NACHA Sample Clauses

NACHA. Is an abbreviation for the National Automated Clearing House Association, which operates the Automated Clearing House (ACH) transactions system. For further information, please see Provision 5.c.
NACHA. “NACHA” or “National Automated Clearing House Association” is responsible for establishing, revising and enforcing the Operating Rules for the US ACH Network.
NACHA. National Automated Clearing House Association. NACHA governs ACH, publishes ACH Rules, and changes them from time to time.
NACHA. Participants shall reimburse the Contractor for any fees or fines imposed on the Contractor by NACHA for the Participant’s failure to comply with any NACHA rules.
NACHA i. To the extent the Check Image Transaction processing services require any transactions to be processed as ACH Entries, Sub- Merchant shall be considered the Originators of such Entries. Sub-Merchant agrees: (a) to comply with the NACHA Operating Rules; (b) that Entries may not be initiated that violate the laws of the United States or any other jurisdiction in which the Sub- Merchant operates; and (c) that Sub-Merchant shall be responsible for the breach of any warranty under the NACHA Operating Rules with respect to Entries initiated by Sub-Merchant. Sub-Merchant is responsible for compliance with all requirements of the NACHA Operating Rules that pertain to the paper-based Entries processed hereunder. This responsibility includes, but is not limited to, responsibility for requirements pertaining to capture and initiation of Entries (including rules regarding eligibility of the underlying items), required notices to receivers, opt out rights, separation of fees, requirements concerning identification of the receiver, maintenance of a working telephone number that is answered during business hours for receiver inquiries, requirements to assure that underlying items are not presented such that any person will be required to pay on the underlying item, and requirements regarding keeping, destroying or providing copies or originals of the underlying items and related information. ii. Sub-Merchant may elect to have FTNI, through WorkWave, process Entries using FTNI’s designated partner settlement account. If Sub-Merchant so elects, Sub-Merchant shall be responsible for any special warranties or indemnities that FTNI is required to make under the NACHA Operating Rules as to such Entries. Sub-Merchant agrees to comply with all relevant data security requirements (including, but not limited to, those requiring the use of encryption technology where ACH information is transmitted over unsecured networks such as the internet other than through an application certified by FTNI). Sub-Merchant agrees that it will not reinitiate Entries except as permitted by the NACHA Operating Rules. Sub-Merchant agrees that reversing Entries and reversing files must be transmitted on a timely basis as required by the NACHA Operating Rules. iii. Sub-Merchant agrees to comply with and be bound by the NACHA Operating Rules, as they may be updated from time to time. The duties of Sub-Merchant set forth in this Appendix 3 in no way limit Sub-Merchant’s obligations to comply with the N...

Related to NACHA

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Electronic Re-presented Checks If you write a check on a personal account that we return unpaid because of insufficient or uncollected funds, payee or any subsequent holder of the check may re-present the check to us, through an electronic instruction ("Electronic Re-presented Check") to charge your account for the amount of the check. If we receive an electronic re-presented check, we will pay or return the electronic re-presented check as if the original paper check was presented to us. Any collection fee you authorize the merchant to debit from your account is an electronic funds transfer subject to the terms of the Electronic Funds Transfer Agreement. If you want to reverse an electronic re-presented check, you must give us an affidavit within fifteen (15) days after we send or make available to you the periodic statement that reflects payment of that electronic re-presented check. In your affidavit, you must declare and swear under oath that the electronic re-presented check was ineligible or unauthorized. If we receive a proper notice of affidavit from you within the 15-day period, we will recredit your account with the amount of the charge. If you wish to stop payment of any electronic re-presented check, you must follow the procedures for stopping payment of checks, not the procedures for stopping payment on electronic loan or bill payments. If you ask us to request the depositor's bank to send us the original paper check or a copy of the paper check, and we provide it to you, you agree that you will not seek to have your account re-credited due to a prior stop payment order or if the item is otherwise ineligible for collection.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Electronic Visit Verification ("EVV A. To ensure: 1. the EVV system is used to verify the provision of services governed under 40 TAC, Chapter 68 or its successor; 2. only authorized people access the Contractor's EVV account; 3. all data elements required by HHSC or HHSC's designee are uploaded or entered and maintained in the EVV system completely, accurately, and prior to submitting the claim; 4. that each time services governed by 40 TAC Chapter 68 or its successor are delivered to an individual, the Contractor's staff uses an HHSC-approved EVV system; and 5. service delivery documentation is immediately available for review by HHSC when requested. B. Equipment provided to Contractor by HHSC, HHSC’s designee, or an HHSC-approved EVV vendor, must be returned in good condition when the equipment is no longer needed under this Contract. In the context of this agreement, “good condition” means Contractor must not place any marks or identifying information on the equipment and may not alter information on the equipment including logos and serial numbers. If the equipment is lost, stolen, marked, altered or damaged by Contractor, Contractor may be required to pay the replacement cost for each piece of equipment that is lost, stolen, marked or damaged. Replacement costs for lost, stolen, marked or damaged equipment may be assessed periodically. If Contractor recovers previously lost or stolen equipment for which Contractor paid the replacement cost in the prior 12 months, Contractor may return the equipment and be reimbursed for the replacement costs within 12 months of the date HHSC, HHSC’s designee or an HHSC-approved EVV vendor (as applicable) received payment in full from the Contractor. This is provided the equipment is returned in good condition as specified above. C. HHSC may perform EVV compliance oversight reviews to determine if Contractor has complied with EVV compliance requirements as outlined in 40 TAC Chapter 68 or its successor, EVV Policy posted on the HHSC EVV website or EVV Policy Handbook. D. If the Contractor determines an electronic record in the EVV system needs to be adjusted at any time, the Contractor will make the adjustment in the EVV system using the most appropriate EVV reason code number(s), EVV reason code description(s) and enter any required free text when completing visit maintenance in the EVV system, if applicable. E. Contractor must begin using an HHSC-approved EVV system prior to submitting an EVV relevant claim. F. All claims for services required to use EVV (EVV claims) must match to an accepted EVV visit transaction in the EVV Aggregator (the state’s centralized EVV database) prior to reimbursement of an EVV claim. Without a matching accepted EVV visit transaction, the claim will be denied. G. Contractor must submit all EVV related claims through the Texas Medicaid Claims Administrator, or as otherwise described in the EVV Policy posted on the HHSC EVV website or in the EVV Policy Handbook. H. Contractor must complete all required EVV training as outlined in the EVV Policy posted on the HHSC EVV website or EVV Policy Handbook: • Prior to using either an EVV vendor system or an EVV proprietary system and • Yearly thereafter. I. Contractor and, if applicable, the Contractor’s appointed EVV system administrator, must complete, sign and date the EVV Onboarding Form as outlined in 40 TAC Chapter 68 or its successor, EVV Policy posted on the HHSC website or EVV Policy Handbook.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • SBC-13STATE shall provide to CLEC Interconnection of the Parties’ facilities and equipment for the transmission and routing of Telephone Exchange Service traffic and Exchange Access traffic pursuant to the applicable Appendix ITR, which is/are attached hereto and incorporated herein by reference. Methods for Interconnection and Physical Architecture shall be as defined in the applicable Appendix NIM, which is/are attached hereto and incorporated herein by reference.

  • Electronic Check Transactions You authorize us to honor any electronic check conversion transaction and re-presented check fee debit transactions you authorize ("Electronic Check Transactions"). You agree that your authorization for an electronic check transaction occurs when you initiate such a transaction after receiving any notice regarding the merchant's right to process the transaction, including any written sign provided by the merchant at the time of your transaction. All terms governing electronic funds transfer services will apply to electronic check transactions, except the $50 and $500 limits of liability for unauthorized transactions in Section 9. You remain responsible for notifying us of any unauthorized electronic check transaction shown on your statement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!