An Authorized User Sample Clauses

An Authorized User. Shall review the Contracts and associated NYS Minimum Discounts and available Dealers and OEM Product Lines on the OGS website under Award 23166.
AutoNDA by SimpleDocs

Related to An Authorized User

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • Authorized Users Authorized Users" are:

  • Information Authorization Your enrollment in the applicable Service may not be fulfilled if we cannot verify your identity or other necessary information. Through your enrollment in or use of each Service, you agree that we reserve the right to request a review of your credit rating at our own expense through an authorized bureau. In addition, and in accordance with our Privacy Policy, you agree that we reserve the right to obtain personal information about you, including without limitation, financial information and transaction history regarding your Eligible Transaction Account. You further understand and agree that we reserve the right to use personal information about you for our and our Service Providers’ everyday business purposes, such as to maintain your ability to access the Service, to authenticate you when you log in, to send you information about the Service, to perform fraud screening, to verify your identity, to determine your transaction limits, to perform collections, to comply with laws, regulations, court orders and lawful instructions from government agencies, to protect the personal safety of subscribers or the public, to defend claims, to resolve disputes, to troubleshoot problems, to enforce this Agreement, to protect our rights and property, and to customize, measure, and improve the Service and the content and layout of the Site. Additionally, we and our Service Providers may use your information for risk management purposes and may use, store and disclose your information acquired in connection with this Agreement as permitted by law, including (without limitation) any use to effect, administer or enforce a transaction or to protect against or prevent actual or potential fraud, unauthorized transactions, claims or other liability. We and our Service Providers shall have the right to retain such data even after termination or expiration of this Agreement for risk management, regulatory compliance, or audit reasons, and as permitted by applicable law for everyday business purposes. In addition, we and our Service Providers may use, store and disclose such information acquired in connection with the Service in statistical form for pattern recognition, modeling, enhancement and improvement, system analysis and to analyze the performance of the Service. The following provisions in this Section apply to certain Services:

  • Default Authorized User a. Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • Execution Authorized The execution, delivery and performance of this Agreement by Securities Intermediary have been duly authorized by all necessary corporate action on the part of Securities Intermediary.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Corporation Authorization The execution, delivery and performance by Parent of this Agreement and the consummation by Parent of the transactions contemplated hereby are within the corporate powers of Parent and have been duly authorized by all necessary corporate action. This Agreement constitutes a valid and binding agreement of Parent.

  • Pertinent Non-Discrimination Authorities During the performance of this contract, the Engineer, for itself, its assignees, and successors in interest agree to comply with the following nondiscrimination statutes and authorities; including but not limited to: A. Title VI of the Civil Rights Act of 1964 (42 U.S.C. § 2000d et seq., 78 stat. 252), (prohibits discrimination on the basis of race, color, national origin); and 49 CFR Part 21. B. The Uniform Relocation Assistance and Real Property Acquisition Policies Act of 1970, (42 U.S.C. § 4601), (prohibits unfair treatment of persons displaced or whose property has been acquired because of Federal or Federal-aid programs and projects). C. Federal-Aid Highway Act of 1973, (23 U.S.C. § 324 et seq.), as amended, (prohibits discrimination on the basis of sex). D. Section 504 of the Rehabilitation Act of 1973, (29 U.S.C. § 794 et seq.) as amended, (prohibits discrimination on the basis of disability); and 49

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!