CARD, SECURITY PROCEDURES AND CARD FACILITIES Sample Clauses

CARD, SECURITY PROCEDURES AND CARD FACILITIES. We are not liable in any way: a) should use of your Card or any Enabled Device(s) or any Security Procedure or use of Card Facilities be rejected by a merchant or any terminal used to process Card Transactions or in connection with the Card Facilities or if we refuse for any reason to authorise any Card Transaction; b) for any malfunction, defect or error in any terminal used to process Card Transactions or to facilitate the usage of Card Facilities, or of other machines or systems of authorisation whether belonging to or operated by us or other persons or the inability of any terminal, machine or system to accurately, properly or promptly transmit, process or store any data; c) for any delay or inability on our part to perform any of our obligations under this Agreement because of any electronic, mechanical system, data processing or telecommunication defect or failure, Act of God, terrorism, civil disturbance or any event outside our reasonable control or the reasonable control of any of our servants, agents or contractors; d) for any damage to or loss or inability to retrieve any data or information that may be stored in your Card or any microchip or circuit or device in your Card or the corruption of any such data or information, howsoever caused; e) for any claim, loss, damage, delay, inability to use, or any mistake or error arising in connection with any hardware, software or service used or provided in connection with any Tokenised Card, Enabled Device or Digital Payment Service or any inability to use the same. You agree and acknowledge that Tokenised Card, Enabled Device or Digital Payment Service are made available on an “as-is”, “as-available” basis, that these are not warranted to be error-free and that all risk associated with any use thereof shall be borne by you; and/or f) for any breach of any obligation of confidentiality by any third party provider of any service or facility associated with any Tokenised Card, Enabled Device or Digital Payment Service. You acknowledge and understand that use of the same involves the transmission of your personal data and transaction details through third parties which we are unable to control, and we are not responsible or liable to you for their performance or the non-performance of their obligations to you; and g) (i) for any loss, theft, use or misuse of any Card or Enabled Device, or disclosure of the PIN and/ or compromise of any Security Procedure or any breach of this Agreement (ii) for any fraud ...
AutoNDA by SimpleDocs

Related to CARD, SECURITY PROCEDURES AND CARD FACILITIES

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Cash Management Systems On or prior to the Closing Date, Borrowers will establish and will maintain until the Termination Date, the cash management systems described in Annex C (the “Cash Management Systems”).

  • Cash Management System On or prior to the Closing Date and until the Termination Date, Borrower will establish and maintain the cash management system described in Schedule D. All payments in respect of the Collateral shall be made to or deposited in the blocked or lockbox accounts described in Schedule D in accordance with the terms thereof.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks. (2) The Information Security Program shall require encryption of any Personal Information in electronic format while in transit or in storage, and enhanced controls and standards for transport and disposal of physical media containing Personal Information. DTI shall, and shall require its agents, contractors and subcontractors who access or use Personal Information or Confidential Information to, regularly test key controls, systems and procedures relating to the Information Security Program ("ISP Tests"). DTI shall advise the Funds of any material issues identified in the ISP Tests potentially affecting the Information Security Program. (3) DTI shall comply with its Information Security Program.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!