Unauthorized Access to Your Account Sample Clauses

Unauthorized Access to Your Account. You are solely responsible for ensuring that you keep your user name and password safe. Do not share this information with others and notify us right away of any unauthorized use. You’re responsible for all activities that occur under your account. We encourage you to ensure you are safe online and be aware of phishing and other means third parties use to access your information online.
AutoNDA by SimpleDocs

Related to Unauthorized Access to Your Account

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act (8 U.S.C.A. & 1101, et seq.), as amended; and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this contract, and should the Federal Government impose sanctions against the City for such use of unauthorized aliens, Consultant hereby agrees to, and shall, reimburse City for the cost of all such sanctions imposed, together with any and all costs, including attorneys' fees, incurred by the City in connection therewith.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Records Retention and Access The Contractor shall maintain accurate, current, and complete records of the financial activity of this Contract which sufficiently and properly document and calculate all charges billed to the Agency throughout the term of this Contract and for a period of at least five (5) years following the date of final payment or completion of any required audit (whichever is later). If any litigation, claim, negotiation, audit or other action involving the records has been started before the expiration of the five (5) year period, the records must be retained until completion of the action and resolution of all issues which arise from it, or until the end of the regular five (5) year period, whichever is later. The Contractor shall permit the Agency, the Auditor of the State or any other authorized representative of the State and where federal funds are involved, the Comptroller General of the United States or any other authorized representative of the United States government, to access and examine, audit, excerpt and transcribe any directly pertinent books, documents, papers, electronic or optically stored and created records or other records of the Contractor relating to orders, invoices or payments or any other documentation or materials pertaining to this Contract, wherever such records may be located. The Contractor shall not impose a charge for audit or examination of the Contractor’s books and records. Based on the audit findings, the Agency reserves the right to address the Contractor’s board or other managing entity regarding performance and expenditures. When state or federal law or the terms of this Contract require compliance with OMB Circular A-87, A-110, or other similar provision addressing proper use of government funds, the Contractor shall comply with these additional records retention and access requirements:

  • Unauthorized Assignment Any assignment or purported assignment in violation of this Section 10.6 is void.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

Time is Money Join Law Insider Premium to draft better contracts faster.