Liability for Unauthorized Use – Loss/Stolen Card Identification Sample Clauses

Liability for Unauthorized Use – Loss/Stolen Card Identification. You may be liable for the unauthorized use of your card if you do not notify us. You will not be liable for the unauthorized use that occurs after you notify the Credit Union, orally or in writing, of the loss, theft or possible unauthorized use. If you notify us, you will have no liability for unauthorized transactions. You can notify the Credit Union by calling 000- 000-0000 or 0-000-000-0000 during normal business hours or 0-000-000-0000 (which is available 24 hours a day), or writing to COPOCO Community Credit Union, 0000 Xxxxxx Xx., PO Box 1520, Bay City, MI 48706-0520.
AutoNDA by SimpleDocs
Liability for Unauthorized Use – Loss/Stolen Card Identification. You may be liable for the unauthorized use of your card if you do not notify us. You will not be liable for the unauthorized use that occurs after you notify the Credit Union, orally or in writing, of the loss, theft or possible unauthorized use. If you notify us, you will have no liability for unauthorized transactions. You can notify the Credit Union by calling (000) 000-0000 during normal business hours or (000) 000-0000 (which is available 24 hours a day), or writing to Dort Federal Credit Union, 0000 Xxxxxxx Xxxx, P.O. Box 1635, Flint, Michigan 48501-1635. 5. Finance Charge. The Finance Charges shown on your Monthly Billing Statement are figured by multiplying a Daily Periodic Rate (see Schedule of Fees and Charges for this rate and its corresponding Annual Percentage Rate) times the Daily Principal Balance of both Credit Purchases and Cash Advances as follows: a.

Related to Liability for Unauthorized Use – Loss/Stolen Card Identification

  • LIABILITY FOR UNAUTHORIZED USE-LOST/STOLEN CARD NOTIFICATION You agree to notify Credit Union immediately, orally or in writing at Florida Credit Union, X.X. Xxx 0000, Xxxxxxxxxxx, XX 00000 or telephone (000) 000-0000 twenty four

  • LIABILITY FOR UNAUTHORIZED USE If any Card is lost or stolen or otherwise may be used without your permission (express or implied), you must immediately notify us orally or in writing at the following phone number or address: 0-000-000-0000 or at TIB, National Association, P.O Box 569120, Dallas, Texas 75356-9120. If unauthorized use of a Card occurs before you notify us of the loss, theft or unauthorized use, you may be liable up to a maximum amount of $50. If unauthorized use of a Credit Device occurs, you may be liable for all of the unauthorized use.

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

  • Product Identification Before removal from Sale Area, unless Contracting Officer determines that circumstances warrant a written waiver or adjustment, Purchaser shall:

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • User Identification 6.2.5.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Additional Requirements from Authorized Users An Authorized User may have distinct requirements that must be met by all individuals employed by or working for the Authorized User. The Contractor’s Staff Members will be expected to comply with these requirements as a condition of the placement.

  • T1 IDENTIFICATION PROCEDURES During the restoration of service after a disaster, BellSouth may be forced to aggregate traffic for delivery to a CLEC. During this process, T1 traffic may be consolidated onto DS3s and may become unidentifiable to the Carrier. Because resources will be limited, BellSouth may be forced to "package" this traffic entirely differently then normally received by the CLECs. Therefore, a method for identifying the T1 traffic on the DS3s and providing the information to the Carriers is required.

  • Use of Customer Name Contractor may use County’s name without County’s prior written consent only in Contractor’s customer lists. Any other use of County’s name by Contractor must have the prior written consent of County.

Time is Money Join Law Insider Premium to draft better contracts faster.