Unauthorised instructions Sample Clauses

Unauthorised instructions. The RSP may refuse to act on the basis of any instructions which purport to be given on behalf of an Operator or any of the bodies referred to in Clause 15-2 below if it reasonably believes that the person giving them is not authorised to do so.
AutoNDA by SimpleDocs

Related to Unauthorised instructions

  • Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.

  • Background and Instructions History of Agreement- This agreement has been drafted by the Texas Student Privacy Alliance (TXSPA). The Alliance is a collaborative group of Texas school districts that share common concerns around student and data privacy. The Texas K-12 CTO Council is the organization that sponsors the TXSPAand the TXSPA is the Texas affiliate of the national Student Data Privacy Consortium (SDPC). The SDPC works with other state alliances by helping establish common data privacy agreements unique to the jurisdiction of each state. This Texas agreement was drafted specifically for K-12 education institutions and included broad stakeholder input from Texas school districts, statewide associations such as TASB, TASA, and TASBO, and the Texas Education Agency. The purpose of this agreement is to set standards of both practice and expectations around data privacy such that all parties involved have a common understanding of expectations. This agreement also provides a mechanism (Exhibit E- General Offer of Terms) that would allow an Operator to extend the ability of other Texas school districts to be covered under the terms of the agreement should an Operator sign Exhibit E. This mechanism is intended to create efficiencies for both Operators and LEAs and generally enhance privacy practices and expectations for K-12 institutions and for companies providing services to K-12 institutions.

  • Unauthorised disclosure For the avoidance of doubt, a party will be responsible for any unauthorised disclosure of Confidential Information made by that party’s employees, directors, agents or advisors and by a bona fide potential purchaser to whom Confidential Information has been disclosed by that party under clause 22.2(f).

  • Unauthorised Transactions As between you and Stripe, you are responsible for Card Transactions, and fees and penalties Stripe incurs resulting from any Card Authorised User’s failure to (a) exercise reasonable care in safeguarding Cards from loss or theft; or (b) promptly report loss or theft, including fraud. Additionally, to the extent Law permits, if you or a Card Authorised User allows another party to use the Card or Card Account Data for any purpose or if an unauthorised person uses a Card or Card Account Data, you will be liable for that use, including all losses, damages and costs arising out of or relating to that use. To the extent Law permits, Stripe is not liable for any losses, damages or costs to you or your Card Authorised Users arising out of or relating to (y) unauthorised access to or use of a Card or your Stripe Issuing Account; or (z) your failure to use or implement anti-fraud measures, security controls or any other data security measures.

  • Curriculum and Instruction 7.1 The Board and the Association recognize the importance of adequate teaching reference materials and adequate and appropriate instructional materials and equipment in maintaining a high level of professional performance in the educational process.

  • Form instructions 1. This form does not mandate the use of a specific font size or style but the font must be legible.

  • Instructions from Customer Processing on Legal Requirement. 28(3) (b) 3.3 Personnel. 28(3) (c) and 32 2 and Appendix 2 Security of Processing and Appendix 2, Technical and Organizational Measures. 28(3) (e) 3.4 Cooperation. 28(3) (f) and 32-36 2 and Appendix 2, 3.5, 3.6 Security of Processing and Appendix 2, Technical and Organizational Measures. Personal Data Breach Notification. Data Protection Impact Assessment. 28(3) (g) 4 Data export and Deletion 28(3) (h) 5 CERTIFICATIONS AND AUDITS

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act (8 U.S.C.A. & 1101, et seq.), as amended; and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this contract, and should the Federal Government impose sanctions against the City for such use of unauthorized aliens, Consultant hereby agrees to, and shall, reimburse City for the cost of all such sanctions imposed, together with any and all costs, including attorneys' fees, incurred by the City in connection therewith.

  • Billing Instructions Enter name and mailing address of nominating Agency Finance Office for billing purposes.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

Time is Money Join Law Insider Premium to draft better contracts faster.