ACH Transfers Functionality Sample Clauses

ACH Transfers Functionality. Automated Clearing House Transfers (“ACH Transfers”) initiated through the Online Investing Service from your Investment Services Accounts to your Bank of the West Accounts or other US financial institution accounts will be governed by these Terms and Conditions. Transfers initiated from your Bank of the West Accounts to your Investment Services Accounts will be governed by the Online and Mobile Service Agreement. ACH Transfers made using the Online Investing Service are subject to the following limitations: • Dollar limitations and verifications may apply to all ACH transfers. Please contact BWIS if you have any questions on a particular transfer transaction. • All transfer limits are subject to temporary reductions to protect the security of the Accounts and/or the transfer system. • At our discretion, we may refuse to process any transaction that exceeds any designated limits. In this case, you are responsible for making alternate arrangements or rescheduling the transfer through the Online Investing Service. • ACH Transfers from an Investment Services Account to another account submitted on a business day and verified by BWIS before the cut-off time of 1:00 p.m. ET may be posted to the Investment Services Account on the same day. Transfers submitted on a business day and verified by BWIS after 1:00 p.m. ET will be treated on a best efforts basis to be processed the same day. • All transfers submitted on a non-business day as well as transfers verified by BWIS after the cut-off time and not processed same day are posted to your Investment Services Account as a pending transaction until the next Business Day. • The action of posting ACH Transfer transactions to your Investment Services Account is not a confirmation that the transfer of funds occurred. I understand that a transfer reject may occur and I will be responsible for any transactions within my account based on those funds. • I understand that funds transferred from my Investment Services Account via ACH transfer may be debited to my Investment Services Account same day and transferred through the ACH system. The ACH system is not a real-time transfer system and additional time may be required by the receiving financial institution to process and post funds. Transferred funds frequently post to the receiving financial institution the following business day. • Recurring transfers scheduled for a weekend or a non-Business Day will be processed on the prior Business Day. • Funds may NOT be drawn fro...
AutoNDA by SimpleDocs

Related to ACH Transfers Functionality

  • Local Interconnection Data Exchange for Billing 7.7.1 There are certain types of calls or types of Interconnection that require exchange of Billing records between the Parties, including, for example, alternate billed and Toll Free Service calls. The Parties agree that all call types must be routed between the networks, accounted for, and settled among the Parties. Certain calls will be handled via the Parties' respective operator service platforms. The Parties agree to utilize, where possible and appropriate, existing accounting and settlement systems to xxxx, exchange records and settle revenue.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Customer’s Processing of Personal Data Customer shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations. For the avoidance of doubt, Customer’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Customer shall have sole responsibility for the means by which Customer acquired Personal Data.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!