E-CHECK TRANSACTIONS You may authorize a merchant or other payee to make a one-time electronic payment from Your checking Account using information from Your check ("E-Check") to: (a) pay for purchases; or (b) pay bills.
Unauthorised Transactions As between you and Stripe, you are responsible for Card Transactions, and fees and penalties Stripe incurs resulting from any Card Authorised User’s failure to (a) exercise reasonable care in safeguarding Cards from loss or theft; or (b) promptly report loss or theft, including fraud. Additionally, to the extent Law permits, if you or a Card Authorised User allows another party to use the Card or Card Account Data for any purpose or if an unauthorised person uses a Card or Card Account Data, you will be liable for that use, including all losses, damages and costs arising out of or relating to that use. To the extent Law permits, Stripe is not liable for any losses, damages or costs to you or your Card Authorised Users arising out of or relating to (y) unauthorised access to or use of a Card or your Stripe Issuing Account; or (z) your failure to use or implement anti-fraud measures, security controls or any other data security measures.
Unauthorized Transactions You are not responsible for unauthorized Transactions. A Transaction is considered an “unauthorized Transaction” if we complete an investigation and determine that: • The Account was used by someone other than you; • You did not receive any benefit from the Transaction; • You co-operated fully with us in our investigation; and • You followed your responsibilities under this Agreement, including in these sections:
Unauthorized Changes The terms of Section 1 of Article VI apply to the resolution of any unauthorized changes regarding Number Portability.
Reporting Unauthorized Transactions You should notify us immediately if you believe your Access Codes or any Access Devices have been lost or stolen, that someone has gained access to the Security Procedure, or that someone has transferred or may transfer money from your Account without your permission or if you suspect any fraudulent activity on your Account. To notify us, call us at the number provided in Section 9.6 between 8:00 a.m. to 4:30 p.m. Central Time during a Business Day.
Unauthorized Carrier Change Charges In the event either Party requests that the other Party install, provide, change, or terminate a Customer’s Telecommunications Service (including, but not limited to, a Customer’s selection of a primary Telephone Exchange Service Provider) without having obtained authorization from the Customer for such installation, provision, selection, change or termination in accordance with Applicable Laws, the requesting Party shall be liable to the other Party for all charges that would be applicable to the Customer for the initial change in the Customer’s Telecommunications Service and any charges for restoring the Customer’s Telecommunications Service to its Customer-authorized condition (all such charges together, the “Carrier Change Charges”), including to the appropriate primary Telephone Exchange Service provider. Such Carrier Change Charges may be assessed on the requesting Party by the other Party at any time after the Customer is restored to its Customer-authorized condition.
Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act (8 U.S.C.A. & 1101, et seq.), as amended; and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this contract, and should the Federal Government impose sanctions against the City for such use of unauthorized aliens, Consultant hereby agrees to, and shall, reimburse City for the cost of all such sanctions imposed, together with any and all costs, including attorneys' fees, incurred by the City in connection therewith.
Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.
Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.
Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.