae86b60ea987ae8bcd6654a887238fd53d1384f9b222ac457070b7ac4cff"}, + {file = "pydantic_core-2.16.3-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:c9bd22a2a639e26171068f8ebb5400ce2c1bc7d17959f60a3b753ae13c632975"}, + {file = "pydantic_core-2.16.3-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:4204e773b4b408062960e65468d5346bdfe139247ee5f1ca2a378983e11388a2"}, + {file = "pydantic_core-2.16.3-cp312-cp312-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:f651dd19363c632f4abe3480a7c87a9773be27cfe1341aef06e8759599454120"}, + {file = "pydantic_core-2.16.3-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:aaf09e615a0bf98d406657e0008e4a8701b11481840be7d31755dc9f97c44053"}, + {file = "pydantic_core-2.16.3-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:8e47755d8152c1ab5b55928ab422a76e2e7b22b5ed8e90a7d584268dd49e9c6b"}, + {file = "pydantic_core-2.16.3-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:500960cb3a0543a724a81ba859da816e8cf01b0e6aaeedf2c3775d12ee49cade"}, + {file = "pydantic_core-2.16.3-cp312-cp312-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:cf6204fe865da605285c34cf1172879d0314ff267b1c35ff59de7154f35fdc2e"}, + {file = "pydantic_core-2.16.3-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:d33dd21f572545649f90c38c227cc8631268ba25c460b5569abebdd0ec5974ca"}, + {file = "pydantic_core-2.16.3-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:49d5d58abd4b83fb8ce763be7794d09b2f50f10aa65c0f0c1696c677edeb7cbf"}, + {file = "pydantic_core-2.16.3-cp312-none-win32.whl", hash = "sha256:f53aace168a2a10582e570b7736cc5bef12cae9cf21775e3eafac597e8551fbe"}, + {file = "pydantic_core-2.16.3-cp312-none-win_amd64.whl", hash = "sha256:0d32576b1de5a30d9a97f300cc6a3f4694c428d956adbc7e6e2f9cad279e45ed"}, + {file = "pydantic_core-2.16.3-cp312-none-win_arm64.whl", hash = "sha256:ec08be75bb268473677edb83ba71e7e74b43c008e4a7b1907c6d57e940bf34b6"}, + {file = "pydantic_core-2.16.3-cp38-cp38-macosx_10_12_x86_64.whl", hash = "sha256:b1f6f5938d63c6139860f044e2538baeee6f0b251a1816e7adb6cbce106a1f01"}, + {file = "pydantic_core-2.16.3-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:2a1ef6a36fdbf71538142ed604ad19b82f67b05749512e47f247a6ddd06afdc7"}, + {file = "pydantic_core-2.16.3-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:704d35ecc7e9c31d48926150afada60401c55efa3b46cd1ded5a01bdffaf1d48"}, + {file = "pydantic_core-2.16.3-cp38-cp38-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:d937653a696465677ed583124b94a4b2d79f5e30b2c46115a68e482c6a591c8a"}, + {file = "pydantic_core-2.16.3-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:c9803edf8e29bd825f43481f19c37f50d2b01899448273b3a7758441b512acf8"}, + {file = "pydantic_core-2.16.3-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:72282ad4892a9fb2da25defeac8c2e84352c108705c972db82ab121d15f14e6d"}, + {file = "pydantic_core-2.16.3-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7f752826b5b8361193df55afcdf8ca6a57d0232653494ba473630a83ba50d8c9"}, + {file = "pydantic_core-2.16.3-cp38-cp38-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:4384a8f68ddb31a0b0c3deae88765f5868a1b9148939c3f4121233314ad5532c"}, + {file = "pydantic_core-2.16.3-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:a4b2bf78342c40b3dc830880106f54328928ff03e357935ad26c7128bbd66ce8"}, + {file = "pydantic_core-2.16.3-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:13dcc4802961b5f843a9385fc821a0b0135e8c07fc3d9949fd49627c1a5e6ae5"}, + {file = "pydantic_core-2.16.3-cp38-none-win32.whl", hash = "sha256:e3e70c94a0c3841e6aa831edab1619ad5c511199be94d0c11ba75fe06efe107a"}, + {file = "pydantic_core-2.16.3-cp38-none-win_amd64.whl", hash = "sha256:ecdf6bf5f578615f2e985a5e1f6572e23aa632c4bd1dc67f8f406d445ac115ed"}, + {file = "pydantic_core-2.16.3-cp39-cp39-macosx_10_12_x86_64.whl", hash = "sha256:bda1ee3e08252b8d41fa5537413ffdddd58fa73107171a126d3b9ff001b9b820"}, + {file = "pydantic_core-2.16.3-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:21b888c973e4f26b7a96491c0965a8a312e13be108022ee510248fe379a5fa23"}, + {file = "pydantic_core-2.16.3-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:be0ec334369316fa73448cc8c982c01e5d2a81c95969d58b8f6e272884df0074"}, + {file = "pydantic_core-2.16.3-cp39-cp39-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:b5b6079cc452a7c53dd378c6f881ac528246b3ac9aae0f8eef98498a75657805"}, + {file = "pydantic_core-2.16.3-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:7ee8d5f878dccb6d499ba4d30d757111847b6849ae07acdd1205fffa1fc1253c"}, + {file = "pydantic_core-2.16.3-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:7233d65d9d651242a68801159763d09e9ec96e8a158dbf118dc090cd77a104c9"}, + {file = "pydantic_core-2.16.3-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:c6119dc90483a5cb50a1306adb8d52c66e447da88ea44f323e0ae1a5fcb14256"}, + {file = "pydantic_core-2.16.3-cp39-cp39-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:578114bc803a4c1ff9946d977c221e4376620a46cf78da267d946397dc9514a8"}, + {file = "pydantic_core-2.16.3-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:d8f99b147ff3fcf6b3cc60cb0c39ea443884d5559a30b1481e92495f2310ff2b"}, + {file = "pydantic_core-2.16.3-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:4ac6b4ce1e7283d715c4b729d8f9dab9627586dafce81d9eaa009dd7f25dd972"}, + {file = "pydantic_core-2.16.3-cp39-none-win32.whl", hash = "sha256:e7774b570e61cb998490c5235740d475413a1f6de823169b4cf94e2fe9e9f6b2"}, + {file = "pydantic_core-2.16.3-cp39-none-win_amd64.whl", hash = "sha256:9091632a25b8b87b9a605ec0e61f241c456e9248bfdcf7abdf344fdb169c81cf"}, + {file = "pydantic_core-2.16.3-pp310-pypy310_pp73-macosx_10_12_x86_64.whl", hash = "sha256:36fa178aacbc277bc6b62a2c3da95226520da4f4e9e206fdf076484363895d2c"}, + {file = "pydantic_core-2.16.3-pp310-pypy310_pp73-macosx_11_0_arm64.whl", hash = "sha256:dcca5d2bf65c6fb591fff92da03f94cd4f315972f97c21975398bd4bd046854a"}, + {file = "pydantic_core-2.16.3-pp310-pypy310_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:2a72fb9963cba4cd5793854fd12f4cfee731e86df140f59ff52a49b3552db241"}, + {file = "pydantic_core-2.16.3-pp310-pypy310_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b60cc1a081f80a2105a59385b92d82278b15d80ebb3adb200542ae165cd7d183"}, + {file = "pydantic_core-2.16.3-pp310-pypy310_pp73-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:cbcc558401de90a746d02ef330c528f2e668c83350f045833543cd57ecead1ad"}, + {file = "pydantic_core-2.16.3-pp310-pypy310_pp73-musllinux_1_1_aarch64.whl", hash = "sha256:fee427241c2d9fb7192b658190f9f5fd6dfe41e02f3c1489d2ec1e6a5ab1e04a"}, + {file = "pydantic_core-2.16.3-pp310-pypy310_pp73-musllinux_1_1_x86_64.whl", hash = "sha256:f4cb85f693044e0f71f394ff76c98ddc1bc0953e48c061725e540396d5c8a2e1"}, + {file = "pydantic_core-2.16.3-pp310-pypy310_pp73-win_amd64.whl", hash = "sha256:b29eeb887aa931c2fcef5aa515d9d176d25006794610c264ddc114c053bf96fe"}, + {file = "pydantic_core-2.16.3-pp39-pypy39_pp73-macosx_10_12_x86_64.whl", hash = "sha256:a425479ee40ff021f8216c9d07a6a3b54b31c8267c6e17aa88b70d7ebd0e5e5b"}, + {file = "pydantic_core-2.16.3-pp39-pypy39_pp73-macosx_11_0_arm64.whl", hash = "sha256:5c5cbc703168d1b7a838668998308018a2718c2130595e8e190220238addc96f"}, + {file = "pydantic_core-2.16.3-pp39-pypy39_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:99b6add4c0b39a513d323d3b93bc173dac663c27b99860dd5bf491b240d26137"}, + {file = "pydantic_core-2.16.3-pp39-pypy39_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:75f76ee558751746d6a38f89d60b6228fa174e5172d143886af0f85aa306fd89"}, + {file = "pydantic_core-2.16.3-pp39-pypy39_pp73-manylinux_2_5_i686.manylinux1_i686.whl", hash = "sha256:00ee1c97b5364b84cb0bd82e9bbf645d5e2871fb8c58059d158412fee2d33d8a"}, + {file = "pydantic_core-2.16.3-pp39-pypy39_pp73-musllinux_1_1_aarch64.whl", hash = "sha256:287073c66748f624be4cef893ef9174e3eb88fe0b8a78dc22e88eca4bc357ca6"}, + {file = "pydantic_core-2.16.3-pp39-pypy39_pp73-musllinux_1_1_x86_64.whl", hash = "sha256:ed25e1835c00a332cb10c683cd39da96a719ab1dfc08427d476bce41b92531fc"}, + {file = "pydantic_core-2.16.3-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:86b3d0033580bd6bbe07590152007275bd7af95f98eaa5bd36f3da219dcd93da"}, + {file = "pydantic_core-2.16.3.tar.gz", hash = "sha256:1cac689f80a3abab2d3c0048b29eea5751114054f032a941a32de4c852c59cad"}, ] [package.dependencies] @@ -4451,36 +4454,40 @@ typing-extensions = ">=4.6.0,<4.7.0 || >4.7.0" [[package]] name = "pydantic-extra-types" -version = "2.5.0" +version = "2.6.0" description = "Extra Pydantic types." optional = false python-versions = ">=3.8" files = [ - {file = "pydantic_extra_types-2.5.0-py3-none-any.whl", hash = "sha256:7346873019cac32061b471adf2cdac711664ddb7a6ede04219bed2da34888c4d"}, - {file = "pydantic_extra_types-2.5.0.tar.gz", hash = "sha256:46b85240093dc63ad4a8f3cab49e03d76ae0577e4f99e2bbff7d32f99d009bf9"}, + {file = "pydantic_extra_types-2.6.0-py3-none-any.whl", hash = "sha256:d291d521c2e2bf2e6f11971caf8d639518124ae26a76d2e712599e98c4ef2b2b"}, + {file = "pydantic_extra_types-2.6.0.tar.gz", hash = "sha256:e9a93cfb245158462acb76621785219f80ad112303a0a7784d2ada65e6ed6cba"}, ] [package.dependencies] pydantic = ">=2.5.2" [package.extras] -all = ["pendulum (>=3.0.0,<4.0.0)", "phonenumbers (>=8,<9)", "pycountry (>=23,<24)", "python-ulid (>=1,<2)"] +all = ["pendulum (>=3.0.0,<4.0.0)", "phonenumbers (>=8,<9)", "pycountry (>=23)", "python-ulid (>=1,<2)", "python-ulid (>=1,<3)"] [[package]] name = "pydantic-settings" -version = "2.1.0" +version = "2.2.1" description = "Settings management using Pydantic" optional = false python-versions = ">=3.8" files = [ - {file = "pydantic_settings-2.1.0-py3-none-any.whl", hash = "sha256:7621c0cb5d90d1140d2f0ef557bdf03573aac7035948109adf2574770b77605a"}, - {file = "pydantic_settings-2.1.0.tar.gz", hash = "sha256:26b1492e0a24755626ac5e6d715e9077ab7ad4fb5f19a8b7ed7011d52f36141c"}, + {file = "pydantic_settings-2.2.1-py3-none-any.whl", hash = "sha256:0235391d26db4d2190cb9b31051c4b46882d28a51533f97440867f012d4da091"}, + {file = "pydantic_settings-2.2.1.tar.gz", hash = "sha256:00b9f6a5e95553590434c0fa01ead0b216c3e10bc54ae02e37f359948643c5ed"}, ] [package.dependencies] pydantic = ">=2.3.0" python-dotenv = ">=0.21.0" +[package.extras] +toml = ["tomli (>=2.0.1)"] +yaml = ["pyyaml (>=6.0.1)"] + [[package]] name = "pydub" version = "0.25.1" @@ -4494,13 +4501,13 @@ files = [ [[package]] name = "pydyf" -version = "0.8.0" +version = "0.9.0" description = "A low-level PDF generator." optional = false python-versions = ">=3.7" files = [ - {file = "pydyf-0.8.0-py3-none-any.whl", hash = "sha256:901186a2e9f897108139426a6486f5225bdcc9b70be2ec965f25111e42f8ac5d"}, - {file = "pydyf-0.8.0.tar.gz", hash = "sha256:b22b1ef016141b54941ad66ed4e036a7bdff39c0b360993b283875c3f854dd9a"}, + {file = "pydyf-0.9.0-py3-none-any.whl", hash = "sha256:f0e447d9f69ca20cfa3ab3d17e274e26cc877bb6e36b4a83d196616a089db0dd"}, + {file = "pydyf-0.9.0.tar.gz", hash = "sha256:d5b244e8fc24119ce7bd5d51ea2d6773c0ff88aa81597db556bc440c6b880610"}, ] [package.extras] @@ -4524,42 +4531,42 @@ windows-terminal = ["colorama (>=0.4.6)"] [[package]] name = "pymupdf" -version = "1.23.25" +version = "1.23.26" description = "A high performance Python library for data extraction, analysis, conversion & manipulation of PDF (and other) documents." optional = false python-versions = ">=3.8" files = [ - {file = "PyMuPDF-1.23.25-cp310-none-macosx_10_9_x86_64.whl", hash = "sha256:6be2b20fbff40602f673fc8e60fde3e5911397f8ca9ed6aa2d15be94b12cc2c4"}, - {file = "PyMuPDF-1.23.25-cp310-none-macosx_11_0_arm64.whl", hash = "sha256:0f6923a44fbeaeefaabb2fa10955dcef3624e8826db661201951f3b3409fed32"}, - {file = "PyMuPDF-1.23.25-cp310-none-manylinux2014_aarch64.whl", hash = "sha256:8eeb2e97347586ec293fddaf61e8dfc58d6b2763406e8f7a6e45b560bf9b15a3"}, - {file = "PyMuPDF-1.23.25-cp310-none-manylinux2014_x86_64.whl", hash = "sha256:dca46799c152051697c5e88d66c17ba6d0244668d0c4dd8a2ba2d8d3cb745988"}, - {file = "PyMuPDF-1.23.25-cp310-none-win32.whl", hash = "sha256:88bfed1bd13ec84869489fc7b97381016cb8b99956073f4c3e8ac8c840bbb15a"}, - {file = "PyMuPDF-1.23.25-cp310-none-win_amd64.whl", hash = "sha256:98a78582c8a0c61b372e2bcd63dc61efc873e40b7d1f0b896a195e1a9ef9ffa7"}, - {file = "PyMuPDF-1.23.25-cp311-none-macosx_10_9_x86_64.whl", hash = "sha256:d7792810634036a745ea3eb3c4ccf2b6adab55ca9644e3352747d2b5aa5327f9"}, - {file = "PyMuPDF-1.23.25-cp311-none-macosx_11_0_arm64.whl", hash = "sha256:03bd1985b0234c3d2b8e26bb3e9ab1d2641dbada1e199b838a6bf884f35224c8"}, - {file = "PyMuPDF-1.23.25-cp311-none-manylinux2014_aarch64.whl", hash = "sha256:638fcb1f7551eb5ab582e412e204e8ded94acbbc37bc7f1e891a5dfc428881ee"}, - {file = "PyMuPDF-1.23.25-cp311-none-manylinux2014_x86_64.whl", hash = "sha256:067c88b4e6609cb7e74d98d0b0a35c11eb8e29f4fc51dc7ed1dd448b81d347c7"}, - {file = "PyMuPDF-1.23.25-cp311-none-win32.whl", hash = "sha256:a694f160d1701285cf3152951430740878d168511cd9ea0a3adcfaf3cac00322"}, - {file = "PyMuPDF-1.23.25-cp311-none-win_amd64.whl", hash = "sha256:514bcb679926b33413637b0bd73b223c90fb0d19352caf3395d0f23b1d47e8af"}, - {file = "PyMuPDF-1.23.25-cp312-none-macosx_10_9_x86_64.whl", hash = "sha256:bba342321e1b5574631894d7d34ec046605d953a23553b7d2f9c0e4d3c27254b"}, - {file = "PyMuPDF-1.23.25-cp312-none-macosx_11_0_arm64.whl", hash = "sha256:b2cb058c8229f9697deebe0574f7d95e4b9a5e295ceafd554346bbd464141e89"}, - {file = "PyMuPDF-1.23.25-cp312-none-manylinux2014_aarch64.whl", hash = "sha256:2479473b533936593428ce78499a1e9901570110ac602f03f1f3174efa0fa6a8"}, - {file = "PyMuPDF-1.23.25-cp312-none-manylinux2014_x86_64.whl", hash = "sha256:a247a4be1e43a6127ee305eae9f65767ee7519a2aa0cb1a2aa6acfd4e7fe7a9b"}, - {file = "PyMuPDF-1.23.25-cp312-none-win32.whl", hash = "sha256:b062be400bbaff6e8b17c0a8da9481e01ec935f97967e0870e9aacd7ba60a52a"}, - {file = "PyMuPDF-1.23.25-cp312-none-win_amd64.whl", hash = "sha256:b12e608761e1586a65f6e96a34417a91f814dbab29f2929b41d825ab32fab6ef"}, - {file = "PyMuPDF-1.23.25-cp38-none-macosx_10_9_x86_64.whl", hash = "sha256:ac97691c0e0e23607626d394bd660a46ea33f64921dc9288cf24daee207f9fe3"}, - {file = "PyMuPDF-1.23.25-cp38-none-macosx_11_0_arm64.whl", hash = "sha256:c0a16cda5dc9b59d494ae23bdd9c4a3db53d04f2b6390265f5c0fe6269777975"}, - {file = "PyMuPDF-1.23.25-cp38-none-manylinux2014_aarch64.whl", hash = "sha256:23d735db51722a889bb50636d161d2747f08fa0b82cc2e4a7eb8e228b25d1c4e"}, - {file = "PyMuPDF-1.23.25-cp38-none-manylinux2014_x86_64.whl", hash = "sha256:cbc1407dcf01b2e3e547b2d7643b97cc44c0950d2bb4b12c74322664c5cb37d7"}, - {file = "PyMuPDF-1.23.25-cp38-none-win32.whl", hash = "sha256:c29518701d6360beb01c25cf69a77b6426db90a9e7cd11179b3bd783c7fb4cb1"}, - {file = "PyMuPDF-1.23.25-cp38-none-win_amd64.whl", hash = "sha256:c1bb6fa9e00c846e6829dec2bee8326754adaef5c80626b99233c01923f0342c"}, - {file = "PyMuPDF-1.23.25-cp39-none-macosx_10_9_x86_64.whl", hash = "sha256:514b272bfcd897f9ae29384da04167dcdea3b13ce0f2b9099b645314355d037d"}, - {file = "PyMuPDF-1.23.25-cp39-none-macosx_11_0_arm64.whl", hash = "sha256:ef345a5b050d0869ef404845075edd5f4bd7fd99e235f4d32ce85f423779a120"}, - {file = "PyMuPDF-1.23.25-cp39-none-manylinux2014_aarch64.whl", hash = "sha256:b3ade5b349c38ddffb24f8c266fbcd7161f488c43960ff0f03f977d40d4df967"}, - {file = "PyMuPDF-1.23.25-cp39-none-manylinux2014_x86_64.whl", hash = "sha256:111d795a3e840aec2ad66beebd90a5327994ec85ed56fd68312f5463062dbbfa"}, - {file = "PyMuPDF-1.23.25-cp39-none-win32.whl", hash = "sha256:2237ce9897771f4af686cc0c81517ffb020fc1a011b95ccf5ccf05383492bd6d"}, - {file = "PyMuPDF-1.23.25-cp39-none-win_amd64.whl", hash = "sha256:251c9c321a2112716068d5ae11deedd1911d0387cbdd0ef19adb216a3adf882c"}, - {file = "PyMuPDF-1.23.25.tar.gz", hash = "sha256:eb414e92f08107f43576a1fedea28aa837220b15ad58c8e32015435fe96cc03e"}, + {file = "PyMuPDF-1.23.26-cp310-none-macosx_10_9_x86_64.whl", hash = "sha256:645a05321aecc8c45739f71f0eb574ce33138d19189582ffa5241fea3a8e2549"}, + {file = "PyMuPDF-1.23.26-cp310-none-macosx_11_0_arm64.whl", hash = "sha256:2dfc9e010669ae92fade6fb72aaea49ebe3b8dcd7ee4dcbbe50115abcaa4d3fe"}, + {file = "PyMuPDF-1.23.26-cp310-none-manylinux2014_aarch64.whl", hash = "sha256:734ee380b3abd038602be79114194a3cb74ac102b7c943bcb333104575922c50"}, + {file = "PyMuPDF-1.23.26-cp310-none-manylinux2014_x86_64.whl", hash = "sha256:b22f8d854f8196ad5b20308c1cebad3d5189ed9f0988acbafa043947ea7e6c55"}, + {file = "PyMuPDF-1.23.26-cp310-none-win32.whl", hash = "sha256:cc0f794e3466bc96b5bf79d42fbc1551428751e3fef38ebc10ac70396b676144"}, + {file = "PyMuPDF-1.23.26-cp310-none-win_amd64.whl", hash = "sha256:2eb701247d8e685a24e45899d1175f01a3ce5fc792a4431c91fbb68633b29298"}, + {file = "PyMuPDF-1.23.26-cp311-none-macosx_10_9_x86_64.whl", hash = "sha256:e2804a64bb57da414781e312fb0561f6be67658ad57ed4a73dce008b23fc70a6"}, + {file = "PyMuPDF-1.23.26-cp311-none-macosx_11_0_arm64.whl", hash = "sha256:97b40bb22e3056874634617a90e0ed24a5172cf71791b9e25d1d91c6743bc567"}, + {file = "PyMuPDF-1.23.26-cp311-none-manylinux2014_aarch64.whl", hash = "sha256:fab8833559bc47ab26ce736f915b8fc1dd37c108049b90396f7cd5e1004d7593"}, + {file = "PyMuPDF-1.23.26-cp311-none-manylinux2014_x86_64.whl", hash = "sha256:f25aafd3e7fb9d7761a22acf2b67d704f04cc36d4dc33a3773f0eb3f4ec3606f"}, + {file = "PyMuPDF-1.23.26-cp311-none-win32.whl", hash = "sha256:05e672ed3e82caca7ef02a88ace30130b1dd392a1190f03b2b58ffe7aa331400"}, + {file = "PyMuPDF-1.23.26-cp311-none-win_amd64.whl", hash = "sha256:92b3c4dd4d0491d495f333be2d41f4e1c155a409bc9d04b5ff29655dccbf4655"}, + {file = "PyMuPDF-1.23.26-cp312-none-macosx_10_9_x86_64.whl", hash = "sha256:a217689ede18cc6991b4e6a78afee8a440b3075d53b9dec4ba5ef7487d4547e9"}, + {file = "PyMuPDF-1.23.26-cp312-none-macosx_11_0_arm64.whl", hash = "sha256:42ad2b819b90ce1947e11b90ec5085889df0a2e3aa0207bc97ecacfc6157cabc"}, + {file = "PyMuPDF-1.23.26-cp312-none-manylinux2014_aarch64.whl", hash = "sha256:99607649f89a02bba7d8ebe96e2410664316adc95e9337f7dfeff6a154f93049"}, + {file = "PyMuPDF-1.23.26-cp312-none-manylinux2014_x86_64.whl", hash = "sha256:bb42d4b8407b4de7cb58c28f01449f16f32a6daed88afb41108f1aeb3552bdd4"}, + {file = "PyMuPDF-1.23.26-cp312-none-win32.whl", hash = "sha256:c40d044411615e6f0baa7d3d933b3032cf97e168c7fa77d1be8a46008c109aee"}, + {file = "PyMuPDF-1.23.26-cp312-none-win_amd64.whl", hash = "sha256:3f876533aa7f9a94bcd9a0225ce72571b7808260903fec1d95c120bc842fb52d"}, + {file = "PyMuPDF-1.23.26-cp38-none-macosx_10_9_x86_64.whl", hash = "sha256:52df831d46beb9ff494f5fba3e5d069af6d81f49abf6b6e799ee01f4f8fa6799"}, + {file = "PyMuPDF-1.23.26-cp38-none-macosx_11_0_arm64.whl", hash = "sha256:0bbb0cf6593e53524f3fc26fb5e6ead17c02c64791caec7c4afe61b677dedf80"}, + {file = "PyMuPDF-1.23.26-cp38-none-manylinux2014_aarch64.whl", hash = "sha256:5ef4360f20015673c20cf59b7e19afc97168795188c584254ed3778cde43ce77"}, + {file = "PyMuPDF-1.23.26-cp38-none-manylinux2014_x86_64.whl", hash = "sha256:d7cd88842b2e7f4c71eef4d87c98c35646b80b60e6375392d7ce40e519261f59"}, + {file = "PyMuPDF-1.23.26-cp38-none-win32.whl", hash = "sha256:6577e2f473625e2d0df5f5a3bf1e4519e94ae749733cc9937994d1b256687bfa"}, + {file = "PyMuPDF-1.23.26-cp38-none-win_amd64.whl", hash = "sha256:fbe1a3255b2cd0d769b2da2c4efdd0c0f30d4961a1aac02c0f75cf951b337aa4"}, + {file = "PyMuPDF-1.23.26-cp39-none-macosx_10_9_x86_64.whl", hash = "sha256:73fce034f2afea886a59ead2d0caedf27e2b2a8558b5da16d0286882e0b1eb82"}, + {file = "PyMuPDF-1.23.26-cp39-none-macosx_11_0_arm64.whl", hash = "sha256:b3de8618b7cb5b36db611083840b3bcf09b11a893e2d8262f4e042102c7e65de"}, + {file = "PyMuPDF-1.23.26-cp39-none-manylinux2014_aarch64.whl", hash = "sha256:879e7f5ad35709d8760ab6103c3d5dac8ab8043a856ab3653fd324af7358ee87"}, + {file = "PyMuPDF-1.23.26-cp39-none-manylinux2014_x86_64.whl", hash = "sha256:deee96c2fd415ded7b5070d8d5b2c60679aee6ed0e28ac0d2cb998060d835c2c"}, + {file = "PyMuPDF-1.23.26-cp39-none-win32.whl", hash = "sha256:9f7f4ef99dd8ac97fb0b852efa3dcbee515798078b6c79a6a13c7b1e7c5d41a4"}, + {file = "PyMuPDF-1.23.26-cp39-none-win_amd64.whl", hash = "sha256:ba9a54552c7afb9ec85432c765e2fa9a81413acfaa7d70db7c9b528297749e5b"}, + {file = "PyMuPDF-1.23.26.tar.gz", hash = "sha256:a904261b317b761b0aa2bd2c1f6cd25d25aa4258be67a90c02a878efc5dca649"}, ] [package.dependencies] @@ -4582,13 +4589,13 @@ files = [ [[package]] name = "pyparsing" -version = "3.1.1" +version = "3.1.2" description = "pyparsing module - Classes and methods to define and execute parsing grammars" optional = false python-versions = ">=3.6.8" files = [ - {file = "pyparsing-3.1.1-py3-none-any.whl", hash = "sha256:32c7c0b711493c72ff18a981d24f28aaf9c1fb7ed5e9667c9e84e3db623bdbfb"}, - {file = "pyparsing-3.1.1.tar.gz", hash = "sha256:ede28a1a32462f5a9705e07aea48001a08f7cf81a021585011deba701581a0db"}, + {file = "pyparsing-3.1.2-py3-none-any.whl", hash = "sha256:f9db75911801ed778fe61bb643079ff86601aca99fcae6345aa67292038fb742"}, + {file = "pyparsing-3.1.2.tar.gz", hash = "sha256:a1bac0ce561155ecc3ed78ca94d3c9378656ad4c94c1270de543f621420f94ad"}, ] [package.extras] @@ -4596,13 +4603,13 @@ diagrams = ["jinja2", "railroad-diagrams"] [[package]] name = "pypdf" -version = "4.0.2" +version = "4.1.0" description = "A pure-python PDF library capable of splitting, merging, cropping, and transforming PDF files" optional = false python-versions = ">=3.6" files = [ - {file = "pypdf-4.0.2-py3-none-any.whl", hash = "sha256:a62daa2a24d5a608ba1b6284dde185317ce3644f89b9ebe5314d0c5d1c9f257d"}, - {file = "pypdf-4.0.2.tar.gz", hash = "sha256:3316d9ddfcff5df67ae3cdfe8b945c432aa43e7f970bae7c2a4ab4fe129cd937"}, + {file = "pypdf-4.1.0-py3-none-any.whl", hash = "sha256:16cac912a05200099cef3f347c4c7e0aaf0a6d027603b8f9a973c0ea500dff89"}, + {file = "pypdf-4.1.0.tar.gz", hash = "sha256:01c3257ec908676efd60a4537e525b89d48e0852bc92b4e0aa4cc646feda17cc"}, ] [package.extras] @@ -4614,24 +4621,24 @@ image = ["Pillow (>=8.0.0)"] [[package]] name = "pypdfium2" -version = "4.27.0" +version = "4.28.0" description = "Python bindings to PDFium" optional = false python-versions = ">= 3.6" files = [ - {file = "pypdfium2-4.27.0-py3-none-macosx_10_13_x86_64.whl", hash = "sha256:2938f423c79b49df9057993f747e537a05b71bc2c847801ac743f27c3220d363"}, - {file = "pypdfium2-4.27.0-py3-none-macosx_11_0_arm64.whl", hash = "sha256:f396941e070bf6c245890f2ffb2cb04f39585e3cda93ebb1648f1ed0e99b921f"}, - {file = "pypdfium2-4.27.0-py3-none-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:4d593649fd787c4521f3b8e84892a070d62c19ae3dee7995f38e760e4e14c7c5"}, - {file = "pypdfium2-4.27.0-py3-none-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:abb16df75dd0ba1c92553bbc9127edce46d59008047bb68abbf002963495d561"}, - {file = "pypdfium2-4.27.0-py3-none-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:69c76670e62db707fa5374eb8c71c2e9f9e4d6518707cd47725f7c2725129f8a"}, - {file = "pypdfium2-4.27.0-py3-none-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:40fe503afef2a4c8180c75c1bb3c98eead4c60158b859c440c4c4bf4fa5b3ece"}, - {file = "pypdfium2-4.27.0-py3-none-musllinux_1_1_aarch64.whl", hash = "sha256:bfeb8337c1435ecaa584649b21b691152e06be3b01db761a2cd863fb2fdfda04"}, - {file = "pypdfium2-4.27.0-py3-none-musllinux_1_1_i686.whl", hash = "sha256:83c5c12714a5302b9947fe8fe97b003e9b934dec2529e5c10414d3ef5a3c8f19"}, - {file = "pypdfium2-4.27.0-py3-none-musllinux_1_1_x86_64.whl", hash = "sha256:c85e6f4fe5475665237da8a698e92c68339bdbc3257e2bcb325feacde5873dbc"}, - {file = "pypdfium2-4.27.0-py3-none-win32.whl", hash = "sha256:5c3413d4eeab8f2618b7af7d827dde5b7d40e752033c555e5889508b94f42090"}, - {file = "pypdfium2-4.27.0-py3-none-win_amd64.whl", hash = "sha256:597d262152e4aff36f6b2a395826c74c28977055b3b7233963cc91b243c74c78"}, - {file = "pypdfium2-4.27.0-py3-none-win_arm64.whl", hash = "sha256:ee4f4f433c9896953ef2ff8622a0912775b88380f91c6a2b8126fc5387d05620"}, - {file = "pypdfium2-4.27.0.tar.gz", hash = "sha256:1ff6ac30b98850558c0d163e37fdb868f683b1b2e8ae734072138571a0546222"}, + {file = "pypdfium2-4.28.0-py3-none-macosx_10_13_x86_64.whl", hash = "sha256:b95dcbd6320e769c81314f0042e3507f4f14c1eb954882ae26d9504a4afe843d"}, + {file = "pypdfium2-4.28.0-py3-none-macosx_11_0_arm64.whl", hash = "sha256:c6159c2751773575fe7b74bb438f5cf6ed832432eb6db2095922af60803ed911"}, + {file = "pypdfium2-4.28.0-py3-none-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:91e78c0830e1ff99461b00e3bd0f5b5242bb6b0de6f07e929cdea9d8b1cdbdce"}, + {file = "pypdfium2-4.28.0-py3-none-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:562dac267e1323a3206d87072ad1595f923b9a983ac77c8e17fe36aec0ae1b72"}, + {file = "pypdfium2-4.28.0-py3-none-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a7779fc76e4fa7ee1c1971f78e0995d5217da405167e8d6b55daa02194b4c2ae"}, + {file = "pypdfium2-4.28.0-py3-none-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:5e223f3c0b702406927baed3cd581ac19c2a8a254019035387b47ae05051dd71"}, + {file = "pypdfium2-4.28.0-py3-none-musllinux_1_1_aarch64.whl", hash = "sha256:1a647454bdc36f11264a8cbbbf8bdfd47997aa81abd2e4984965693428761c22"}, + {file = "pypdfium2-4.28.0-py3-none-musllinux_1_1_i686.whl", hash = "sha256:0a168ac8de5b3ff6b78dfef575eaeb429a64bb6da5683f8138d3a6917eba6f39"}, + {file = "pypdfium2-4.28.0-py3-none-musllinux_1_1_x86_64.whl", hash = "sha256:c999b2dc41e3050bf893252f1f9edb2af37e61d87ce17d9725975bf7bf00acaa"}, + {file = "pypdfium2-4.28.0-py3-none-win32.whl", hash = "sha256:0b7b1e1748ac72f57d3e77580adc20b23d0d644598fd83339cd2ac4e803e9ed9"}, + {file = "pypdfium2-4.28.0-py3-none-win_amd64.whl", hash = "sha256:927f9b9498d009573509b3f6f75bab2e9aaca689cac5af0afb6fbfbaa6279cc3"}, + {file = "pypdfium2-4.28.0-py3-none-win_arm64.whl", hash = "sha256:61cb7f54d6cf26e9d9b996f553f803f2658d93fcee4f76016264b268f41c9bf7"}, + {file = "pypdfium2-4.28.0.tar.gz", hash = "sha256:1f18981bcceb3a9e59c6de3e4e7e070cddc4de1f7faf419d9ad5f677b06fd909"}, ] [[package]] @@ -4739,13 +4746,13 @@ testing = ["fields", "hunter", "process-tests", "pytest-xdist", "six", "virtuale [[package]] name = "python-dateutil" -version = "2.8.2" +version = "2.9.0.post0" description = "Extensions to the standard Python datetime module" optional = false python-versions = "!=3.0.*,!=3.1.*,!=3.2.*,>=2.7" files = [ - {file = "python-dateutil-2.8.2.tar.gz", hash = "sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86"}, - {file = "python_dateutil-2.8.2-py2.py3-none-any.whl", hash = "sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9"}, + {file = "python-dateutil-2.9.0.post0.tar.gz", hash = "sha256:37dd54208da7e1cd875388217d5e00ebd4179249f90fb72437e91a35459a0ad3"}, + {file = "python_dateutil-2.9.0.post0-py2.py3-none-any.whl", hash = "sha256:a8b2bc7bffae282281c8140a97d3aa9c14da0b136dfe83f850eea9a5f7470427"}, ] [package.dependencies] @@ -4950,13 +4957,13 @@ files = [ [[package]] name = "qdrant-client" -version = "1.7.3" +version = "1.8.0" description = "Client library for the Qdrant vector search engine" optional = true python-versions = ">=3.8" files = [ - {file = "qdrant_client-1.7.3-py3-none-any.whl", hash = "sha256:b062420ba55eb847652c7d2a26404fb1986bea13aa785763024013f96a7a915c"}, - {file = "qdrant_client-1.7.3.tar.gz", hash = "sha256:7b809be892cdc5137ae80ea3335da40c06499ad0b0072b5abc6bad79da1d29fc"}, + {file = "qdrant_client-1.8.0-py3-none-any.whl", hash = "sha256:fa28d3eb64c0c57ec029c7c85c71f6c72c197f92502022655741f3632c518e29"}, + {file = "qdrant_client-1.8.0.tar.gz", hash = "sha256:2a1a3f2cbacc7adba85644cf6cfdee20401cf25764b32da479c81fb63e178d15"}, ] [package.dependencies] @@ -4969,105 +4976,105 @@ pydantic = ">=1.10.8" urllib3 = ">=1.26.14,<3" [package.extras] -fastembed = ["fastembed (==0.1.1)"] +fastembed = ["fastembed (==0.2.2)"] [[package]] name = "rapidfuzz" -version = "3.6.1" +version = "3.6.2" description = "rapid fuzzy string matching" optional = false python-versions = ">=3.8" files = [ - {file = "rapidfuzz-3.6.1-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:ac434fc71edda30d45db4a92ba5e7a42c7405e1a54cb4ec01d03cc668c6dcd40"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:2a791168e119cfddf4b5a40470620c872812042f0621e6a293983a2d52372db0"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:5a2f3e9df346145c2be94e4d9eeffb82fab0cbfee85bd4a06810e834fe7c03fa"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:23de71e7f05518b0bbeef55d67b5dbce3bcd3e2c81e7e533051a2e9401354eb0"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:d056e342989248d2bdd67f1955bb7c3b0ecfa239d8f67a8dfe6477b30872c607"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:01835d02acd5d95c1071e1da1bb27fe213c84a013b899aba96380ca9962364bc"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:ed0f712e0bb5fea327e92aec8a937afd07ba8de4c529735d82e4c4124c10d5a0"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:96cd19934f76a1264e8ecfed9d9f5291fde04ecb667faef5f33bdbfd95fe2d1f"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:e06c4242a1354cf9d48ee01f6f4e6e19c511d50bb1e8d7d20bcadbb83a2aea90"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:d73dcfe789d37c6c8b108bf1e203e027714a239e50ad55572ced3c004424ed3b"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-musllinux_1_1_ppc64le.whl", hash = "sha256:06e98ff000e2619e7cfe552d086815671ed09b6899408c2c1b5103658261f6f3"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-musllinux_1_1_s390x.whl", hash = "sha256:08b6fb47dd889c69fbc0b915d782aaed43e025df6979b6b7f92084ba55edd526"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:a1788ebb5f5b655a15777e654ea433d198f593230277e74d51a2a1e29a986283"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-win32.whl", hash = "sha256:c65f92881753aa1098c77818e2b04a95048f30edbe9c3094dc3707d67df4598b"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-win_amd64.whl", hash = "sha256:4243a9c35667a349788461aae6471efde8d8800175b7db5148a6ab929628047f"}, - {file = "rapidfuzz-3.6.1-cp310-cp310-win_arm64.whl", hash = "sha256:f59d19078cc332dbdf3b7b210852ba1f5db8c0a2cd8cc4c0ed84cc00c76e6802"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:fbc07e2e4ac696497c5f66ec35c21ddab3fc7a406640bffed64c26ab2f7ce6d6"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:40cced1a8852652813f30fb5d4b8f9b237112a0bbaeebb0f4cc3611502556764"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:82300e5f8945d601c2daaaac139d5524d7c1fdf719aa799a9439927739917460"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:edf97c321fd641fea2793abce0e48fa4f91f3c202092672f8b5b4e781960b891"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:7420e801b00dee4a344ae2ee10e837d603461eb180e41d063699fb7efe08faf0"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:060bd7277dc794279fa95522af355034a29c90b42adcb7aa1da358fc839cdb11"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:b7e3375e4f2bfec77f907680328e4cd16cc64e137c84b1886d547ab340ba6928"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:a490cd645ef9d8524090551016f05f052e416c8adb2d8b85d35c9baa9d0428ab"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:2e03038bfa66d2d7cffa05d81c2f18fd6acbb25e7e3c068d52bb7469e07ff382"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:2b19795b26b979c845dba407fe79d66975d520947b74a8ab6cee1d22686f7967"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-musllinux_1_1_ppc64le.whl", hash = "sha256:064c1d66c40b3a0f488db1f319a6e75616b2e5fe5430a59f93a9a5e40a656d15"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-musllinux_1_1_s390x.whl", hash = "sha256:3c772d04fb0ebeece3109d91f6122b1503023086a9591a0b63d6ee7326bd73d9"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:841eafba6913c4dfd53045835545ba01a41e9644e60920c65b89c8f7e60c00a9"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-win32.whl", hash = "sha256:266dd630f12696ea7119f31d8b8e4959ef45ee2cbedae54417d71ae6f47b9848"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-win_amd64.whl", hash = "sha256:d79aec8aeee02ab55d0ddb33cea3ecd7b69813a48e423c966a26d7aab025cdfe"}, - {file = "rapidfuzz-3.6.1-cp311-cp311-win_arm64.whl", hash = "sha256:484759b5dbc5559e76fefaa9170147d1254468f555fd9649aea3bad46162a88b"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-macosx_10_9_universal2.whl", hash = "sha256:b2ef4c0fd3256e357b70591ffb9e8ed1d439fb1f481ba03016e751a55261d7c1"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:588c4b20fa2fae79d60a4e438cf7133d6773915df3cc0a7f1351da19eb90f720"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:7142ee354e9c06e29a2636b9bbcb592bb00600a88f02aa5e70e4f230347b373e"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:1dfc557c0454ad22382373ec1b7df530b4bbd974335efe97a04caec936f2956a"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:03f73b381bdeccb331a12c3c60f1e41943931461cdb52987f2ecf46bfc22f50d"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:6b0ccc2ec1781c7e5370d96aef0573dd1f97335343e4982bdb3a44c133e27786"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:da3e8c9f7e64bb17faefda085ff6862ecb3ad8b79b0f618a6cf4452028aa2222"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:fde9b14302a31af7bdafbf5cfbb100201ba21519be2b9dedcf4f1048e4fbe65d"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:c1a23eee225dfb21c07f25c9fcf23eb055d0056b48e740fe241cbb4b22284379"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-musllinux_1_1_i686.whl", hash = "sha256:e49b9575d16c56c696bc7b06a06bf0c3d4ef01e89137b3ddd4e2ce709af9fe06"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-musllinux_1_1_ppc64le.whl", hash = "sha256:0a9fc714b8c290261669f22808913aad49553b686115ad0ee999d1cb3df0cd66"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-musllinux_1_1_s390x.whl", hash = "sha256:a3ee4f8f076aa92184e80308fc1a079ac356b99c39408fa422bbd00145be9854"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:f056ba42fd2f32e06b2c2ba2443594873cfccc0c90c8b6327904fc2ddf6d5799"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-win32.whl", hash = "sha256:5d82b9651e3d34b23e4e8e201ecd3477c2baa17b638979deeabbb585bcb8ba74"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-win_amd64.whl", hash = "sha256:dad55a514868dae4543ca48c4e1fc0fac704ead038dafedf8f1fc0cc263746c1"}, - {file = "rapidfuzz-3.6.1-cp312-cp312-win_arm64.whl", hash = "sha256:3c84294f4470fcabd7830795d754d808133329e0a81d62fcc2e65886164be83b"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:e19d519386e9db4a5335a4b29f25b8183a1c3f78cecb4c9c3112e7f86470e37f"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:01eb03cd880a294d1bf1a583fdd00b87169b9cc9c9f52587411506658c864d73"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:be368573255f8fbb0125a78330a1a40c65e9ba3c5ad129a426ff4289099bfb41"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:b3e5af946f419c30f5cb98b69d40997fe8580efe78fc83c2f0f25b60d0e56efb"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:f382f7ffe384ce34345e1c0b2065451267d3453cadde78946fbd99a59f0cc23c"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:be156f51f3a4f369e758505ed4ae64ea88900dcb2f89d5aabb5752676d3f3d7e"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:1936d134b6c513fbe934aeb668b0fee1ffd4729a3c9d8d373f3e404fbb0ce8a0"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:12ff8eaf4a9399eb2bebd838f16e2d1ded0955230283b07376d68947bbc2d33d"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:ae598a172e3a95df3383634589660d6b170cc1336fe7578115c584a99e0ba64d"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-musllinux_1_1_i686.whl", hash = "sha256:cd4ba4c18b149da11e7f1b3584813159f189dc20833709de5f3df8b1342a9759"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-musllinux_1_1_ppc64le.whl", hash = "sha256:0402f1629e91a4b2e4aee68043a30191e5e1b7cd2aa8dacf50b1a1bcf6b7d3ab"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-musllinux_1_1_s390x.whl", hash = "sha256:1e12319c6b304cd4c32d5db00b7a1e36bdc66179c44c5707f6faa5a889a317c0"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:0bbfae35ce4de4c574b386c43c78a0be176eeddfdae148cb2136f4605bebab89"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-win32.whl", hash = "sha256:7fec74c234d3097612ea80f2a80c60720eec34947066d33d34dc07a3092e8105"}, - {file = "rapidfuzz-3.6.1-cp38-cp38-win_amd64.whl", hash = "sha256:a553cc1a80d97459d587529cc43a4c7c5ecf835f572b671107692fe9eddf3e24"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:757dfd7392ec6346bd004f8826afb3bf01d18a723c97cbe9958c733ab1a51791"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:2963f4a3f763870a16ee076796be31a4a0958fbae133dbc43fc55c3968564cf5"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:d2f0274595cc5b2b929c80d4e71b35041104b577e118cf789b3fe0a77b37a4c5"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:42f211e366e026de110a4246801d43a907cd1a10948082f47e8a4e6da76fef52"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a59472b43879012b90989603aa5a6937a869a72723b1bf2ff1a0d1edee2cc8e6"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:a03863714fa6936f90caa7b4b50ea59ea32bb498cc91f74dc25485b3f8fccfe9"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:5dd95b6b7bfb1584f806db89e1e0c8dbb9d25a30a4683880c195cc7f197eaf0c"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7183157edf0c982c0b8592686535c8b3e107f13904b36d85219c77be5cefd0d8"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:ad9d74ef7c619b5b0577e909582a1928d93e07d271af18ba43e428dc3512c2a1"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:b53137d81e770c82189e07a8f32722d9e4260f13a0aec9914029206ead38cac3"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-musllinux_1_1_ppc64le.whl", hash = "sha256:49b9ed2472394d306d5dc967a7de48b0aab599016aa4477127b20c2ed982dbf9"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-musllinux_1_1_s390x.whl", hash = "sha256:dec307b57ec2d5054d77d03ee4f654afcd2c18aee00c48014cb70bfed79597d6"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:4381023fa1ff32fd5076f5d8321249a9aa62128eb3f21d7ee6a55373e672b261"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-win32.whl", hash = "sha256:8d7a072f10ee57c8413c8ab9593086d42aaff6ee65df4aa6663eecdb7c398dca"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-win_amd64.whl", hash = "sha256:ebcfb5bfd0a733514352cfc94224faad8791e576a80ffe2fd40b2177bf0e7198"}, - {file = "rapidfuzz-3.6.1-cp39-cp39-win_arm64.whl", hash = "sha256:1c47d592e447738744905c18dda47ed155620204714e6df20eb1941bb1ba315e"}, - {file = "rapidfuzz-3.6.1-pp38-pypy38_pp73-macosx_10_9_x86_64.whl", hash = "sha256:eef8b346ab331bec12bbc83ac75641249e6167fab3d84d8f5ca37fd8e6c7a08c"}, - {file = "rapidfuzz-3.6.1-pp38-pypy38_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:53251e256017e2b87f7000aee0353ba42392c442ae0bafd0f6b948593d3f68c6"}, - {file = "rapidfuzz-3.6.1-pp38-pypy38_pp73-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:6dede83a6b903e3ebcd7e8137e7ff46907ce9316e9d7e7f917d7e7cdc570ee05"}, - {file = "rapidfuzz-3.6.1-pp38-pypy38_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:8e4da90e4c2b444d0a171d7444ea10152e07e95972bb40b834a13bdd6de1110c"}, - {file = "rapidfuzz-3.6.1-pp38-pypy38_pp73-win_amd64.whl", hash = "sha256:ca3dfcf74f2b6962f411c33dd95b0adf3901266e770da6281bc96bb5a8b20de9"}, - {file = "rapidfuzz-3.6.1-pp39-pypy39_pp73-macosx_10_9_x86_64.whl", hash = "sha256:bcc957c0a8bde8007f1a8a413a632a1a409890f31f73fe764ef4eac55f59ca87"}, - {file = "rapidfuzz-3.6.1-pp39-pypy39_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:692c9a50bea7a8537442834f9bc6b7d29d8729a5b6379df17c31b6ab4df948c2"}, - {file = "rapidfuzz-3.6.1-pp39-pypy39_pp73-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:76c23ceaea27e790ddd35ef88b84cf9d721806ca366199a76fd47cfc0457a81b"}, - {file = "rapidfuzz-3.6.1-pp39-pypy39_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:2b155e67fff215c09f130555002e42f7517d0ea72cbd58050abb83cb7c880cec"}, - {file = "rapidfuzz-3.6.1-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:3028ee8ecc48250607fa8a0adce37b56275ec3b1acaccd84aee1f68487c8557b"}, - {file = "rapidfuzz-3.6.1.tar.gz", hash = "sha256:35660bee3ce1204872574fa041c7ad7ec5175b3053a4cb6e181463fc07013de7"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:a5637e6bf11b15b5aff6ee818c76bdec99ad208511b78985e6209ba648a6e3ee"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:380586664f2f63807050ddb95e7702888b4f0b425abf17655940c411f39287ad"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:3168ff565d4b8c239cf11fb604dd2507d30e9bcaac76a4077c0ac23cf2c866ed"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:be69f7fd46b5c6467fe5e2fd4cff3816b0c03048eed8a4becb9a73e6000960e7"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:cbd5894f23fdf5697499cf759523639838ac822bd1600e343fdce7313baa02ae"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:85a5b6e026393fe39fb61146b9c17c5af66fffbe1410e992c4bb06d9ec327bd3"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:ab269adfc64480f209e99f253391a10735edd5c09046e04899adab5fb132f20e"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:35aeac852bca06023d6bbd50c1fc504ca5a9a3613d5e75a140f0be7601fa34ef"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-musllinux_1_1_aarch64.whl", hash = "sha256:e706f302c6a3ae0d74edd0d6ace46aee1ae07c563b436ccf5ff04db2b3571e60"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-musllinux_1_1_i686.whl", hash = "sha256:bec353f022011e6e5cd28ccb8700fbd2a33918197af0d4e0abb3c3f4845cc864"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-musllinux_1_1_ppc64le.whl", hash = "sha256:ef3925daaa93eed20401012e219f569ff0c039ed5bf4ce2d3737b4f75d441622"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-musllinux_1_1_s390x.whl", hash = "sha256:6ee98d88ae9ccc77ff61992ed33b2496478def5dc0da55c9a9aa06fcb725a352"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-musllinux_1_1_x86_64.whl", hash = "sha256:423c7c588b09d618601097b7a0017dfcb91132a2076bef29023c5f3cd2dc3de1"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-win32.whl", hash = "sha256:c17c5efee347a40a6f4c1eec59e3d7d1e22f7613a97f8b8a07733ef723483a04"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-win_amd64.whl", hash = "sha256:4209816626d8d6ff8ae7dc248061c6059e618b70c6e6f6e4d7444ae3740b2b85"}, + {file = "rapidfuzz-3.6.2-cp310-cp310-win_arm64.whl", hash = "sha256:1c54d3c85e522d3ac9ee39415f183c8fa184c4f87e7e5a37938f15a6d50e853a"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:e06f6d270112f5db001f1cba5a97e1a48aee3d3dbdcbea3ec027c230462dbf9b"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:080cb71b50cb6aff11d1c6aeb157f273e2da0b2bdb3f9d7b01257e49e69a8576"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:a7895e04a22d6515bc91a850e0831f2405547605aa311d1ffec51e4818abc3c1"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:bd82f9838519136b7083dd1e3149ee80344521f3dc37f744f227505ff0883efb"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:a945567c2b0b6e069454c9782d5234b0b6795718adf7a9f868bd3144afa6a023"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:673ba2c343644805acdae1cb949c6a4de71aa2f62a998978551ebea59603af3f"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:9d457c89bac1471442002e70551e8268e639b3870b4a4521eae363c07253be87"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:495c0d8e14e6f12520eb7fc71b9ba9fcaafb47fc23a654e6e89b6c7985ec0020"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-musllinux_1_1_aarch64.whl", hash = "sha256:6d67b649bf3e1b1722d04eca44d37919aef88305ce7ad05564502d013cf550fd"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-musllinux_1_1_i686.whl", hash = "sha256:e48dde8ca83d11daa00900cf6a5d281a1297aef9b7bfa73801af6e8822be5019"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-musllinux_1_1_ppc64le.whl", hash = "sha256:824cc381cf81cbf8d158f6935664ec2a69e6ac3b1d39fa201988bf81a257f775"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-musllinux_1_1_s390x.whl", hash = "sha256:1dfe4c24957474ce0ac75d886387e30e292b4be39228a6d71f76de414dc187db"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-musllinux_1_1_x86_64.whl", hash = "sha256:d57b98013b802621bbc8b12a46bfc9d36ac552ab51ca207f7ce167ad46adabeb"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-win32.whl", hash = "sha256:9a07dffac439223b4f1025dbfc68f4445a3460a859309c9858c2a3fa29617cdc"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-win_amd64.whl", hash = "sha256:95a49c6b8bf1229743ae585dd5b7d57f0d15a7eb6e826866d5c9965ba958503c"}, + {file = "rapidfuzz-3.6.2-cp311-cp311-win_arm64.whl", hash = "sha256:af7c19ec86e11488539380d3db1755be5d561a3c0e7b04ff9d07abd7f9a8e9d8"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-macosx_10_9_universal2.whl", hash = "sha256:de8adc12161bf282c60f12dc9233bb31632f71d446a010fe7469a69b8153427f"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:337e357f693130c4c6be740652542b260e36f622c59e01fa33d58f1d2750c930"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:6468f8bc8c3c50604f43631550ef9cfec873515dba5023ca34d461be94669fc8"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:74c6773b11445b5e5cf93ca383171cd0ac0cdeafea11a7b2a5688f8bf8d813e6"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:e1507fc5769aa109dda4de3a15f822a0f6a03e18d627bd0ba3ddbb253cf70e07"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:617949a70150e6fffdaed19253dd49f7a53528411dc8bf7663d499ba21e0f61e"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:f8b77779174b1b40aa70827692571ab457061897846255ad7d5d559e2edb1932"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:80e51b22a7da83f9c87a97e92df07ed0612c74c35496590255f4b5d5b4212dfe"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-musllinux_1_1_aarch64.whl", hash = "sha256:3ae7c86914cb6673e97e187ba431b9c4cf4177d9ae77f8a1e5b2ba9a5628839e"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-musllinux_1_1_i686.whl", hash = "sha256:ddc380ffaa90f204cc9ddcb779114b9ab6f015246d549de9d47871a97ef9f18a"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-musllinux_1_1_ppc64le.whl", hash = "sha256:3c1dc078ef371fce09f9f3eec2ca4eaa2a8cd412ec53941015b4f39f14d34407"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-musllinux_1_1_s390x.whl", hash = "sha256:9a74102fc5a2534fe91f7507838623e1f3a149d8e05648389c42bb42e14b1c3f"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-musllinux_1_1_x86_64.whl", hash = "sha256:48e1eaea8fcd522fca7f04f0480663f0f0cfb77957092cce60a93f4462864996"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-win32.whl", hash = "sha256:66b008bf2972740cd2dda5d382eb8bdb87265cd88198e71c7797bdc0d1f79d20"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-win_amd64.whl", hash = "sha256:87ac3a87f2251ae2e95fc9478ca5c759de6d141d04c84d3fec9f9cdcfc167b33"}, + {file = "rapidfuzz-3.6.2-cp312-cp312-win_arm64.whl", hash = "sha256:b593cc51aed887e93b78c2f94dfae9008be2b23d17afd3b1f1d3eb3913b58f26"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:7d830bc7a9b586a374147ec60b08b1f9ae5996b43f75cc514f37faef3866b519"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:dbee7f5ff11872b76505cbd87c814abc823e8757f11c69062eb3b25130a283da"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:28c011fb31f2c3f82f503aedd6097d3d3854e574e327a119a3b7eb2cf90b79ca"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:cda81d0e0ce0c13abfa46b24e10c1e85f9c6acb628f0a9a948f5779f9c2076a2"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:4c279928651ce0e9e5220dcb25a00cc53b65e592a0861336a38299bcdca3a596"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:35bd4bc9c40e6994c5d6edea4b9319388b4d9711c13c66d543bb4c37624b4184"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:d07899506a5a8760448d9df036d528b55a554bf571714173635c79eef4a86e58"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:eb2e51d01b9c6d6954a3e055c57a80d4685b4fc82719db5519fc153566bcd6bb"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-musllinux_1_1_aarch64.whl", hash = "sha256:153d065e353371cc0aeff32b99999a5758266a64e958d1364189367c1c9f6814"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-musllinux_1_1_i686.whl", hash = "sha256:4edcceebb85ebfa49a3ddcde20ad891d36c08dc0fd592efdab0e7d313a4e36af"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-musllinux_1_1_ppc64le.whl", hash = "sha256:3549123fca5bb817341025f98e8e49ca99f84596c7c4f92b658f8e5836040d4a"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-musllinux_1_1_s390x.whl", hash = "sha256:84c1032ae42628465b7a5cc35249906061e18a8193c9c27cbd2db54e9823a9a6"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-musllinux_1_1_x86_64.whl", hash = "sha256:9bcc91ebd8fc69a6bd3b5711c8250f5f4e70606b4da75ef415f57ad209978205"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-win32.whl", hash = "sha256:f3a70f341c4c111bad910d2df69c78577a98af140319a996af24c9385939335d"}, + {file = "rapidfuzz-3.6.2-cp38-cp38-win_amd64.whl", hash = "sha256:354ad5fe655beb7b279390cb58334903931c5452ecbad1b1666ffb06786498e2"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:1b86b93d93020c2b3edc1665d75c8855784845fc0a739b312c26c3a4bf0c80d5"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:28243086ed0e50808bb56632e5442c457241646aeafafd501ac87901f40a3237"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:ed52461ae5a9ea4c400d38e2649c74a413f1a6d8fb8308b66f1fbd122514732f"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:2a46220f86a5f9cb016af31525e0d0865cad437d02239aa0d8aed2ab8bff1f1c"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:81a630ed2fc3ec5fc7400eb66bab1f87e282b4d47f0abe3e48c6634dfa13b5e4"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:d8e5a437b9089df6242a718d9c31ab1742989e9400a0977af012ef483b63b4c2"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:16270b5529de83b7bae7457e952e4d9cf3fbf029a837dd32d415bb9e0eb8e599"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:5378c04102c7f084cde30a100154fa6d7e2baf0d51a6bdd2f912545559c1fb35"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-musllinux_1_1_aarch64.whl", hash = "sha256:7f18397c8d6a65fc0b288d2fc29bc7baeea6ba91eeb95163a3cd98f23cd3bc85"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-musllinux_1_1_i686.whl", hash = "sha256:2acd2514defce81e6ff4bbff50252d5e7df8e85a731442c4b83e44c86cf1c916"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-musllinux_1_1_ppc64le.whl", hash = "sha256:1df2faf80201952e252413b6fac6f3e146080dcebb87bb1bb722508e67558ed8"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-musllinux_1_1_s390x.whl", hash = "sha256:6440ed0b3007c1c9286b0b88fe2ab2d9e83edd60cd62293b3dfabb732b4e8a30"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-musllinux_1_1_x86_64.whl", hash = "sha256:4fcfa23b5553b27f4016df77c53172ea743454cf12c28cfa7c35a309a2be93b3"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-win32.whl", hash = "sha256:2d580d937146e803c8e5e1b87916cab8d6f84013b6392713e201efcda335c7d8"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-win_amd64.whl", hash = "sha256:fe2a68be734e8e88af23385c68d6467e15818b6b1df1cbfebf7bff577226c957"}, + {file = "rapidfuzz-3.6.2-cp39-cp39-win_arm64.whl", hash = "sha256:6478f7803efebf5f644d0b758439c5b25728550fdfbb19783d150004c46a75a9"}, + {file = "rapidfuzz-3.6.2-pp38-pypy38_pp73-macosx_10_9_x86_64.whl", hash = "sha256:36ce7b68a7b90b787cdd73480a68d2f1ca63c31a3a9d5a79a8736f978e1e9344"}, + {file = "rapidfuzz-3.6.2-pp38-pypy38_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:53597fd72a9340bcdd80d3620f4957c2b92f9b569313b969a3abdaffd193aae6"}, + {file = "rapidfuzz-3.6.2-pp38-pypy38_pp73-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:d4f6de745fe6ce46a422d353ee10599013631d7d714a36d025f164b2d4e8c000"}, + {file = "rapidfuzz-3.6.2-pp38-pypy38_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:62df2136068e2515ed8beb01756381ff62c29384d785e3bf46e3111d4ea3ba1e"}, + {file = "rapidfuzz-3.6.2-pp38-pypy38_pp73-win_amd64.whl", hash = "sha256:7382c90170f60c846c81a07ddd80bb2e8c43c8383754486fa37f67391a571897"}, + {file = "rapidfuzz-3.6.2-pp39-pypy39_pp73-macosx_10_9_x86_64.whl", hash = "sha256:f31314fd2e2f3dc3e519e6f93669462ce7953df2def1c344aa8f5345976d0eb2"}, + {file = "rapidfuzz-3.6.2-pp39-pypy39_pp73-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:012221629d54d3bee954148247f711eb86d4d390b589ebfe03172ea0b37a7531"}, + {file = "rapidfuzz-3.6.2-pp39-pypy39_pp73-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:d41dd59a70decfce6595315367a2fea2af660d92a9d144acc6479030501014d7"}, + {file = "rapidfuzz-3.6.2-pp39-pypy39_pp73-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:7f9fa14136a5b0cba1ec42531f7c3e0b0d3edb7fd6bc5e5ae7b498541f3855ab"}, + {file = "rapidfuzz-3.6.2-pp39-pypy39_pp73-win_amd64.whl", hash = "sha256:259364199cbfeca33b1af369fc7951f71717aa285184a3fa5a7b1772da1b89db"}, + {file = "rapidfuzz-3.6.2.tar.gz", hash = "sha256:cf911e792ab0c431694c9bf2648afabfd92099103f2e31492893e078ddca5e1a"}, ] [package.extras] @@ -5075,13 +5082,13 @@ full = ["numpy"] [[package]] name = "referencing" -version = "0.33.0" +version = "0.34.0" description = "JSON Referencing + Python" optional = true python-versions = ">=3.8" files = [ - {file = "referencing-0.33.0-py3-none-any.whl", hash = "sha256:39240f2ecc770258f28b642dd47fd74bc8b02484de54e1882b74b35ebd779bd5"}, - {file = "referencing-0.33.0.tar.gz", hash = "sha256:c775fedf74bc0f9189c2a3be1c12fd03e8c23f4d371dce795df44e06c5b412f7"}, + {file = "referencing-0.34.0-py3-none-any.whl", hash = "sha256:d53ae300ceddd3169f1ffa9caf2cb7b769e92657e4fafb23d34b93679116dfd4"}, + {file = "referencing-0.34.0.tar.gz", hash = "sha256:5773bd84ef41799a5a8ca72dc34590c041eb01bf9aa02632b4a973fb0181a844"}, ] [package.dependencies] @@ -5213,13 +5220,13 @@ use-chardet-on-py3 = ["chardet (>=3.0.2,<6)"] [[package]] name = "requests-oauthlib" -version = "1.3.1" +version = "1.4.0" description = "OAuthlib authentication support for Requests." optional = true python-versions = ">=2.7, !=3.0.*, !=3.1.*, !=3.2.*, !=3.3.*" files = [ - {file = "requests-oauthlib-1.3.1.tar.gz", hash = "sha256:75beac4a47881eeb94d5ea5d6ad31ef88856affe2332b9aafb52c6452ccf0d7a"}, - {file = "requests_oauthlib-1.3.1-py2.py3-none-any.whl", hash = "sha256:2577c501a2fb8d05a304c09d090d6e47c306fef15809d102b327cf8364bddab5"}, + {file = "requests-oauthlib-1.4.0.tar.gz", hash = "sha256:acee623221e4a39abcbb919312c8ff04bd44e7e417087fb4bd5e2a2f53d5e79a"}, + {file = "requests_oauthlib-1.4.0-py2.py3-none-any.whl", hash = "sha256:7a3130d94a17520169e38db6c8d75f2c974643788465ecc2e4b36d288bf13033"}, ] [package.dependencies] @@ -5231,13 +5238,13 @@ rsa = ["oauthlib[signedtoken] (>=3.0.0)"] [[package]] name = "rich" -version = "13.7.0" +version = "13.7.1" description = "Render rich text, tables, progress bars, syntax highlighting, markdown and more to the terminal" optional = true python-versions = ">=3.7.0" files = [ - {file = "rich-13.7.0-py3-none-any.whl", hash = "sha256:6da14c108c4866ee9520bbffa71f6fe3962e193b7da68720583850cd4548e235"}, - {file = "rich-13.7.0.tar.gz", hash = "sha256:5cb5123b5cf9ee70584244246816e9114227e0b98ad9176eede6ad54bf5403fa"}, + {file = "rich-13.7.1-py3-none-any.whl", hash = "sha256:4edbae314f59eb482f54e9e30bf00d33350aaa94f4bfcd4e9e3110e64d0d7222"}, + {file = "rich-13.7.1.tar.gz", hash = "sha256:9be308cb1fe2f1f57d67ce99e95af38a1e2bc71ad9813b0e247cf7ffbcc3a432"}, ] [package.dependencies] @@ -5371,39 +5378,39 @@ pyasn1 = ">=0.1.3" [[package]] name = "ruff" -version = "0.2.2" +version = "0.3.3" description = "An extremely fast Python linter and code formatter, written in Rust." optional = false python-versions = ">=3.7" files = [ - {file = "ruff-0.2.2-py3-none-macosx_10_12_x86_64.macosx_11_0_arm64.macosx_10_12_universal2.whl", hash = "sha256:0a9efb032855ffb3c21f6405751d5e147b0c6b631e3ca3f6b20f917572b97eb6"}, - {file = "ruff-0.2.2-py3-none-macosx_10_12_x86_64.whl", hash = "sha256:d450b7fbff85913f866a5384d8912710936e2b96da74541c82c1b458472ddb39"}, - {file = "ruff-0.2.2-py3-none-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:ecd46e3106850a5c26aee114e562c329f9a1fbe9e4821b008c4404f64ff9ce73"}, - {file = "ruff-0.2.2-py3-none-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:5e22676a5b875bd72acd3d11d5fa9075d3a5f53b877fe7b4793e4673499318ba"}, - {file = "ruff-0.2.2-py3-none-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:1695700d1e25a99d28f7a1636d85bafcc5030bba9d0578c0781ba1790dbcf51c"}, - {file = "ruff-0.2.2-py3-none-manylinux_2_17_ppc64.manylinux2014_ppc64.whl", hash = "sha256:b0c232af3d0bd8f521806223723456ffebf8e323bd1e4e82b0befb20ba18388e"}, - {file = "ruff-0.2.2-py3-none-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:f63d96494eeec2fc70d909393bcd76c69f35334cdbd9e20d089fb3f0640216ca"}, - {file = "ruff-0.2.2-py3-none-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:6a61ea0ff048e06de273b2e45bd72629f470f5da8f71daf09fe481278b175001"}, - {file = "ruff-0.2.2-py3-none-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:5e1439c8f407e4f356470e54cdecdca1bd5439a0673792dbe34a2b0a551a2fe3"}, - {file = "ruff-0.2.2-py3-none-musllinux_1_2_aarch64.whl", hash = "sha256:940de32dc8853eba0f67f7198b3e79bc6ba95c2edbfdfac2144c8235114d6726"}, - {file = "ruff-0.2.2-py3-none-musllinux_1_2_armv7l.whl", hash = "sha256:0c126da55c38dd917621552ab430213bdb3273bb10ddb67bc4b761989210eb6e"}, - {file = "ruff-0.2.2-py3-none-musllinux_1_2_i686.whl", hash = "sha256:3b65494f7e4bed2e74110dac1f0d17dc8e1f42faaa784e7c58a98e335ec83d7e"}, - {file = "ruff-0.2.2-py3-none-musllinux_1_2_x86_64.whl", hash = "sha256:1ec49be4fe6ddac0503833f3ed8930528e26d1e60ad35c2446da372d16651ce9"}, - {file = "ruff-0.2.2-py3-none-win32.whl", hash = "sha256:d920499b576f6c68295bc04e7b17b6544d9d05f196bb3aac4358792ef6f34325"}, - {file = "ruff-0.2.2-py3-none-win_amd64.whl", hash = "sha256:cc9a91ae137d687f43a44c900e5d95e9617cb37d4c989e462980ba27039d239d"}, - {file = "ruff-0.2.2-py3-none-win_arm64.whl", hash = "sha256:c9d15fc41e6054bfc7200478720570078f0b41c9ae4f010bcc16bd6f4d1aacdd"}, - {file = "ruff-0.2.2.tar.gz", hash = "sha256:e62ed7f36b3068a30ba39193a14274cd706bc486fad521276458022f7bccb31d"}, + {file = "ruff-0.3.3-py3-none-macosx_10_12_x86_64.macosx_11_0_arm64.macosx_10_12_universal2.whl", hash = "sha256:973a0e388b7bc2e9148c7f9be8b8c6ae7471b9be37e1cc732f8f44a6f6d7720d"}, + {file = "ruff-0.3.3-py3-none-macosx_10_12_x86_64.whl", hash = "sha256:cfa60d23269d6e2031129b053fdb4e5a7b0637fc6c9c0586737b962b2f834493"}, + {file = "ruff-0.3.3-py3-none-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:1eca7ff7a47043cf6ce5c7f45f603b09121a7cc047447744b029d1b719278eb5"}, + {file = "ruff-0.3.3-py3-none-manylinux_2_17_armv7l.manylinux2014_armv7l.whl", hash = "sha256:e7d3f6762217c1da954de24b4a1a70515630d29f71e268ec5000afe81377642d"}, + {file = "ruff-0.3.3-py3-none-manylinux_2_17_i686.manylinux2014_i686.whl", hash = "sha256:b24c19e8598916d9c6f5a5437671f55ee93c212a2c4c569605dc3842b6820386"}, + {file = "ruff-0.3.3-py3-none-manylinux_2_17_ppc64.manylinux2014_ppc64.whl", hash = "sha256:5a6cbf216b69c7090f0fe4669501a27326c34e119068c1494f35aaf4cc683778"}, + {file = "ruff-0.3.3-py3-none-manylinux_2_17_ppc64le.manylinux2014_ppc64le.whl", hash = "sha256:352e95ead6964974b234e16ba8a66dad102ec7bf8ac064a23f95371d8b198aab"}, + {file = "ruff-0.3.3-py3-none-manylinux_2_17_s390x.manylinux2014_s390x.whl", hash = "sha256:8d6ab88c81c4040a817aa432484e838aaddf8bfd7ca70e4e615482757acb64f8"}, + {file = "ruff-0.3.3-py3-none-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:79bca3a03a759cc773fca69e0bdeac8abd1c13c31b798d5bb3c9da4a03144a9f"}, + {file = "ruff-0.3.3-py3-none-musllinux_1_2_aarch64.whl", hash = "sha256:2700a804d5336bcffe063fd789ca2c7b02b552d2e323a336700abb8ae9e6a3f8"}, + {file = "ruff-0.3.3-py3-none-musllinux_1_2_armv7l.whl", hash = "sha256:fd66469f1a18fdb9d32e22b79f486223052ddf057dc56dea0caaf1a47bdfaf4e"}, + {file = "ruff-0.3.3-py3-none-musllinux_1_2_i686.whl", hash = "sha256:45817af234605525cdf6317005923bf532514e1ea3d9270acf61ca2440691376"}, + {file = "ruff-0.3.3-py3-none-musllinux_1_2_x86_64.whl", hash = "sha256:0da458989ce0159555ef224d5b7c24d3d2e4bf4c300b85467b08c3261c6bc6a8"}, + {file = "ruff-0.3.3-py3-none-win32.whl", hash = "sha256:f2831ec6a580a97f1ea82ea1eda0401c3cdf512cf2045fa3c85e8ef109e87de0"}, + {file = "ruff-0.3.3-py3-none-win_amd64.whl", hash = "sha256:be90bcae57c24d9f9d023b12d627e958eb55f595428bafcb7fec0791ad25ddfc"}, + {file = "ruff-0.3.3-py3-none-win_arm64.whl", hash = "sha256:0171aab5fecdc54383993389710a3d1227f2da124d76a2784a7098e818f92d61"}, + {file = "ruff-0.3.3.tar.gz", hash = "sha256:38671be06f57a2f8aba957d9f701ea889aa5736be806f18c0cd03d6ff0cbca8d"}, ] [[package]] name = "s3transfer" -version = "0.10.0" +version = "0.10.1" description = "An Amazon S3 Transfer Manager" optional = true python-versions = ">= 3.8" files = [ - {file = "s3transfer-0.10.0-py3-none-any.whl", hash = "sha256:3cdb40f5cfa6966e812209d0994f2a4709b561c88e90cf00c2696d2df4e56b2e"}, - {file = "s3transfer-0.10.0.tar.gz", hash = "sha256:d0c8bbf672d5eebbe4e57945e23b972d963f07d82f661cabf678a5c88831595b"}, + {file = "s3transfer-0.10.1-py3-none-any.whl", hash = "sha256:ceb252b11bcf87080fb7850a224fb6e05c8a776bab8f2b64b7f25b969464839d"}, + {file = "s3transfer-0.10.1.tar.gz", hash = "sha256:5683916b4c724f799e600f41dd9e10a9ff19871bf87623cc8f491cb4f5fa0a19"}, ] [package.dependencies] @@ -5603,72 +5610,72 @@ doc = ["Sphinx", "sphinx-rtd-theme"] [[package]] name = "setuptools" -version = "69.1.0" +version = "69.2.0" description = "Easily download, build, install, upgrade, and uninstall Python packages" optional = false python-versions = ">=3.8" files = [ - {file = "setuptools-69.1.0-py3-none-any.whl", hash = "sha256:c054629b81b946d63a9c6e732bc8b2513a7c3ea645f11d0139a2191d735c60c6"}, - {file = "setuptools-69.1.0.tar.gz", hash = "sha256:850894c4195f09c4ed30dba56213bf7c3f21d86ed6bdaafb5df5972593bfc401"}, + {file = "setuptools-69.2.0-py3-none-any.whl", hash = "sha256:c21c49fb1042386df081cb5d86759792ab89efca84cf114889191cd09aacc80c"}, + {file = "setuptools-69.2.0.tar.gz", hash = "sha256:0ff4183f8f42cd8fa3acea16c45205521a4ef28f73c6391d8a25e92893134f2e"}, ] [package.extras] docs = ["furo", "jaraco.packaging (>=9.3)", "jaraco.tidelift (>=1.4)", "pygments-github-lexers (==0.0.5)", "rst.linker (>=1.9)", "sphinx (<7.2.5)", "sphinx (>=3.5)", "sphinx-favicon", "sphinx-inline-tabs", "sphinx-lint", "sphinx-notfound-page (>=1,<2)", "sphinx-reredirects", "sphinxcontrib-towncrier"] -testing = ["build[virtualenv]", "filelock (>=3.4.0)", "flake8-2020", "ini2toml[lite] (>=0.9)", "jaraco.develop (>=7.21)", "jaraco.envs (>=2.2)", "jaraco.path (>=3.2.0)", "pip (>=19.1)", "pytest (>=6)", "pytest-checkdocs (>=2.4)", "pytest-cov", "pytest-enabler (>=2.2)", "pytest-home (>=0.5)", "pytest-mypy (>=0.9.1)", "pytest-perf", "pytest-ruff (>=0.2.1)", "pytest-timeout", "pytest-xdist", "tomli-w (>=1.0.0)", "virtualenv (>=13.0.0)", "wheel"] -testing-integration = ["build[virtualenv] (>=1.0.3)", "filelock (>=3.4.0)", "jaraco.envs (>=2.2)", "jaraco.path (>=3.2.0)", "packaging (>=23.1)", "pytest", "pytest-enabler", "pytest-xdist", "tomli", "virtualenv (>=13.0.0)", "wheel"] +testing = ["build[virtualenv]", "filelock (>=3.4.0)", "importlib-metadata", "ini2toml[lite] (>=0.9)", "jaraco.develop (>=7.21)", "jaraco.envs (>=2.2)", "jaraco.path (>=3.2.0)", "mypy (==1.9)", "packaging (>=23.2)", "pip (>=19.1)", "pytest (>=6)", "pytest-checkdocs (>=2.4)", "pytest-cov", "pytest-enabler (>=2.2)", "pytest-home (>=0.5)", "pytest-mypy (>=0.9.1)", "pytest-perf", "pytest-ruff (>=0.2.1)", "pytest-timeout", "pytest-xdist (>=3)", "tomli", "tomli-w (>=1.0.0)", "virtualenv (>=13.0.0)", "wheel"] +testing-integration = ["build[virtualenv] (>=1.0.3)", "filelock (>=3.4.0)", "jaraco.envs (>=2.2)", "jaraco.path (>=3.2.0)", "packaging (>=23.2)", "pytest", "pytest-enabler", "pytest-xdist", "tomli", "virtualenv (>=13.0.0)", "wheel"] [[package]] name = "shapely" -version = "2.0.2" +version = "2.0.3" description = "Manipulation and analysis of geometric objects" optional = false python-versions = ">=3.7" files = [ - {file = "shapely-2.0.2-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:6ca8cffbe84ddde8f52b297b53f8e0687bd31141abb2c373fd8a9f032df415d6"}, - {file = "shapely-2.0.2-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:baa14fc27771e180c06b499a0a7ba697c7988c7b2b6cba9a929a19a4d2762de3"}, - {file = "shapely-2.0.2-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:36480e32c434d168cdf2f5e9862c84aaf4d714a43a8465ae3ce8ff327f0affb7"}, - {file = "shapely-2.0.2-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:4ef753200cbffd4f652efb2c528c5474e5a14341a473994d90ad0606522a46a2"}, - {file = "shapely-2.0.2-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:a9a41ff4323fc9d6257759c26eb1cf3a61ebc7e611e024e6091f42977303fd3a"}, - {file = "shapely-2.0.2-cp310-cp310-win32.whl", hash = "sha256:72b5997272ae8c25f0fd5b3b967b3237e87fab7978b8d6cd5fa748770f0c5d68"}, - {file = "shapely-2.0.2-cp310-cp310-win_amd64.whl", hash = "sha256:34eac2337cbd67650248761b140d2535855d21b969d76d76123317882d3a0c1a"}, - {file = "shapely-2.0.2-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:5b0c052709c8a257c93b0d4943b0b7a3035f87e2d6a8ac9407b6a992d206422f"}, - {file = "shapely-2.0.2-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:2d217e56ae067e87b4e1731d0dc62eebe887ced729ba5c2d4590e9e3e9fdbd88"}, - {file = "shapely-2.0.2-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:94ac128ae2ab4edd0bffcd4e566411ea7bdc738aeaf92c32a8a836abad725f9f"}, - {file = "shapely-2.0.2-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:fa3ee28f5e63a130ec5af4dc3c4cb9c21c5788bb13c15e89190d163b14f9fb89"}, - {file = "shapely-2.0.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:737dba15011e5a9b54a8302f1748b62daa207c9bc06f820cd0ad32a041f1c6f2"}, - {file = "shapely-2.0.2-cp311-cp311-win32.whl", hash = "sha256:45ac6906cff0765455a7b49c1670af6e230c419507c13e2f75db638c8fc6f3bd"}, - {file = "shapely-2.0.2-cp311-cp311-win_amd64.whl", hash = "sha256:dc9342fc82e374130db86a955c3c4525bfbf315a248af8277a913f30911bed9e"}, - {file = "shapely-2.0.2-cp312-cp312-macosx_10_9_universal2.whl", hash = "sha256:06f193091a7c6112fc08dfd195a1e3846a64306f890b151fa8c63b3e3624202c"}, - {file = "shapely-2.0.2-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:eebe544df5c018134f3c23b6515877f7e4cd72851f88a8d0c18464f414d141a2"}, - {file = "shapely-2.0.2-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:7e92e7c255f89f5cdf777690313311f422aa8ada9a3205b187113274e0135cd8"}, - {file = "shapely-2.0.2-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:be46d5509b9251dd9087768eaf35a71360de6afac82ce87c636990a0871aa18b"}, - {file = "shapely-2.0.2-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:a5533a925d8e211d07636ffc2fdd9a7f9f13d54686d00577eeb11d16f00be9c4"}, - {file = "shapely-2.0.2-cp312-cp312-win32.whl", hash = "sha256:084b023dae8ad3d5b98acee9d3bf098fdf688eb0bb9b1401e8b075f6a627b611"}, - {file = "shapely-2.0.2-cp312-cp312-win_amd64.whl", hash = "sha256:ea84d1cdbcf31e619d672b53c4532f06253894185ee7acb8ceb78f5f33cbe033"}, - {file = "shapely-2.0.2-cp37-cp37m-macosx_10_9_x86_64.whl", hash = "sha256:ed1e99702125e7baccf401830a3b94d810d5c70b329b765fe93451fe14cf565b"}, - {file = "shapely-2.0.2-cp37-cp37m-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e7d897e6bdc6bc64f7f65155dbbb30e49acaabbd0d9266b9b4041f87d6e52b3a"}, - {file = "shapely-2.0.2-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:0521d76d1e8af01e712db71da9096b484f081e539d4f4a8c97342e7971d5e1b4"}, - {file = "shapely-2.0.2-cp37-cp37m-win32.whl", hash = "sha256:5324be299d4c533ecfcfd43424dfd12f9428fd6f12cda38a4316da001d6ef0ea"}, - {file = "shapely-2.0.2-cp37-cp37m-win_amd64.whl", hash = "sha256:78128357a0cee573257a0c2c388d4b7bf13cb7dbe5b3fe5d26d45ebbe2a39e25"}, - {file = "shapely-2.0.2-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:87dc2be34ac3a3a4a319b963c507ac06682978a5e6c93d71917618b14f13066e"}, - {file = "shapely-2.0.2-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:42997ac806e4583dad51c80a32d38570fd9a3d4778f5e2c98f9090aa7db0fe91"}, - {file = "shapely-2.0.2-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:ccfd5fa10a37e67dbafc601c1ddbcbbfef70d34c3f6b0efc866ddbdb55893a6c"}, - {file = "shapely-2.0.2-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e7c95d3379ae3abb74058938a9fcbc478c6b2e28d20dace38f8b5c587dde90aa"}, - {file = "shapely-2.0.2-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:6a21353d28209fb0d8cc083e08ca53c52666e0d8a1f9bbe23b6063967d89ed24"}, - {file = "shapely-2.0.2-cp38-cp38-win32.whl", hash = "sha256:03e63a99dfe6bd3beb8d5f41ec2086585bb969991d603f9aeac335ad396a06d4"}, - {file = "shapely-2.0.2-cp38-cp38-win_amd64.whl", hash = "sha256:c6fd29fbd9cd76350bd5cc14c49de394a31770aed02d74203e23b928f3d2f1aa"}, - {file = "shapely-2.0.2-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:1f217d28ecb48e593beae20a0082a95bd9898d82d14b8fcb497edf6bff9a44d7"}, - {file = "shapely-2.0.2-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:394e5085b49334fd5b94fa89c086edfb39c3ecab7f669e8b2a4298b9d523b3a5"}, - {file = "shapely-2.0.2-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:fd3ad17b64466a033848c26cb5b509625c87d07dcf39a1541461cacdb8f7e91c"}, - {file = "shapely-2.0.2-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d41a116fcad58048d7143ddb01285e1a8780df6dc1f56c3b1e1b7f12ed296651"}, - {file = "shapely-2.0.2-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:dea9a0651333cf96ef5bb2035044e3ad6a54f87d90e50fe4c2636debf1b77abc"}, - {file = "shapely-2.0.2-cp39-cp39-win32.whl", hash = "sha256:b8eb0a92f7b8c74f9d8fdd1b40d395113f59bd8132ca1348ebcc1f5aece94b96"}, - {file = "shapely-2.0.2-cp39-cp39-win_amd64.whl", hash = "sha256:794affd80ca0f2c536fc948a3afa90bd8fb61ebe37fe873483ae818e7f21def4"}, - {file = "shapely-2.0.2.tar.gz", hash = "sha256:1713cc04c171baffc5b259ba8531c58acc2a301707b7f021d88a15ed090649e7"}, + {file = "shapely-2.0.3-cp310-cp310-macosx_10_9_universal2.whl", hash = "sha256:af7e9abe180b189431b0f490638281b43b84a33a960620e6b2e8d3e3458b61a1"}, + {file = "shapely-2.0.3-cp310-cp310-macosx_10_9_x86_64.whl", hash = "sha256:98040462b36ced9671e266b95c326b97f41290d9d17504a1ee4dc313a7667b9c"}, + {file = "shapely-2.0.3-cp310-cp310-macosx_11_0_arm64.whl", hash = "sha256:71eb736ef2843f23473c6e37f6180f90f0a35d740ab284321548edf4e55d9a52"}, + {file = "shapely-2.0.3-cp310-cp310-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:881eb9dbbb4a6419667e91fcb20313bfc1e67f53dbb392c6840ff04793571ed1"}, + {file = "shapely-2.0.3-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:f10d2ccf0554fc0e39fad5886c839e47e207f99fdf09547bc687a2330efda35b"}, + {file = "shapely-2.0.3-cp310-cp310-win32.whl", hash = "sha256:6dfdc077a6fcaf74d3eab23a1ace5abc50c8bce56ac7747d25eab582c5a2990e"}, + {file = "shapely-2.0.3-cp310-cp310-win_amd64.whl", hash = "sha256:64c5013dacd2d81b3bb12672098a0b2795c1bf8190cfc2980e380f5ef9d9e4d9"}, + {file = "shapely-2.0.3-cp311-cp311-macosx_10_9_universal2.whl", hash = "sha256:56cee3e4e8159d6f2ce32e421445b8e23154fd02a0ac271d6a6c0b266a8e3cce"}, + {file = "shapely-2.0.3-cp311-cp311-macosx_10_9_x86_64.whl", hash = "sha256:619232c8276fded09527d2a9fd91a7885ff95c0ff9ecd5e3cb1e34fbb676e2ae"}, + {file = "shapely-2.0.3-cp311-cp311-macosx_11_0_arm64.whl", hash = "sha256:b2a7d256db6f5b4b407dc0c98dd1b2fcf1c9c5814af9416e5498d0a2e4307a4b"}, + {file = "shapely-2.0.3-cp311-cp311-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:e45f0c8cd4583647db3216d965d49363e6548c300c23fd7e57ce17a03f824034"}, + {file = "shapely-2.0.3-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:13cb37d3826972a82748a450328fe02a931dcaed10e69a4d83cc20ba021bc85f"}, + {file = "shapely-2.0.3-cp311-cp311-win32.whl", hash = "sha256:9302d7011e3e376d25acd30d2d9e70d315d93f03cc748784af19b00988fc30b1"}, + {file = "shapely-2.0.3-cp311-cp311-win_amd64.whl", hash = "sha256:6b464f2666b13902835f201f50e835f2f153f37741db88f68c7f3b932d3505fa"}, + {file = "shapely-2.0.3-cp312-cp312-macosx_10_9_universal2.whl", hash = "sha256:e86e7cb8e331a4850e0c2a8b2d66dc08d7a7b301b8d1d34a13060e3a5b4b3b55"}, + {file = "shapely-2.0.3-cp312-cp312-macosx_10_9_x86_64.whl", hash = "sha256:c91981c99ade980fc49e41a544629751a0ccd769f39794ae913e53b07b2f78b9"}, + {file = "shapely-2.0.3-cp312-cp312-macosx_11_0_arm64.whl", hash = "sha256:bd45d456983dc60a42c4db437496d3f08a4201fbf662b69779f535eb969660af"}, + {file = "shapely-2.0.3-cp312-cp312-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:882fb1ffc7577e88c1194f4f1757e277dc484ba096a3b94844319873d14b0f2d"}, + {file = "shapely-2.0.3-cp312-cp312-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:b9f2d93bff2ea52fa93245798cddb479766a18510ea9b93a4fb9755c79474889"}, + {file = "shapely-2.0.3-cp312-cp312-win32.whl", hash = "sha256:99abad1fd1303b35d991703432c9481e3242b7b3a393c186cfb02373bf604004"}, + {file = "shapely-2.0.3-cp312-cp312-win_amd64.whl", hash = "sha256:6f555fe3304a1f40398977789bc4fe3c28a11173196df9ece1e15c5bc75a48db"}, + {file = "shapely-2.0.3-cp37-cp37m-macosx_10_9_x86_64.whl", hash = "sha256:a983cc418c1fa160b7d797cfef0e0c9f8c6d5871e83eae2c5793fce6a837fad9"}, + {file = "shapely-2.0.3-cp37-cp37m-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:18bddb8c327f392189a8d5d6b9a858945722d0bb95ccbd6a077b8e8fc4c7890d"}, + {file = "shapely-2.0.3-cp37-cp37m-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:442f4dcf1eb58c5a4e3428d88e988ae153f97ab69a9f24e07bf4af8038536325"}, + {file = "shapely-2.0.3-cp37-cp37m-win32.whl", hash = "sha256:31a40b6e3ab00a4fd3a1d44efb2482278642572b8e0451abdc8e0634b787173e"}, + {file = "shapely-2.0.3-cp37-cp37m-win_amd64.whl", hash = "sha256:59b16976c2473fec85ce65cc9239bef97d4205ab3acead4e6cdcc72aee535679"}, + {file = "shapely-2.0.3-cp38-cp38-macosx_10_9_universal2.whl", hash = "sha256:705efbce1950a31a55b1daa9c6ae1c34f1296de71ca8427974ec2f27d57554e3"}, + {file = "shapely-2.0.3-cp38-cp38-macosx_10_9_x86_64.whl", hash = "sha256:601c5c0058a6192df704cb889439f64994708563f57f99574798721e9777a44b"}, + {file = "shapely-2.0.3-cp38-cp38-macosx_11_0_arm64.whl", hash = "sha256:f24ecbb90a45c962b3b60d8d9a387272ed50dc010bfe605f1d16dfc94772d8a1"}, + {file = "shapely-2.0.3-cp38-cp38-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:d8c2a2989222c6062f7a0656e16276c01bb308bc7e5d999e54bf4e294ce62e76"}, + {file = "shapely-2.0.3-cp38-cp38-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:42bceb9bceb3710a774ce04908fda0f28b291323da2688f928b3f213373b5aee"}, + {file = "shapely-2.0.3-cp38-cp38-win32.whl", hash = "sha256:54d925c9a311e4d109ec25f6a54a8bd92cc03481a34ae1a6a92c1fe6729b7e01"}, + {file = "shapely-2.0.3-cp38-cp38-win_amd64.whl", hash = "sha256:300d203b480a4589adefff4c4af0b13919cd6d760ba3cbb1e56275210f96f654"}, + {file = "shapely-2.0.3-cp39-cp39-macosx_10_9_universal2.whl", hash = "sha256:083d026e97b6c1f4a9bd2a9171c7692461092ed5375218170d91705550eecfd5"}, + {file = "shapely-2.0.3-cp39-cp39-macosx_10_9_x86_64.whl", hash = "sha256:27b6e1910094d93e9627f2664121e0e35613262fc037051680a08270f6058daf"}, + {file = "shapely-2.0.3-cp39-cp39-macosx_11_0_arm64.whl", hash = "sha256:71b2de56a9e8c0e5920ae5ddb23b923490557ac50cb0b7fa752761bf4851acde"}, + {file = "shapely-2.0.3-cp39-cp39-manylinux_2_17_aarch64.manylinux2014_aarch64.whl", hash = "sha256:4d279e56bbb68d218d63f3efc80c819cedcceef0e64efbf058a1df89dc57201b"}, + {file = "shapely-2.0.3-cp39-cp39-manylinux_2_17_x86_64.manylinux2014_x86_64.whl", hash = "sha256:88566d01a30f0453f7d038db46bc83ce125e38e47c5f6bfd4c9c287010e9bf74"}, + {file = "shapely-2.0.3-cp39-cp39-win32.whl", hash = "sha256:58afbba12c42c6ed44c4270bc0e22f3dadff5656d711b0ad335c315e02d04707"}, + {file = "shapely-2.0.3-cp39-cp39-win_amd64.whl", hash = "sha256:5026b30433a70911979d390009261b8c4021ff87c7c3cbd825e62bb2ffa181bc"}, + {file = "shapely-2.0.3.tar.gz", hash = "sha256:4d65d0aa7910af71efa72fd6447e02a8e5dd44da81a983de9d736d6e6ccbe674"}, ] [package.dependencies] -numpy = ">=1.14" +numpy = ">=1.14,<2" [package.extras] docs = ["matplotlib", "numpydoc (==1.1.*)", "sphinx", "sphinx-book-theme", "sphinx-remove-toctrees"] @@ -5698,13 +5705,13 @@ files = [ [[package]] name = "sniffio" -version = "1.3.0" +version = "1.3.1" description = "Sniff out which async library your code is running under" optional = false python-versions = ">=3.7" files = [ - {file = "sniffio-1.3.0-py3-none-any.whl", hash = "sha256:eecefdce1e5bbfb7ad2eeaabf7c1eeb404d7757c379bd1f7e5cce9d8bf425384"}, - {file = "sniffio-1.3.0.tar.gz", hash = "sha256:e60305c5e5d314f5389259b7f22aaa33d8f7dee49763119234af3755c55b9101"}, + {file = "sniffio-1.3.1-py3-none-any.whl", hash = "sha256:2f6da418d1f1e0fddd844478f41680e794e6051915791a034ff65e5f100525a2"}, + {file = "sniffio-1.3.1.tar.gz", hash = "sha256:f4324edc670a0f49750a81b895f35c3adb843cca46f0530f79fc1babb23789dc"}, ] [[package]] @@ -5822,6 +5829,17 @@ anyio = ">=3.4.0,<5" [package.extras] full = ["httpx (>=0.22.0)", "itsdangerous", "jinja2", "python-multipart (>=0.0.7)", "pyyaml"] +[[package]] +name = "striprtf" +version = "0.0.26" +description = "A simple library to convert rtf to text" +optional = false +python-versions = "*" +files = [ + {file = "striprtf-0.0.26-py3-none-any.whl", hash = "sha256:8c8f9d32083cdc2e8bfb149455aa1cc5a4e0a035893bedc75db8b73becb3a1bb"}, + {file = "striprtf-0.0.26.tar.gz", hash = "sha256:fdb2bba7ac440072d1c41eab50d8d74ae88f60a8b6575c6e2c7805dc462093aa"}, +] + [[package]] name = "sympy" version = "1.12" @@ -5902,6 +5920,24 @@ requests = ">=2.26.0" [package.extras] blobfile = ["blobfile (>=2)"] +[[package]] +name = "timm" +version = "0.9.16" +description = "PyTorch Image Models" +optional = false +python-versions = ">=3.8" +files = [ + {file = "timm-0.9.16-py3-none-any.whl", hash = "sha256:bf5704014476ab011589d3c14172ee4c901fd18f9110a928019cac5be2945914"}, + {file = "timm-0.9.16.tar.gz", hash = "sha256:891e54f375d55adf31a71ab0c117761f0e472f9f3971858ecdd1e7376b7071e6"}, +] + +[package.dependencies] +huggingface_hub = "*" +pyyaml = "*" +safetensors = "*" +torch = "*" +torchvision = "*" + [[package]] name = "tinycss2" version = "1.2.1" @@ -6306,24 +6342,24 @@ test = ["black (>=22.3.0,<23.0.0)", "coverage (>=6.2,<7.0)", "isort (>=5.0.6,<6. [[package]] name = "types-pyyaml" -version = "6.0.12.12" +version = "6.0.12.20240311" description = "Typing stubs for PyYAML" optional = false -python-versions = "*" +python-versions = ">=3.8" files = [ - {file = "types-PyYAML-6.0.12.12.tar.gz", hash = "sha256:334373d392fde0fdf95af5c3f1661885fa10c52167b14593eb856289e1855062"}, - {file = "types_PyYAML-6.0.12.12-py3-none-any.whl", hash = "sha256:c05bc6c158facb0676674b7f11fe3960db4f389718e19e62bd2b84d6205cfd24"}, + {file = "types-PyYAML-6.0.12.20240311.tar.gz", hash = "sha256:a9e0f0f88dc835739b0c1ca51ee90d04ca2a897a71af79de9aec5f38cb0a5342"}, + {file = "types_PyYAML-6.0.12.20240311-py3-none-any.whl", hash = "sha256:b845b06a1c7e54b8e5b4c683043de0d9caf205e7434b3edc678ff2411979b8f6"}, ] [[package]] name = "typing-extensions" -version = "4.9.0" +version = "4.10.0" description = "Backported and Experimental Type Hints for Python 3.8+" optional = false python-versions = ">=3.8" files = [ - {file = "typing_extensions-4.9.0-py3-none-any.whl", hash = "sha256:af72aea155e91adfc61c3ae9e0e342dbc0cba726d6cba4b6c72c1f34e47291cd"}, - {file = "typing_extensions-4.9.0.tar.gz", hash = "sha256:23478f88c37f27d76ac8aee6c905017a143b0b1b886c3c9f66bc2fd94f9f5783"}, + {file = "typing_extensions-4.10.0-py3-none-any.whl", hash = "sha256:69b1a937c3a517342112fb4c6df7e72fc39a38e7891a5730ed4985b5214b5475"}, + {file = "typing_extensions-4.10.0.tar.gz", hash = "sha256:b0abd7c89e8fb96f98db18d86106ff1d90ab692004eb746cf6eda2682f91b3cb"}, ] [[package]] @@ -6439,19 +6475,20 @@ files = [ [[package]] name = "urllib3" -version = "1.26.18" +version = "2.2.1" description = "HTTP library with thread-safe connection pooling, file post, and more." optional = false -python-versions = ">=2.7, !=3.0.*, !=3.1.*, !=3.2.*, !=3.3.*, !=3.4.*, !=3.5.*" +python-versions = ">=3.8" files = [ - {file = "urllib3-1.26.18-py2.py3-none-any.whl", hash = "sha256:34b97092d7e0a3a8cf7cd10e386f401b3737364026c45e622aa02903dffe0f07"}, - {file = "urllib3-1.26.18.tar.gz", hash = "sha256:f8ecc1bba5667413457c529ab955bf8c67b45db799d159066261719e328580a0"}, + {file = "urllib3-2.2.1-py3-none-any.whl", hash = "sha256:450b20ec296a467077128bff42b73080516e71b56ff59a60a02bef2232c4fa9d"}, + {file = "urllib3-2.2.1.tar.gz", hash = "sha256:d0570876c61ab9e520d776c38acbbb5b05a776d3f9ff98a5c8fd5162a444cf19"}, ] [package.extras] -brotli = ["brotli (==1.0.9)", "brotli (>=1.0.9)", "brotlicffi (>=0.8.0)", "brotlipy (>=0.6.0)"] -secure = ["certifi", "cryptography (>=1.3.4)", "idna (>=2.0.0)", "ipaddress", "pyOpenSSL (>=0.14)", "urllib3-secure-extra"] -socks = ["PySocks (>=1.5.6,!=1.5.7,<2.0)"] +brotli = ["brotli (>=1.0.9)", "brotlicffi (>=0.8.0)"] +h2 = ["h2 (>=4,<5)"] +socks = ["pysocks (>=1.5.6,!=1.5.7,<2.0)"] +zstd = ["zstandard (>=0.18.0)"] [[package]] name = "uvicorn" @@ -6524,13 +6561,13 @@ test = ["Cython (>=0.29.36,<0.30.0)", "aiohttp (==3.9.0b0)", "aiohttp (>=3.8.1)" [[package]] name = "virtualenv" -version = "20.25.0" +version = "20.25.1" description = "Virtual Python Environment builder" optional = false python-versions = ">=3.7" files = [ - {file = "virtualenv-20.25.0-py3-none-any.whl", hash = "sha256:4238949c5ffe6876362d9c0180fc6c3a824a7b12b80604eeb8085f2ed7460de3"}, - {file = "virtualenv-20.25.0.tar.gz", hash = "sha256:bf51c0d9c7dd63ea8e44086fa1e4fb1093a31e963b86959257378aef020e1f1b"}, + {file = "virtualenv-20.25.1-py3-none-any.whl", hash = "sha256:961c026ac520bac5f69acb8ea063e8a4f071bcc9457b9c1f28f6b085c511583a"}, + {file = "virtualenv-20.25.1.tar.gz", hash = "sha256:e08e13ecdca7a0bd53798f356d5831434afa5b07b93f0abdf0797b7a06ffe197"}, ] [package.dependencies] @@ -6672,13 +6709,13 @@ anyio = ">=3.0.0" [[package]] name = "weasyprint" -version = "61.0" +version = "61.2" description = "The Awesome Document Factory" optional = false python-versions = ">=3.8" files = [ - {file = "weasyprint-61.0-py3-none-any.whl", hash = "sha256:1dd5e929389b7ebcbff3088da7af13ae7ab201dce3a2faca7832b1dd5cec60ea"}, - {file = "weasyprint-61.0.tar.gz", hash = "sha256:d91b11a05426fef1d63de826f30a80521d48c6a356455d338c2c429989fa586d"}, + {file = "weasyprint-61.2-py3-none-any.whl", hash = "sha256:76c6dc0e75e09182d5645d92c66ddf86b1b992c9420235b723fb374b584e5bf4"}, + {file = "weasyprint-61.2.tar.gz", hash = "sha256:47df6cfeeff8c6c28cf2e4caf837cde17715efe462708ada74baa2eb391b6059"}, ] [package.dependencies] @@ -6985,18 +7022,18 @@ multidict = ">=4.0" [[package]] name = "zipp" -version = "3.17.0" +version = "3.18.1" description = "Backport of pathlib-compatible object wrapper for zip files" optional = false python-versions = ">=3.8" files = [ - {file = "zipp-3.17.0-py3-none-any.whl", hash = "sha256:0e923e726174922dce09c53c59ad483ff7bbb8e572e00c7f7c46b88556409f31"}, - {file = "zipp-3.17.0.tar.gz", hash = "sha256:84e64a1c28cf7e91ed2078bb8cc8c259cb19b76942096c8d7b84947690cabaf0"}, + {file = "zipp-3.18.1-py3-none-any.whl", hash = "sha256:206f5a15f2af3dbaee80769fb7dc6f249695e940acca08dfb2a4769fe61e538b"}, + {file = "zipp-3.18.1.tar.gz", hash = "sha256:2884ed22e7d8961de1c9a05142eb69a247f120291bc0206a00a7642f09b5b715"}, ] [package.extras] -docs = ["furo", "jaraco.packaging (>=9.3)", "jaraco.tidelift (>=1.4)", "rst.linker (>=1.9)", "sphinx (<7.2.5)", "sphinx (>=3.5)", "sphinx-lint"] -testing = ["big-O", "jaraco.functools", "jaraco.itertools", "more-itertools", "pytest (>=6)", "pytest-black (>=0.3.7)", "pytest-checkdocs (>=2.4)", "pytest-cov", "pytest-enabler (>=2.2)", "pytest-ignore-flaky", "pytest-mypy (>=0.9.1)", "pytest-ruff"] +docs = ["furo", "jaraco.packaging (>=9.3)", "jaraco.tidelift (>=1.4)", "rst.linker (>=1.9)", "sphinx (>=3.5)", "sphinx-lint"] +testing = ["big-O", "jaraco.functools", "jaraco.itertools", "more-itertools", "pytest (>=6)", "pytest-checkdocs (>=2.4)", "pytest-cov", "pytest-enabler (>=2.2)", "pytest-ignore-flaky", "pytest-mypy", "pytest-ruff (>=0.2.1)"] [[package]] name = "zopfli" @@ -7072,7 +7109,6 @@ files = [ test = ["pytest"] [extras] -doctr = ["llama-index-vector-stores-postgres"] embeddings-huggingface = ["llama-index-embeddings-huggingface"] embeddings-ollama = ["llama-index-embeddings-ollama"] embeddings-openai = ["llama-index-embeddings-openai"] @@ -7090,4 +7126,4 @@ vector-stores-qdrant = ["llama-index-vector-stores-qdrant"] [metadata] lock-version = "2.0" python-versions = ">=3.11,<3.12" -content-hash = "a14366de87da18d613d49a1be25db1ea76790c7ccc9798d274b0316184c8c52b" +content-hash = "98b94c8e94a361f61d52e33c22bb62703abfa63f72f1df0256b1db3de497c05e" diff --git a/private_gpt/components/ocr_components/table_ocr_api.py b/private_gpt/components/ocr_components/table_ocr_api.py index 1c1d5aa2..cdc6bbb9 100644 --- a/private_gpt/components/ocr_components/table_ocr_api.py +++ b/private_gpt/components/ocr_components/table_ocr_api.py @@ -13,7 +13,7 @@ from private_gpt.users import models, schemas from private_gpt.users.constants.role import Role from private_gpt.components.ocr_components.table_ocr import GetOCRText from private_gpt.components.ocr_components.TextExtraction import ImageToTable -from private_gpt.server.ingest.ingest_router import common_ingest_logic, IngestResponse +from private_gpt.server.ingest.ingest_router import common_ingest_logic, IngestResponse, ingest pdf_router = APIRouter(prefix="/v1", tags=["ocr"]) @@ -80,9 +80,7 @@ async def process_pdf_ocr( ): UPLOAD_DIR = OCR_UPLOAD try: - print("The file name is: ", file.filename) pdf_path = await save_uploaded_file(file, UPLOAD_DIR) - print("The file path: ", pdf_path) ocr_doc_path = await process_images_and_generate_doc(request, pdf_path, UPLOAD_DIR) ingested_documents = await common_ingest_logic( request=request, db=db, ocr_file=ocr_doc_path, current_user=current_user, original_file=None, log_audit=log_audit, departments=departments @@ -96,6 +94,43 @@ async def process_pdf_ocr( detail=f"There was an error processing OCR: {e}" ) + +async def process_ocr( + request: Request, + pdf_path: str, +): + UPLOAD_DIR = OCR_UPLOAD + try: + ocr_doc_path = await process_images_and_generate_doc(request, pdf_path, UPLOAD_DIR) + ingested_documents = await ingest(request=request, file_path=ocr_doc_path) + return ingested_documents + except Exception as e: + print(traceback.print_exc()) + raise HTTPException( + status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, + detail=f"There was an error processing OCR: {e}" + ) + +async def process_both_ocr( + request: Request, + pdf_path: str +): + UPLOAD_DIR = OCR_UPLOAD + try: + ocr_doc_path = await process_images_and_generate_doc(request, pdf_path, UPLOAD_DIR) + ingested_ocr_documents = await ingest(request=request, file_path=ocr_doc_path) # ingest ocr + ingested_documents = await ingest(request=request, file_path=pdf_path) # ingest pdf + return ingested_documents + + except Exception as e: + print(traceback.print_exc()) + raise HTTPException( + status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, + detail=f"There was an error processing OCR: {e}" + ) + + + async def process_both( request: Request, db: Session, diff --git a/private_gpt/server/ingest/ingest_router.py b/private_gpt/server/ingest/ingest_router.py index d7123d54..7653d2ca 100644 --- a/private_gpt/server/ingest/ingest_router.py +++ b/private_gpt/server/ingest/ingest_router.py @@ -44,13 +44,13 @@ class IngestResponse(BaseModel): class DeleteFilename(BaseModel): filename: str -@ingest_router.post("/ingest", tags=["Ingestion"], deprecated=True) -def ingest(request: Request, file: UploadFile) -> IngestResponse: - """Ingests and processes a file. +# @ingest_router.post("/ingest", tags=["Ingestion"], deprecated=True) +# def ingest(request: Request, file: UploadFile) -> IngestResponse: +# """Ingests and processes a file. - Deprecated. Use ingest/file instead. - """ - return ingest_file(request, file) +# Deprecated. Use ingest/file instead. +# """ +# return ingest_file(request, file) @ingest_router.post("/ingest/file1", tags=["Ingestion"]) @@ -205,7 +205,8 @@ async def create_documents( filename=file_name, uploaded_by=current_user.id, action_type=MakerCheckerActionType.INSERT, - status=MakerCheckerStatus.PENDING + status=MakerCheckerStatus.PENDING, + doc_type_id=departments.doc_type_id, ) print("DOCUMENT CREATE: ", docs_in) document = crud.documents.create(db=db, obj_in=docs_in) @@ -298,35 +299,26 @@ async def common_ingest_logic( async def ingest(request: Request, file_path: str) -> IngestResponse: - """Ingests and processes a file, storing its chunks to be used as context. - - The context obtained from files is later used in - `/chat/completions`, `/completions`, and `/chunks` APIs. - - Most common document - formats are supported, but you may be prompted to install an extra dependency to - manage a specific file type. - - A file can generate different Documents (for example a PDF generates one Document - per page). All Documents IDs are returned in the response, together with the - extracted Metadata (which is later used to improve context retrieval). Those IDs - can be used to filter the context used to create responses in - `/chat/completions`, `/completions`, and `/chunks` APIs. - """ + """Ingests and processes a file, storing its chunks to be used as context.""" service = request.state.injector.get(IngestService) + try: with open(file_path, 'rb') as file: file_name = Path(file_path).name upload_path = Path(f"{UPLOAD_DIR}/{file_name}") - - with open(upload_path, "wb") as f: - f.write(file.file.read()) - with open(upload_path, "rb") as f: - ingested_documents = service.ingest_bin_data(file.filename, f) + + with upload_path.open('wb') as f: + f.write(file.read()) + + with upload_path.open('rb') as f: + ingested_documents = await service.ingest_bin_data(file_name, f) + except Exception as e: return {"message": f"There was an error uploading the file(s)\n {e}"} + finally: - file.file.close() + upload_path.unlink(missing_ok=True) + return IngestResponse(object="list", model="private-gpt", data=ingested_documents) diff --git a/private_gpt/server/ingest/ingest_service.py b/private_gpt/server/ingest/ingest_service.py index b370506a..c5ab0700 100644 --- a/private_gpt/server/ingest/ingest_service.py +++ b/private_gpt/server/ingest/ingest_service.py @@ -72,7 +72,7 @@ class IngestService: logger.debug("Ingesting text data with file_name=%s", file_name) return self._ingest_data(file_name, text) - def ingest_bin_data( + async def ingest_bin_data( self, file_name: str, raw_file_data: BinaryIO ) -> list[IngestedDoc]: logger.debug("Ingesting binary data with file_name=%s", file_name) diff --git a/private_gpt/users/api/v1/routers/documents.py b/private_gpt/users/api/v1/routers/documents.py index acf0a6f2..6eb14933 100644 --- a/private_gpt/users/api/v1/routers/documents.py +++ b/private_gpt/users/api/v1/routers/documents.py @@ -15,6 +15,7 @@ from private_gpt.users.constants.role import Role from private_gpt.users import crud, models, schemas from private_gpt.server.ingest.ingest_router import create_documents, ingest from private_gpt.users.models.document import MakerCheckerActionType, MakerCheckerStatus +from private_gpt.components.ocr_components.table_ocr_api import process_both_ocr, process_ocr logger = logging.getLogger(__name__) router = APIRouter(prefix='/documents', tags=['Documents']) @@ -262,7 +263,7 @@ async def upload_documents( ) -@router.post('/verify', response_model=schemas.Document) +@router.post('/verify') async def verify_documents( request: Request, checker_in: schemas.DocumentUpdate = Depends(), @@ -284,8 +285,7 @@ async def verify_documents( detail="Document not found!", ) unchecked_path = Path(f"{UNCHECKED_DIR}/{document.filename}") - print(checker_in.status) - print(MakerCheckerStatus.APPROVED.value) + if checker_in.status == MakerCheckerStatus.APPROVED.value: checker = schemas.DocumentCheckerUpdate( status=MakerCheckerStatus.APPROVED, @@ -296,9 +296,9 @@ async def verify_documents( crud.documents.update(db=db, db_obj= document, obj_in=checker) if document.doc_type_id == 2: - return await ingest(request, unchecked_path) + return await process_ocr(request, unchecked_path) elif document.doc_type_id == 3: - return await ingest(request, unchecked_path) + return await process_both_ocr(request, unchecked_path) else: return await ingest(request, unchecked_path) diff --git a/private_gpt/users/schemas/documents.py b/private_gpt/users/schemas/documents.py index 8021cd86..15a727bb 100644 --- a/private_gpt/users/schemas/documents.py +++ b/private_gpt/users/schemas/documents.py @@ -45,7 +45,7 @@ class Document(BaseModel): class DocumentMakerChecker(DocumentCreate): action_type: str status: str - + doc_type_id: int class DocumentMakerCreate(DocumentMakerChecker): pass diff --git a/pyproject.toml b/pyproject.toml index 972df9cb..7f43bc53 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -50,6 +50,8 @@ boto3 = {version ="^1.34.51", optional = true} # Optional UI gradio = {version ="^4.19.2", optional = true} +aiofiles = "^23.2.1" +timm = "^0.9.16" [tool.poetry.extras] ui = ["gradio"]