Your Identity or Authority Sample Clauses

Your Identity or Authority. WALLEX shall not be under any obligation to verify the identity or authority of any person giving any Instruction and the authenticity of such Instruction. We shall not be liable for relying or acting on Instructions which are given or purported to be given by any person(s) whom we believe to be the User, regardless of the circumstances prevailing at the time of such Instructions, the nature of the arrangement, services or transaction made pursuant to such Instruction or the amount of money involved and notwithstanding any error, misunderstanding, fraud, forgery or lack of clarity or authorisation in the terms of such Instruction.
AutoNDA by SimpleDocs

Related to Your Identity or Authority

  • Your Member Identification Card Your BCBSRI member ID card is your key to getting healthcare coverage. It shows your healthcare provider that you’re part of the nation’s most trusted health plan. All BCBSRI members receive ID cards, which provide important information about your coverage. This card is for identification only, and you must show it whenever you receive healthcare services. Please note you must be a current member to receive covered services. Tips for keeping your card safe: • Carry it with you at all times. • Keep it in a safe location, just as you would with a credit card or money. • Let BCBSRI know right away if it is lost or stolen.

  • Vendor Identity and Contact Information It is Vendor’s sole responsibility to ensure that all identifying vendor information (name, EIN, d/b/a’s, etc.) and contact information is updated and current at all times within the TIPS eBid System and the TIPS Vendor Portal. It is Vendor’s sole responsibility to confirm that all e-correspondence issued from xxxx-xxx.xxx, xxxxxxx.xxx, and xxxxxxxxxxxxxxxx.xxx to Vendor’s contacts are received and are not blocked by firewall or other technology security. Failure to permit receipt of correspondence from these domains and failure to keep vendor identity and contact information current at all times during the life of the contract may cause loss of TIPS Sales, accumulating TIPS fees, missed rebid opportunities, lapse of TIPS Contract(s), and unnecessary collection or legal actions against Vendor. It is no defense to any of the foregoing or any breach of this Agreement that Vendor was not receiving TIPS’ electronic communications issued by TIPS to Vendor’s listed contacts.

  • User Identification 6.2.5.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • INFORMATION OF LOCKHEED XXXXXX (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. XXXXXX agrees to comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and to comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. XXXXXX agrees not to use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and agrees not to disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information.

  • Commissioner or Authorized User Contractor further warrants, covenants and represents that any confidential information obtained by Contractor, its agents, Subcontractors, officers, distributors, resellers or employees in the course of performing its obligations, including without limitation, security procedures, business operations information, or commercial proprietary information in the possession of the State or any Authorized User hereunder or received from another third party, will not be divulged to any third parties. Contractor shall not be required to keep confidential any such material that is publicly available through no fault of Contractor, independently developed by Contractor without reliance on confidential information of the Authorized User, or otherwise obtained under the Freedom of Information Act or other applicable New York State laws and regulations. This warranty shall survive termination of this Contract. Contractor further agrees to take appropriate steps as to its agents, Subcontractors, officers, distributors, resellers or employees regarding the obligations arising under this clause to insure such confidentiality.

  • National Item Identification Number (NIIN) The number assigned to each approved Item Identification under the Federal Cataloging Program. It consists of nine numeric characters, the first two of which are the National Codification Bureau (NCB) Code. The remaining positions consist of a seven digit non-significant number.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

  • Public Entity Crimes A person or affiliate who has been placed on the convicted vendor list following a conviction of a public entity crime may not be awarded or perform work as a contractor, supplier, subcontractor, or consultant under a contract with any public entity in excess of the threshold amount provided in Florida Statutes, Section 287.017 for Category Two for a period of thirty-six (36) months from the date of being placed on the convicted vendor list.

Time is Money Join Law Insider Premium to draft better contracts faster.