Access Methods Sample Clauses

Access Methods. You may withdraw or transfer funds from your account(s) by any method we offer, (e.g. via ATM, Visa Debit Card, check, in person, by mail, MoneyLine, ComputerLine, or MSUFCU Mobile app) as applicable. We may refuse to honor any draft drawn on a form we do not supply, and you are liable for any loss we incur handling such an item. We have the right to examine and authorize any form of power of attorney, and we may limit account withdrawals or transfers. We are not required to recognize any power of attorney. If any of your accounts become delinquent or overdrawn, we may restrict use of any and all access methods until such accounts are brought current.
AutoNDA by SimpleDocs
Access Methods. Nodal shall provide to Participant, through such Participant’s Account Administrator(s), Access Methods for use by Participant’s Authorized Users. Participant shall notify Nodal of any change of Authorized Users or Account Administrators in accordance with the Rules. Participant shall not divulge, and shall not permit any other Person to divulge, any Access Methods to any Person other than an Account Administrator or an Authorized User. Participant is and shall remain fully responsible for (i) maintaining the confidentiality of Participant’s Access Methods, (ii) controlling and monitoring any use of any such Access Methods, (iii) all Transactions and other activities that occur through use of such Access Methods, and all charges resulting therefrom, whether or not such use is authorized by Participant, except to the extent that such unauthorized use is proximately caused by Nodal’s willful misconduct or negligence, and (iv) notifying Nodal immediately of any unauthorized use of Participant’s Access Methods or any other known or suspected breach of security relative to the System or the Services.
Access Methods. JDSU acknowledges and agrees that, subsequent to the Distribution Date, the JDSU Group may no longer use decryption algorithms or other access methods that were previously provided by the Lumentum Business to internal JDSU users to enable those internal JDSU users to use locked or encrypted copies of Lumentum Commercial Software, except to the extent necessary to continue using those copies rightfully in use before the Distribution Date. Any access after the Distribution Date any member of the JDSU Group to additional copies of such Lumentum Commercial Software beyond those copies rightfully in use before the Distribution Date, or to support, updates, revisions or service, shall be as separately agreed with Lumentum or with an appropriate Third Party software vendor.
Access Methods. Agilent acknowledges and agrees that, subsequent to the Distribution Date, Agilent and its Affiliates may no longer use de-encryption algorithms or other access methods that were previously provided by the Keysight Business to internal Agilent users to enable those internal Agilent users to use locked or encrypted copies of Keysight Commercial Software, except to the extent necessary to continue using those copies rightfully in use before the Distribution Date. Any access after the Distribution Date by Agilent, or an Agilent Affiliate, to additional copies of such Keysight Commercial Software beyond those copies rightfully in use before the Distribution Date, or to support, updates, revisions or service, shall be as separately agreed with Keysight or with an appropriate Third Party software vendor.
Access Methods. Xerox acknowledges and agrees that, subsequent to the Distribution Date, Xerox and the members of its Group may no longer use de-encryption algorithms or other access methods that were previously provided by the BPO Business to internal Xerox users to enable those internal Xerox users to use locked or encrypted copies of Conduent Commercial Software or other software, except to the extent necessary to continue using those copies rightfully in use before the Distribution Date. Conduent acknowledges and agrees to allow Xerox, or a member of its Group, after the Distribution Date, reasonable access to any of the Licensed Conduent IPR, materials or data licensed to them in this Article IV.
Access Methods. You may access the Service: • by File Transfer Protocol (FTP) file transfer, • through OLBB (when available) if you have subscribed for Bank’s OLBB service, or • by other means made available by Bank from time to time and expressly approved by Bank in writing in advance. Payment Instructions must be transmitted or delivered to Bank in compliance with the applicable Security Procedures and in compliance with the transmission and format requirements and cut-off times established by Bank, which may be changed by Bank from time to time. Payment Instructions received after the established cut-off times will be rejected and not processed. You acknowledge and agree that Bank may delay or suspend the processing of any Payment Instructions to verify compliance with Applicable Law and may reject any Payment Instructions for failure to comply with Applicable Law. You are solely responsible for the accuracy and completeness of all Payment Instructions delivered to Bank by you or on your behalf. Bank is not responsible for detecting errors in Payment Instructions and shall be fully protected in processing such Payment Instructions as received by Bank. You are solely responsible for ensuring that the Security Procedures are known to and used only by authorized users within your organization. In Bank’s discretion, Bank may deny access to the Service to any user. You will notify Bank immediately if you become aware of any unauthorized access to or use of the Service, or if any Security Procedures have been lost, stolen, or compromised. You will cooperate with Bank in any investigation and any effort by Bank to recover funds on your or Bank’s behalf and agree to take corrective measures to protect your account from further unauthorized use or fraudulent activity. You will provide to Bank and keep current all information Bank reasonably requires from time to time with respect to each authorized user and will notify Bank immediately if an authorized user ceases to be associated with your organization or is no longer authorized to access the Service on your behalf, or if for any other reason you would like to modify or remove an authorized user’s access to the Service.
Access Methods. You may withdraw or transfer funds from your account(s) by any method we offer, (e.g., via ATM, Visa Debit Card, check, in person, by mail, MoneyLine, ComputerLine, or MSUFCU Mobile app) as applicable. We may refuse to honor any draft drawn on a form we do not supply, and you are liable for any loss we incur handling such an item. We have the right to examine and authorize any form of power of attorney, and we may limit account withdrawals
AutoNDA by SimpleDocs
Access Methods. You may access your Account online through a personal computer at xxx.xxxx.xxx or through the SoFi Mobile App via a personal computer or a mobile device, including a smartphone, tablet, or any other eligible handheld or wearable communication device (the “Access Devices”). Please note that certain Access Devices may not be available when using certain digital devices or applications. For example, some functions may be available online through a personal computer but not available through the SoFi Mobile App. SoFi is committed to keeping your money safe. For the safety and security of our members’ information, SoFi will never ask you for your password or login credentials, and you should not share this information with a third party. You will choose your own password (we will never suggest one), and we will never ask you to provide two-factor authentication information over the phone. Please be sure to keep this account information secure. All messages containing sensitive data with us will be sent through secure platforms, not social media. If you encounter a suspicious contact or receive requests asking for your two-factor authentication code or password changes that claim to be from SoFi, please do not respond. You should disconnect and call us to report it immediately at (000) 000-0000.
Access Methods. 5.1 Unless otherwise agreed to in writing, the Organization will be granted permission to create Authorized Users. The Organization shall exercise reasonable care to ensure no Unauthorized Users access the System. 5.2 Authorized Users will not disclose or give their Password to any other person; will not provide login credentials to any person not approved by the Organization; will not store their Password in any data file; will use every reasonable effort to refrain from any action that could allow any person to get access to their Password; and will report any actual or suspected breach of Password or any other unauthorized access. 5.3 Both of the Parties recognize the potential impact that a security breach may cause and will promptly notify the other Party of an actual or suspected security breach. 5.4 The Organization shall take all reasonable measures to prevent the introduction of computer viruses into the System.
Access Methods. The Service is accessible through Xxxxxxxx.xxx and eligible mobile devices as determined by Fidelity. To use the Services, you must obtain, at your own expense, the necessary hardware and software. More information about the specific hardware and software requirements can be found in the Frequently asked Questions for the Services. Please check the online Help Menu described in Section 2 below for more information regarding the Service. Please note feature availability and navigation will differ between the Xxxxxxxx.xxx and mobile versions of the Service.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!