Lost or Stolen Card, Compromised PIN or Unauthorized Access to Business Account Sample Clauses

Lost or Stolen Card, Compromised PIN or Unauthorized Access to Business Account. The Card is a commercial card and does not provide consumer protections for lost or stolen Cards or unauthorized transactions. Treat the Card like cash. Until a Business Administrator or Authorized User reports a Card as lost or stolen or reports an unauthorized transaction on a Business Account or Card Account, Business Account Owner is fully responsible for all transactions, even if the Card is lost, stolen or used for unauthorized transactions. Contact Customer Service IMMEDIATELY if a Business Administrator or Authorized User believes: (a) a Card has been lost or stolen, (b) someone has gained unauthorized access to any Access Information, or (c) someone has transferred or may transfer funds from the Business Account or a Card Account without a Business Administrator’s or Authorized User’s permission. Reporting a lost/stolen Card or unauthorized transactions by calling 0-000-000-0000, by logging into the Website, or emailing xxxxxxx@xxxxxxxx.xxx to deactivate the card is the best way to minimize possible losses. Unless we have authorized a transaction after a Business Account or Card Account is blocked, Business Account Owner is responsible for all unauthorized transactions initiated and fees incurred from the unauthorized use of a Card. Failure to promptly notify us could result in the Business Account Owner losing ALL of the money in the Business Account and the associated Card Accounts.
AutoNDA by SimpleDocs

Related to Lost or Stolen Card, Compromised PIN or Unauthorized Access to Business Account

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • LIABILITY FOR UNAUTHORIZED USE-LOST/STOLEN CARD NOTIFICATION You agree to notify Credit Union immediately, orally or in writing at Florida Credit Union, X.X. Xxx 0000, Xxxxxxxxxxx, XX 00000 or telephone (000) 000-0000 twenty four

  • Additional Requirements from Authorized Users An Authorized User may have distinct requirements that must be met by all individuals employed by or working for the Authorized User. The Contractor’s Staff Members will be expected to comply with these requirements as a condition of the placement.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • CONTRACTOR STAFF WITHIN AUTHORIZED USER AGREEMENT The provisions of this section shall apply unless otherwise agreed in the Authorized User Agreement. All employees of the Contractor, or of its Subcontractors, who shall perform under an Authorized User Agreement, shall possess the necessary qualifications, training, licenses, and permits as may be required within the jurisdiction where the Services specified are to be provided or performed, and shall be legally entitled to work in such jurisdiction. All Business Entities that perform Services under the Contract on behalf of Contractor shall, in performing the Services, comply with all applicable Federal, State, and local laws concerning employment in the United States. Staffing Changes within Authorized User Agreement

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Procurement of Recovered Materials (1) In the performance of this contract, the Contractor shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired

  • PROCUREMENT OF RECOVERED MATERIAL H-GAC and the Respondent must comply with section 6002 of the Solid Waste Disposal Act, as amended by the Resource Conservation and Recovery Act. The requirements of Section 6002 include: (1) procuring only items designated in guidelines of the Environmental Protection Agency (EPA) at 40 CFR part 247 that contain the highest percentage of recovered materials practicable, consistent with maintaining a satisfactory level of competition, where the purchase price of the item exceeds $10,000 or the value of the quantity acquired during the preceding fiscal year exceeded $10,000; (2) procuring solid waste management services in a manner that maximizes energy and resource recovery; and (3) establishing an affirmative procurement program for procurement of recovered materials identified in the EPA guidelines. Pursuant to the Federal Rule above, as required by the Resource Conservation and Recovery Act of 1976 (42 U.S.C. § 6962(c)(3)(A)(i)), Respondent certifies that the percentage of recovered materials content for EPA-designated items to be delivered or used in the performance of the Contract will be at least the amount required by the applicable contract specifications or other contractual requirements. A RTICLE 40: XXXXXXXX “ANTI-KICKBACK” ACT Contractor shall comply with 18 U.S.C. § 874, 40 U.S.C. § 3145, and the requirements of 29 C.F.R. pt. 3 as may be applicable, which are incorporated by reference into the contract. The contractor or subcontractor shall insert in any subcontracts the clause above and such other clauses as appropriate agency instructions require, and also a clause requiring the subcontractors to include these clauses in any lower tier subcontracts. The prime contractor shall be responsible for the compliance by any subcontractor or lower tier subcontractor with all of these contract clauses. A breach of the contract clauses above may be grounds for termination of the Contract, and for debarment as a contractor and subcontractor as provided in 29 C.F.R. § 5.12.

  • Jointly Provided Switched Access Services 7.5.1 Jointly Provided Switched Access Service is described and governed by the FCC and state access Tariffs, Multiple Exchange Carrier Access Billing (MECAB) and Multiple Exchange Carrier Ordering and Design (MECOD) Guidelines and based on LERG routing, and is not modified by any provisions of this Agreement. Both Parties agree to comply with such guidelines. CenturyLink and CLEC agree that the originating, intermediate, and terminating LECs for switched access will cooperatively determine the Jointly Provided Switched Access arrangements in which all parties concur.

Time is Money Join Law Insider Premium to draft better contracts faster.