Accessing the Zero Hash System Sample Clauses

Accessing the Zero Hash System. 1. Participant accepts responsibility for any actions taken by any Person accessing the Zero Hash System with a User ID assigned to any of Participant's Authorized Traders. 2. Participant shall take all reasonable care to safeguard its User IDs and will not authorize or permit any other party to access the Zero Hash System using the User ID, other than the Person to which the User ID was issued. Participant further acknowledges that it is responsible for maintaining adequate security and control of all account passwords in relation to Participant’s use of the Zero Hash services. 3. Participant acknowledges that every Person using a User ID will be deemed by Zero Hash to be the Person to whom the User ID was issued. 4. Participant will notify Zero Hash immediately of any changes in the authorized level of access for any Participant Administrator. 5. Participant acknowledges that Zero Hash may rely upon, and will be fully released and discharged by Participant for acting upon, any information, data, Transaction details, acknowledgements or instructions that are (i) entered, imported, transmitted or otherwise communicated under its User IDs (whether or not such action was actually authorized by Participant), or (ii) are otherwise reasonably believed by Zero Hash to be genuine and to have been communicated or presented on behalf of Participant by an Authorized Trader, whether via the Zero Hash System or otherwise. 6. Participant acknowledges that transactions made on Participant’s behalf may be subject to federal and state laws and regulations governing transactions in currency and other monetary instruments relating to money laundering activities and the funding of terrorism and that such laws and regulations may impose severe criminal penalties on those who participate or assist in such activities or in structuring of such activities to avoid reporting requirements. Participant acknowledges that Zero Hash or any of its affiliates may monitor transactions for compliance with such laws and regulations. Provided, further, Participant agrees that Participant will not initiate any action which would violate, or result in a payment in violation of the federal and state laws or regulations, including, without limitation, the federal laws and regulations administered by bank regulatory agencies and the Office of Foreign Assets Control (“OFAC ”) relating to money laundering and the funding of terrorism.
AutoNDA by SimpleDocs

Related to Accessing the Zero Hash System

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Company to Provide Copy of the Prospectus in Form That May be Downloaded from the Internet If requested by the Representatives, the Company shall cause to be prepared and delivered, at its expense, within one business day from the effective date of this Agreement, to the Representatives an “electronic Prospectus” to be used by the Underwriters in connection with the offering and sale of the Offered Shares. As used herein, the term “electronic Prospectus” means a form of Time of Sale Prospectus, and any amendment or supplement thereto, that meets each of the following conditions: (i) it shall be encoded in an electronic format, satisfactory to the Representatives, that may be transmitted electronically by the Representatives and the other Underwriters to offerees and purchasers of the Offered Shares; (ii) it shall disclose the same information as the paper Time of Sale Prospectus, except to the extent that graphic and image material cannot be disseminated electronically, in which case such graphic and image material shall be replaced in the electronic Prospectus with a fair and accurate narrative description or tabular representation of such material, as appropriate; and (iii) it shall be in or convertible into a paper format or an electronic format, satisfactory to the Representatives, that will allow investors to store and have continuously ready access to the Time of Sale Prospectus at any future time, without charge to investors (other than any fee charged for subscription to the Internet as a whole and for on-line time). The Company hereby confirms that it has included or will include in the Prospectus filed pursuant to XXXXX or otherwise with the Commission and in the Registration Statement at the time it was declared effective an undertaking that, upon receipt of a request by an investor or his or her representative, the Company shall transmit or cause to be transmitted promptly, without charge, a paper copy of the Time of Sale Prospectus.

  • Testing-the-Waters Communications If at any time following the distribution of any Written Testing-the-Waters Communication there occurred or occurs an event or development as a result of which such Written Testing-the-Waters Communication included or would include an untrue statement of a material fact or omitted or would omit to state a material fact necessary in order to make the statements therein, in the light of the circumstances existing at that subsequent time, not misleading, the Company shall promptly notify the Representative and shall promptly amend or supplement, at its own expense, such Written Testing-the-Waters Communication to eliminate or correct such untrue statement or omission.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to Reconex for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers. 3.2 Except as otherwise required by Applicable Law, subject to Section 3.1, Verizon shall have the right to add, modify, grandfather, discontinue or withdraw, Verizon Telecommunications Services at any time, without the consent of Reconex. 3.3 To the extent required by Applicable Law, the Verizon Telecommunications Services to be provided to Reconex for resale pursuant to this Attachment will include a Verizon Telecommunications Service customer-specific contract service arrangement (“CSA”) (such as a customer specific pricing arrangement or individual case based pricing arrangement) that Verizon is providing to a Verizon Customer at the time the CSA is requested by Reconex.

  • User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)

  • Links from the Website If the Website contains links to other sites and resources provided by third parties, these links are provided for your convenience only. This includes links contained in advertisements, including banner advertisements and sponsored links. We have no control over the contents of those sites or resources, and accept no responsibility for them or for any loss or damage that may arise from your use of them. If you decide to access any of the third-party websites linked to this Website, you do so entirely at your own risk and subject to the terms and conditions of use for such websites.

  • NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.

  • Testing-the-Waters Materials If at any time following the distribution of any Written Testing-the-Waters Communication there occurred or occurs an event or development as a result of which such Written Testing-the-Waters Communication included or would include an untrue statement of a material fact or omitted or would omit to state a material fact necessary in order to make the statements therein, in the light of the circumstances existing at that subsequent time, not misleading, the Company will promptly notify the Representatives and will promptly amend or supplement, at its own expense, such Written Testing-the-Waters Communication to eliminate or correct such untrue statement or omission.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!