Misuse of Card Sample Clauses

Misuse of Card. The ECU 1 Card contains financial value, privileges and security access. The cardholder is responsible for taking proper care of the card and should never: • Use the card as collateral or allow the card to be retained for university services • Allow anyone other than the cardholder to use the card for purchases or access • Alter the card in any manner, ie, punching holes or affixing decals to the card Improper care of the ECU 1 Card can affect the ability to access data on the card and will be subject to a replacement card fee.
AutoNDA by SimpleDocs
Misuse of Card. The Bank may suspend your Card privileges if you mis- use your account or your Card. If your Card privileges have been suspended, we may impose additional restrictions before returning your Card to you or we may cancel your Card privileges.

Related to Misuse of Card

  • Use of Card PIN 1.1. RECEIPT OF CARD/PIN Once your application for a Card is approved, we shall send you a Card and a Personal Identification Number (PIN) to be used in conjunction with your Card. Please sign your Card upon receiving it.

  • Prohibited use of card (a) You must not use the card, and/or otherwise operate the card account to pay the current balance. (b) You shall not use and we will not permit the card to be used to effect any card transaction which would contravene the laws of any jurisdiction.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

  • Misuse of TINs If the requester discloses or uses TINs in violation of federal law, the requester may be subject to civil and criminal penalties. Specific Instructions Line 1

  • Collection of card When your application is approved by us, we may send you the card, and a renewal or replacement thereof, by ordinary post to the address we have on record for you. In the event you fail to receive the card and unauthorized transactions occur on the card account, you will not be liable for the balances arising therefrom provided you have not acted fraudulently or negligently. We are not liable to you for any loss or damage which you may suffer if you fail to receive the card.

  • Return of card The card remains our property at all times. You must immediately return the card to us upon our request which we may make at any time in our reasonable discretion.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • No Improper Use of Materials During his or her employment with the Company, Employee will not improperly use or disclose any Confidential Information or trade secrets, if any, of any former employer or any other person to whom Employee has an obligation of confidentiality, and Employee will not bring onto the premises of the Company any unpublished documents or any property belonging to any former employer or any other person to whom Employee has an obligation of confidentiality unless consented to in writing by that former employer or person.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!