Limitation on All Access Devices Sample Clauses

Limitation on All Access Devices. You may not use any access device, whether described in this Agreement or added in the future, for any illegal or unlawful transaction, and we may decline to authorize any transaction that we believe poses an undue risk of illegality or unlawfulness. Notwithstanding the foregoing, we may collect on any debt arising out of any illegal or unlawful transaction.
AutoNDA by SimpleDocs
Limitation on All Access Devices. You may not use any access device, whether described above or added in the future, for any illegal or unlawful transaction, and we may decline to authorize any transaction that we believe poses an undue risk of illegality or unlawfulness. Notwithstanding the foregoing, we may collect on any debt arising out of any illegal or unlawful transaction. Future Credit Line Services. Your application for this Credit Line also serves as a request to receive any new services (such as access devices) which may be available at some future time as one of our services in connection with this Credit Line. You understand that this request is voluntary and that you may refuse any of these new services at the time they are offered. You further understand that the terms and conditions of this Agreement, together with any specific terms covering the new service, will govern any transactions made pursuant to any of these new services. Collateral. This Credit Line Account is unsecured. Right of Setoff. To the extent permitted by applicable law, we reserve a right of setoff in all your accounts with us (whether checking, savings, or some other account), including without limitation, all accounts you may open in the future. However, this does not include any IRA or Xxxxx accounts, or any trust accounts for which setoff would be prohibited by law. You authorize us, to the extent permitted by applicable law, to charge or setoff all sums owing on this Agreement against any and all such accounts, and, at our option, to administratively freeze all such accounts to allow us to protect our charge and setoff rights provided in this paragraph. Periodic Statements. If you have a balance owing on your Credit Line Account or have any account activity, we will send you a periodic statement, unless prohibited by applicable law. It will show, among other things, credit advances, interest charges, fees, other charges, payments made, other credits, your "Previous Balance," and your "New Balance." Your statement also will identify the Minimum Payment you must make for that billing period and the date it is due. When Interest Begins To Accrue. Interest on credit advances under your Credit Line will begin to accrue on the date credit advances are posted to your Credit Line. There is no "grace period" which would allow you to avoid paying interest on your Credit Line credit advances. Method Used to Determine the Balance on Which Interest Will Be Computed. We figure the interest charge on your Credit L...
Limitation on All Access Devices. You may not use any access device, whether described above or added in the future, for any illegal or unlawful transaction, and we may decline to authorize any transaction that we believe poses an undue risk of illegality or unlawfulness. Notwithstanding the foregoing, we may collect on any debt arising out of any illegal or unlawful transaction. CREDIT AGREEMENT AND DISCLOSURE (CONTINUED) Loan No: Page 3 Future Credit Line Services. Borrower’s application for this Credit Line also serves as a request to receive any new services (such as access devices) which may be available at some future time as one of Lender’s services in connection with this Credit Line. Xxxxxxxx understands that this request is voluntary and that Borrower may refuse any of these new services at the time they are offered. Xxxxxxxx further understands that the terms and conditions of this Agreement, together with any specific terms covering the new service, will govern any transactions made pursuant to any of these new services.
Limitation on All Access Devices. You may not use any access device, whether described above or added in the future, for any illegal or unlawful transaction, and we may decline to authorize any transaction that we believe poses an undue risk of illegality or unlawfulness. Notwithstanding the foregoing, we may collect on any debt arising out of any illegal or unlawful transaction. Future Credit Line Services. Borrower’s application for this Credit Line also serves as a request to receive any new services (such as access devices) which may be available at some future time as one of Lender’s services in connection with this Credit Line. Borrower understands that this request is voluntary and that Borrower may refuse any of these new services at the time they are offered. Borrower further understands that the terms and conditions of this Agreement, together with any specific terms covering the new service, will govern any transactions made pursuant to any of these new services.
Limitation on All Access Devices. You may not use any access device, whether described above or added in the future, for any illegal or unlawful transaction, and we may decline to authorize any transaction that we believe poses an undue risk of illegality or unlawfulness notwithstanding the foregoing, we may collect on any debt arising out of any illegal or unlawful transaction. Future Credit Line Services. Your agreement for this Express Credit Line also serves as a request to receive any new services (such as access devices) which may be available at some future time as one of our services in connection with this Express Credit Line. You understand that this request is voluntary and that you may refuse any of these new services at the time they are offered. You further understand that the terms and conditions of this Agreement, together with any specific terms covering the new service, will govern any transactions made pursuant to any of these newservices.

Related to Limitation on All Access Devices

  • Limitation on Use Tenant shall use the Premises solely for the Permitted Use specified in Section N of the Summary. There shall not be any change in use without the prior written consent of Landlord which will not be unreasonably withheld. Tenant shall not do anything in or about the Premises which will (i) cause structural injury to the Building, or (ii) cause damage to any part of the Building except to the extent reasonably necessary for the installation of Tenant’s Trade Fixtures and Tenant’s Alterations, and then only in a manner which has been first approved by Landlord in writing. Tenant shall not operate any equipment within the Premises which will (i) materially damage the Building or the Common Area, (ii) overload existing electrical systems or other mechanical equipment servicing the Building, (iii) impair the efficient operation of the sprinkler system or the heating, ventilating or air conditioning (“HVAC”) equipment within or servicing the Building, or (iv) damage, overload or corrode the sanitary sewer system. Tenant shall not attach, hang or suspend anything from the ceiling, roof, walls or columns of the Building or set any load on the floor in excess of the load limits for which such items are designed nor operate hard wheel forklifts within the Premises. Any dust, fumes, or waste products generated by Tenant’s use of the Premises shall be contained and disposed so that they do not (i) create an unreasonable fire or health hazard, (ii) damage the Premises, or (iii) result in the violation of any Law. Except as approved by Landlord, Tenant shall not change the exterior of the Building or install any equipment or antennas on or make any penetrations of the exterior or roof of the Building. Tenant shall not commit any waste in or about the Premises, and Tenant shall keep the Premises in a neat, clean, attractive and orderly condition, free of any nuisances. If Landlord designates a standard window covering for use throughout the Building, Tenant shall use this standard window covering to cover all windows in the Premises. Tenant shall not conduct on any portion of the Premises or the Project any sale of any kind, including any public or private auction, fire sale, going-out-of-business sale, distress sale or other liquidation sale.

  • LIMITATION ON ACTIVITIES Notwithstanding any provision in this Agreement to the contrary, the Advisor shall not take any action that, in its sole judgment made in good faith, would (i) adversely affect the ability of the Company to qualify or continue to qualify as a REIT under the Code, (ii) subject the Company to regulation under the Investment Company Act of 1940, as amended, (iii) violate any law, rule, regulation or statement of policy of any governmental body or agency having jurisdiction over the Company, its Shares or its other securities, (iv) require the Advisor to register as a broker-dealer with the SEC or any state, or (v) violate the Charter or Bylaws. In the event an action that would violate (i) through (v) of the preceding sentence but such action has been ordered by the Board, the Advisor shall notify the Board of the Advisor’s judgment of the potential impact of such action and shall refrain from taking such action until it receives further clarification or instructions from the Board. In such event, the Advisor shall have no liability for acting in accordance with the specific instructions of the Board so given.

  • Limitation on Use of Information The Fund agrees neither to use the information received from the Intermediary for any purpose other than to comply with SEC Rule 22c-2 and other applicable laws, rules and regulations, nor to share the information with anyone other than its employees who legitimately need access to it. Neither the Fund nor any of its affiliates or subsidiaries may use any information provided pursuant to this Agreement for marketing or solicitation purposes. The Fund will take such steps as are reasonably necessary to ensure compliance with this obligation. The Fund shall indemnify and hold the Intermediaries, individually and collectively, (and any of their respective directors, officers, employees, or agents) harmless from any damages, loss, cost, or liability (including reasonable legal fees and the cost of enforcing this indemnity) arising out of or resulting from any unauthorized use of or disclosure by the Fund of the information received from the Intermediaries pursuant to this Agreement. In addition, because an award of money damages (whether pursuant to the foregoing sentence or otherwise) may be inadequate for any breach of this provision and any such breach may cause the Intermediaries irreparable harm, the Fund also agrees that, in the event of any breach or threatened breach of this provision, the Intermediaries will also be entitled, without the requirement of posting a bond or other security, to seek equitable relief, including injunctive relief and specific performance. Such remedies will not be the exclusive remedies for any breach of this provision but will be in addition to all other remedies available at law or in equity to the Intermediaries. In the event that the Fund is required by legal process, law, or regulation to disclose any information received from the Intermediaries pursuant to this Agreement, the Fund shall provide Intermediaries with prompt written notice of such requirement as far in advance of the proposed disclosure as possible so that the Intermediaries (at their expense) may either seek a protective order or other appropriate remedy which is necessary to protect their interests or waive compliance with this provision to the extent necessary.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code.

  • Limitation on Sales Each holder of this Warrant acknowledges that this Warrant and the Warrant Shares, as of the date of original issuance of this Warrant, have not been registered under the Securities Act of 1933, as amended ("Act"), and agrees not to sell, pledge, distribute, offer for sale, transfer or otherwise dispose of this Warrant or any Warrant Shares issued upon its exercise in the absence of (a) an effective registration statement under the Act as to this Warrant or such Warrant Shares or (b) an opinion of counsel, satisfactory to the Company, that such registration and qualification are not required. The Warrant Shares issued upon exercise thereof shall be imprinted with a legend in substantially the following form: "THE SECURITIES REPRESENTED BY THIS CERTIFICATE HAVE NOT BEEN REGISTERED UNDER THE SECURITIES ACT OF 1933, AS AMENDED (THE "ACT") OR APPLICABLE STATE SECURITIES LAWS AND MAY NOT BE OFFERED, SOLD, TRANSFERRED, PLEDGED, HYPOTHECATED, ASSIGNED OR OTHERWISE DISPOSED OF EXCEPT PURSUANT TO AN EFFECTIVE REGISTRATION STATEMENT UNDER THE ACT AND IN COMPLIANCE WITH ANY APPLICABLE STATE SECURITIES LAWS OR IN A TRANSACTION WHICH IS EXEMPT FROM REGISTRATION UNDER THE ACT AND ANY APPLICABLE STATE SECURITIES LAWS."

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Limitation on Actions 28.1 Except with respect to any indemnification obligations in Article 12, above, or as are otherwise set forth in the Contract, any arbitral proceedings in accordance with Article 23.2, above, arising out of the Contract must be commenced within three years after the cause of action has accrued.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

Time is Money Join Law Insider Premium to draft better contracts faster.