We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

MAILBOX KEYS Sample Clauses

MAILBOX KEYS. Students may keep their key and mailbox for as long as they are residents in Central Campus housing and only need to reactivate their box each semester. If a student elects to live off campus, or moves to The Village, they must turn in their mailbox key prior to the end of finals for the semester they depart. A $25 lock change fee will be placed on the student’s account as a hold if the student fails to return their key within five days of the semester ending.
AutoNDA by SimpleDocs
MAILBOX KEYS. Mailbox keys will be issued to the Tenant. A $25 charge will be assessed to the Tenant for replacing mailbox locks.
MAILBOX KEYS. All mailbox keys must be returned to Landlord at the end of the Lease Term. A charge of Twenty-Five Dollars ($25) will be assessed for any mailbox key that is not returned at the end of the Lease Term. A charge of Twenty-Five Dollars ($25) will be assessed to replace any mailbox key during the Lease Term.
MAILBOX KEYS. TENANT is responsible for going to the United States Post Office with a copy of their lease in order to acquire a mailbox key. Their nominal fee is to be paid by TENANT.
MAILBOX KEYSTenant shall be solely responsible for contacting the United State Post Office, or the comparable mail carrier serving the Property, to obtain keys for the mailbox serving the Premises. In addition, Tenant shall pay all costs and expense related to such keys and Tenant's mailbox including, without limitation, any costs assessed for issuance of mailbox keys and repairs to Tenant's mailbox.

Related to MAILBOX KEYS

  • Mailboxes Each department or unit shall make available a convenient receptacle at a designated location for Employees to receive College business correspondence.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • Links If The Services are made available through the Internet, the Financial Institution’s website may provide links to other websites, including those of Third Parties who may also provide services to You. You acknowledge that all those other websites and Third Party services are independent from the Financial Institution’s and may be subject to separate agreements that govern their use. The Financial Institution and Central 1 have no liability for those other websites or their contents or the use of Third Party services. Links are provided for convenience only, and You assume all risk resulting from accessing or using such other websites or Third Party services.

  • Help Desk A help desk for Product support issues (the “Help Desk”) will be available to Customer. Unless specified in an Order, Customer should contact 000.000.0000 to receive a telephone number for the applicable supporting Solutions & Support Center. Customer will appoint one Product administrator and one backup administrator to serve as the primary point of contact regarding maintenance services.

  • Customer Content As part of the Services provided under this Agreement, Customer Data will be stored and processed in the data center region specified in the applicable Ordering Document. Axway shall not access Customer Content except in response to support or technical issues where Customer provides Axway with prior Customer’s written authorization required to access such Customer Content. Axway is not responsible for unauthorized access, alteration, theft or destruction of Customer Content arising from Customer’s own or its authorized users’ actions or omissions in contravention of the Documentation. Customer’s ability to recover any lost data resulting from Axway’s misconduct is limited to restoration by Axway from the most recent back-up.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Users There is no limit to the number of users who can access the Software. You can invite any person You wish to access the Software.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!