Lost or Stolen Access Devices Sample Clauses

Lost or Stolen Access Devices. 3.23.5.1 The Physical Collocator shall immediately notify AT&T-21STATE in writing when any of its Access Devices have been lost or stolen. If it becomes necessary for AT&T-21STATE to re-key buildings or deactivate an Access Device as a result of a lost or stolen Access Device(s) or for failure of the Physical Collocator’s employees, or an AT&T-21STATE AIS to return an Access Device(s), the Physical Collocator shall pay for the costs of re-keying the building or deactivating the Access Device(s).
AutoNDA by SimpleDocs
Lost or Stolen Access Devices. Each Participant, and the Subscribers affiliated with them, shall be jointly and severally obligated to immediately notify the MLS of any lost, stolen, or otherwise unaccountable access device. Such notification shall be made by acknowledged facsimile transmission or by certified mail, return receipt requested. Such notification shall be made within three (3) days of the discovery of the lost, stolen or otherwise unaccountable access device.
Lost or Stolen Access Devices. If you use software that we have given you to access the Web site, please remember that this software is valuable, and it is important for you to exercise care with it. Never lend it to anyone. Contact us immediately if you think such software has been stolen or lost or if you believe that an unauthorized person has obtained access to your User Information.
Lost or Stolen Access Devices. ACCESS Integrated shall immediately notify BellSouth in writing when any of its Access Devices have been lost or stolen. If it becomes necessary for BellSouth to re-key buildings or deactivate an Access Device as a result of a lost or stolen Access Device(s) or for failure of ACCESS Integrated’s employees, suppliers, agents or Guest(s) to return an Access Device(s), ACCESS Integrated shall pay for the costs of re-keying the building or deactivating the Access Device(s).
Lost or Stolen Access Devices. Neutral Tandem shall immediately notify BellSouth in writing when any of its Access Devices have been lost or stolen. If it becomes necessary for BellSouth to re-key buildings or deactivate an Access Device as a result of a lost or stolen Access Device(s) or for failure of Neutral Tandem’s employees, suppliers, agents or Guest(s) to return an Access Device(s), Neutral Tandem shall pay for the costs of re-keying the building or deactivating the Access Device(s).
Lost or Stolen Access Devices. PTLLC shall immediately notify BellSouth in writing when any of its Access Devices have been lost or stolen. If it becomes necessary for BellSouth to re-key buildings or deactivate an Access Device as a result of a lost or stolen Access Device(s) or for failure of PTLLC’s employees, suppliers, agents or Guest(s) to return an Access Device(s), PTLLC shall pay for the costs of re-keying the building or deactivating the Access Device(s). Version 2Q04: 08/18/04
Lost or Stolen Access Devices. CLEC shall immediately notify AT&T in writing when any of its Access Devices have been lost or stolen. If it becomes necessary for AT&T to re-key buildings or deactivate an Access Device as a result of a lost or stolen Access Device(s) or for failure of CLEC’s employees, suppliers, agents or Guest(s) to return an Access Device(s), CLEC shall pay for the costs of re-keying the building or deactivating the Access Device(s).
AutoNDA by SimpleDocs
Lost or Stolen Access Devices. When using BB Internet Banking, it is important to exercise care with it. Account Holder should implement security procedures to prevent anyone from improperly using any Supervisor’s or Operator’s BB Internet Banking user ID and password. It is important for Supervisors and Operators to keep their passwords to themselves; this password is an important means of protection for the Account Holder. It is recommended that Account Holder implement security procedures which prevent Supervisors and Operators from keeping their passwords on their personal computer or any computer materials, or any other access device (collectively, “User Access Device”). Contact the Branch immediately if any Supervisors or Operators suspect their BB Internet Banking User Access Device has been stolen or if any Supervisors or Operators believe that an unauthorized person has obtained access to their User Access Device. The telephone is the fastest way to alert the Branch. Prompt notification is crucial in preventing unauthorized access to the Account Holder’s Account and possible loss of funds (including the Account Holder’s maximum overdraft line of credit). Call the Branch at the number provided in Section L of this Article of the Agreement and speak with a Branch employee.
Lost or Stolen Access Devices. Iris Networks shall immediately notify BellSouth in writing when any of its Access Devices have been lost or stolen. If it becomes necessary for BellSouth to re-key buildings or deactivate an Access Device as a result of a lost or stolen Access Device(s) or for failure of Iris Networks’s employees, suppliers, agents or Guest(s) to return an Access Device(s), Iris Networks shall pay for the costs of re-keying the building or deactivating the Access Device(s).

Related to Lost or Stolen Access Devices

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Procurement of Recovered Materials In the performance of this contract, the Contractor shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired

  • CERTIFICATION OF NO ASBESTOS CONTAINING MATERIALS OR WORK 8.1 The Contractor shall be responsible for ensuring that no asbestos containing materials or work is included within the scope of the Work. The Contractor shall take whatever measures it deems necessary to insure that all employees, suppliers, fabricators, material men, subcontractors, or their assigns, comply with this requirement. 8.2 The Contractor shall ensure that Texas Department of Health licensed individuals, consultants or companies are used for any required asbestos work including asbestos inspection, asbestos abatement plans/specifications, asbestos abatement, asbestos project management and third-party asbestos monitoring.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!