Access Methods Sample Clauses

Access Methods. You may withdraw or transfer funds from your account(s) by any method we offer, (e.g. via ATM, Visa Debit Card, check, in person, by mail, MoneyLine, ComputerLine, or MSUFCU Mobile app) as applicable. We may refuse to honor any draft drawn on a form we do not supply, and you are liable for any loss we incur handling such an item. We have the right to examine and authorize any form of power of attorney, and we may limit account withdrawals or transfers. We are not required to recognize any power of attorney. If any of your accounts become delinquent or overdrawn, we may restrict use of any and all access methods until such accounts are brought current.
AutoNDA by SimpleDocs
Access Methods. JDSU acknowledges and agrees that, subsequent to the Distribution Date, the JDSU Group may no longer use decryption algorithms or other access methods that were previously provided by the Lumentum Business to internal JDSU users to enable those internal JDSU users to use locked or encrypted copies of Lumentum Commercial Software, except to the extent necessary to continue using those copies rightfully in use before the Distribution Date. Any access after the Distribution Date any member of the JDSU Group to additional copies of such Lumentum Commercial Software beyond those copies rightfully in use before the Distribution Date, or to support, updates, revisions or service, shall be as separately agreed with Lumentum or with an appropriate Third Party software vendor.
Access Methods. Nodal shall provide to Participant, through such Participant’s Account Administrator(s), Access Methods for use by Participant’s Authorized Users. Participant shall notify Nodal of any change of Authorized Users or Account Administrators in accordance with the Rules. Participant shall not divulge, and shall not permit any other Person to divulge, any Access Methods to any Person other than an Account Administrator or an Authorized User. Participant is and shall remain fully responsible for
Access Methods. Xerox acknowledges and agrees that, subsequent to the Distribution Date, Xerox and the members of its Group may no longer use de-encryption algorithms or other access methods that were previously provided by the BPO Business to internal Xerox users to enable those internal Xerox users to use locked or encrypted copies of Conduent Commercial Software or other software, except to the extent necessary to continue using those copies rightfully in use before the Distribution Date. Conduent acknowledges and agrees to allow Xerox, or a member of its Group, after the Distribution Date, reasonable access to any of the Licensed Conduent IPR, materials or data licensed to them in this Article IV.
Access Methods. Agilent acknowledges and agrees that, subsequent to the Distribution Date, Agilent and its Affiliates may no longer use de-encryption algorithms or other access methods that were previously provided by the Keysight Business to internal Agilent users to enable those internal Agilent users to use locked or encrypted copies of Keysight Commercial Software, except to the extent necessary to continue using those copies rightfully in use before the Distribution Date. Any access after the Distribution Date by Agilent, or an Agilent Affiliate, to additional copies of such Keysight Commercial Software beyond those copies rightfully in use before the Distribution Date, or to support, updates, revisions or service, shall be as separately agreed with Keysight or with an appropriate Third Party software vendor.
Access Methods. You may access the Service: • by File Transfer Protocol (FTP) file transfer, • through OLBB (when available) if you have subscribed for Bank’s OLBB service, or • by other means made available by Bank from time to time and expressly approved by Bank in writing in advance. Payment Instructions must be transmitted or delivered to Bank in compliance with the applicable Security Procedures and in compliance with the transmission and format requirements and cut-off times established by Bank, which may be changed by Bank from time to time. Payment Instructions received after the established cut-off times will be rejected and not processed. You acknowledge and agree that Bank may delay or suspend the processing of any Payment Instructions to verify compliance with Applicable Law and may reject any Payment Instructions for failure to comply with Applicable Law. You are solely responsible for the accuracy and completeness of all Payment Instructions delivered to Bank by you or on your behalf. Bank is not responsible for detecting errors in Payment Instructions and shall be fully protected in processing such Payment Instructions as received by Bank. You are solely responsible for ensuring that the Security Procedures are known to and used only by authorized users within your organization. In Bank’s discretion, Bank may deny access to the Service to any user. You will notify Bank immediately if you become aware of any unauthorized access to or use of the Service, or if any Security Procedures have been lost, stolen, or compromised. You will cooperate with Bank in any investigation and any effort by Bank to recover funds on your or Bank’s behalf and agree to take corrective measures to protect your account from further unauthorized use or fraudulent activity. You will provide to Bank and keep current all information Bank reasonably requires from time to time with respect to each authorized user and will notify Bank immediately if an authorized user ceases to be associated with your organization or is no longer authorized to access the Service on your behalf, or if for any other reason you would like to modify or remove an authorized user’s access to the Service.
Access Methods. 5.1 Unless otherwise agreed to in writing, the Organization will be granted permission to create Authorized Users. The Organization shall exercise reasonable care to ensure no Unauthorized Users access the System.
AutoNDA by SimpleDocs
Access Methods. The Service is accessible through Xxxxxxxx.xxx and eligible mobile devices as determined by Fidelity. To use the Services, you must obtain, at your own expense, the necessary hardware and software. More information about the specific hardware and software requirements can be found in the Frequently asked Questions for the Services. Please check the online Help Menu described in Section 2 below for more information regarding the Service. Please note feature availability and navigation will differ between the Xxxxxxxx.xxx and mobile versions of the Service.
Access Methods. Nodal shall provide to Participant, through such Participant’s Account Administrator(s), Access Methods for use by Participant’s Authorized Users. Participant shall notify Nodal of any change of Authorized Users or Account Administrators in accordance with the Rules. Participant shall not divulge, and shall not permit any other Person to divulge, any Access Methods to any Person other than an Account Administrator or an Authorized User. Participant is and shall remain fully responsible for (i) maintaining the confidentiality of Participant’s Access Methods, (ii) controlling and monitoring any use of any such Access Methods, (iii) all Transactions and other activities that occur through use of such Access Methods, and all charges resulting therefrom, whether or not such use is authorized by Participant, except to the extent that such unauthorized use is proximately caused by Nodal’s willful misconduct or negligence, and (iv) notifying Nodal immediately of any unauthorized use of Participant’s Access Methods or any other known or suspected breach of security relative to the System or the Services.
Access Methods. Authorized Users may only use the Services via the Access Method(s) stated in the applicable Order(s). Xxxxxx is responsible for protecting the security and integrity of all Access Methods. Broker shall hold in strict confidence all administrative Access Methods. Broker is responsible for any acts or omissions occurring under any administrative Access Methods, other than those administrative Access Methods which are under the control or care of HWML.
Time is Money Join Law Insider Premium to draft better contracts faster.