Authorized Use of eSignature Sample Clauses

Authorized Use of eSignature. Electronic signatures on Releases (as defined in Section 6.1 below) must be executed by the Claimants. The Law Firm may not execute an electronic signature on behalf of a Claimant. The Facility may collect data regarding the IP address of the eSignature user. If IP address data collected by the Facility indicates improper use of the eSignature process, the Facility or the WRG Trust may investigate such behavior and, in addition to the remedies available pursuant to Section 2.2 of the Agreement, deny access to the eSignature process to Claimants represented by the Law Firm. It is assumed that each Claimant will execute a Release from a unique IP address. An example of activity that may indicate improper use of the eSignature process would be the execution of multiple electronic signatures on the same computer, including a computer identified as being in the Law Firm’s office. Upon recognition of such activity, the Facility or the WRG Trust may make inquiries into whether, in fact, Claimants were physically present at the Law Firm and used the Law Firm’s computer to execute the electronic signatures (an authorized use of the eSignature process), or if, in fact, a member or members of the Law Firm’s staff executed the electronic signatures on behalf of the Claimants (an unauthorized use of the eSignature process).
AutoNDA by SimpleDocs
Authorized Use of eSignature. Electronic signatures must be executed by the Claimant. The Law Firm may not execute an electronic signature on behalf of the Claimant.
Authorized Use of eSignature. Electronic signatures must be executed by the Claimants. The Law Firm may not execute an electronic signature on behalf of a Claimant. The Facility may collect data regarding the IP address of the eSignature user. If IP address data collected by the Facility indicates improper use of the eSignature process, the Facility or the Celotex Trust may investigate such behavior and, in addition to the remedies available pursuant to Section 2.2 of the EFA, deny access to the eSignature process to Claimants represented by the Law Firm. It is assumed that each Claimant will execute a release from a unique IP address. An example of activity that may indicate improper use of the eSignature process would be the execution of multiple electronic signatures on the same computer, including a computer identified as being in the Law Firm’s office. Upon recognition of such activity, the Facility or the Celotex Trust may make inquiries into whether, in fact, Claimants were physically present at the Law Firm and used the Law Firm’s computer to execute the electronic signatures (an authorized use of the eSignature process), or if, in fact, a member or members of the Law Firm’s staff executed the electronic signatures on behalf of the Claimants (an unauthorized use of the eSignature process).

Related to Authorized Use of eSignature

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Authorized Users Authorized Users" are:

  • Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Publicity and Use of Trademarks or Service Marks 34.1 A Party, its Affiliates, and their respective contractors and Agents, shall not use the other Party’s trademarks, service marks, logos or other proprietary trade dress, in connection with the sale of products or services, or in any advertising, press releases, publicity matters or other promotional materials, unless the other Party has given its written consent for such use, which consent the other Party may grant or withhold in its sole discretion. 34.2 Neither Party may imply any direct or indirect affiliation with or sponsorship or endorsement of it or its services or products by the other Party. 34.3 Any violation of this Section 34 shall be considered a material breach of this Agreement.

  • Liability for Unauthorized Use If any Card is lost or stolen or otherwise may be used without your permission (express or implied), you must immediately notify us orally or in writing at the following phone number or address: 0-000-000-0000 or at TIB, National Association, P.O Box 569120, Dallas, Texas 75356-9120. If unauthorized use of a Card occurs before you notify us of the loss, theft or unauthorized use, you may be liable up to a maximum amount of $50. If unauthorized use of a Credit Device occurs, you may be liable for all of the unauthorized use.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!