Apple Wallet Sample Clauses

Apple Wallet. 51.1.1 The present chapter regulates rules and terms on adding cards emitted by the bank to Apple Wallet and terms on making settlements with the added cards by the client and/or by the additional cardholder; 51.1.2 Terms used in the present chapter shall have the following meanings: 51.1.2.1 Apple – legal entity registered in the USA (Apple Inc. xxx.xxxxx.xxx) which manufactures and sells various electronic devices by means of which, the client/additional card holder has the capability to use Apple Wallet and make settlements with the card. 51.1.2.2 Apple Pay /Apple Wallet / electronic wallet – mobile/digital payment system/service/application created by Apple and integrated in Apple devices. Apple Pay/Apple Wallet, using the added cards, allows the customer to make contactless payments or withdraw cash from ATM. 51.1.2.3 Apple device/device – devices manufactured by Apple - iPhone, Apple Watch, iPad, MacBook and/or any other device, in which Apple Pay/Apple Wallet is integrated. 51.1.2.4 Authentication – process, which requires using the authentication data for the purposes of making payments/transactions by the added card in the Apple Wallet. 51.1.2.5 Authentication data – fingerprint of the client (Touch ID), face ID or Passcode, one of which should be used for using Apple Wallet while making transactions and have to be entered by the client or the additional card holder prior to each transaction. Client/additional card holder acknowledges that the bank does not have access to such data, furthermore, entering/using authentication data by the client or additional card holder is deemed as confirmation of the payment transaction. Those data which are added to the device as the authentication data but do not belong to the client or to the additional card holder are assumed as payment transaction confirmation too (among them payment by the client/additional card holder or withdrawal). 51.1.3 Terms on adding cards to the Apple Wallet 51.1.3.1 The client or the additional card holder is authorized to include/add his/her card to its own Apple device, provided that: 51.1.3.1.1 The client or additional card holder is identified by the bank in a due manner; 51.1.3.1.2 There is no restriction to the card and/or card account that is being added to Apple Wallet, which excludes possibility on making payments with the electronic wallet and/or cash withdrawal; 51.1.3.2 When adding card to the Apple Wallet, the client or additional card holder undergoes verification, wh...
AutoNDA by SimpleDocs

Related to Apple Wallet

  • Moonlighting Employment as a physician in a professional capacity outside of what is outlined in this Agreement, whether temporary special medical activity (“TSMA”) or external moonlighting, must be approved in writing, in advance, by the Departmental Chair, Program Director and Director of Graduate Medical Education (or designee). Even if approved, professional and general liability insurance as outlined in Section 5.4 is not provided to Trainee engaged in external moonlighting. Trainee acknowledges he or she has the responsibility to obtain insurance for such engagement. TSMA and external moonlighting must be included and reported as part of Trainee's hours spent on clinical experience and education. Trainee shall not be required to engage in any outside work.

  • Network Maintenance and Management 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.

  • Network Management 56.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement. 56.2 The Parties will employ characteristics and methods of operation that will not interfere with or impair the Parties’ networks, or the network of any third parties or Affiliated companies, connected with or involved directly in the network or facilities of CenturyLink. 56.3 CLEC shall not interfere with or impair service over any circuits, facilities or equipment of CenturyLink, its Affiliated companies, or its connecting and concurring carriers. 56.4 If CLEC causes any impairment or interference, CenturyLink shall promptly notify CLEC of the nature and location of the problem and that, unless promptly rectified, a temporary discontinuance of the use of any circuit, facility or equipment may be required. The Parties agree to work together to attempt to promptly resolve the impairment or interference. If CLEC is unable to promptly remedy, then CenturyLink may, at its option, temporarily discontinue the use of the affected circuit, facility or equipment until the impairment is remedied. 56.5 Any violation of Applicable Law or regulation regarding the invasion of privacy of any communications carried over CenturyLink’s facilities, or that creates hazards to the employees of CenturyLink or to the public, is also considered an impairment of service. 56.6 CenturyLink shall give advanced notice to CLEC of all non-scheduled maintenance or other planned network activities to be performed by CenturyLink on any Network Element, including any hardware, equipment, software, or system, providing service functionality of which CLEC has advised CenturyLink may potentially impact CLEC End Users. 56.7 The Parties shall provide notice of network changes and upgrades in accordance with 47 C.F.R. §§51.325 through 51.335. CenturyLink may discontinue any Interconnection arrangement, Telecommunications Service, or Network Element provided or required hereunder due to network changes or upgrades after providing CLEC notice as required by this Section. CenturyLink agrees to cooperate with CLEC and/or the appropriate regulatory body in any transition resulting from such discontinuation of service and to minimize the impact to customers which may result from such discontinuance of service.

  • Service Management Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!