Reporting A Lost Card, Access Device, or PIN Sample Clauses

Reporting A Lost Card, Access Device, or PIN. If you believe that any Access Device has been lost or stolen or that someone has withdrawn or may withdraw money from your account without your permission, you agree to immediately notify us. You can call the Credit Union or write us at the telephone number or address shown in this Agreement or the Fee Schedule. If you recover your Card/Access Device after you have notified us, DO NOT USE IT. FUNDS AVAILABILITY DISCLOSURE - WHEN YOUR FUNDS ARE AVAILABLE FOR WITHDRAWAL This Disclosure applies to all "transaction" accounts. Transaction accounts, in general, are accounts that permit an unlimited number of payments to third persons and an unlimited number of telephone and pre-authorized transfers to other accounts of yours with us. Checking accounts are the most common transaction accounts. We reserve the right to delay the availability of funds deposited to accounts that are not transaction accounts for periods longer than those disclosed in this policy. Feel free to ask us whether any of your accounts are covered by these rules.
AutoNDA by SimpleDocs
Reporting A Lost Card, Access Device, or PIN. If you believe that any Access Device has been lost or stolen or that someone has withdrawn or may withdraw money from your account without your permission, you agree to immediately notify us. You can call the Credit Union or write us at the telephone number or address listed in this Agreement. If you recover your Card/Access Device after you have notified us, DO NOT USE IT.

Related to Reporting A Lost Card, Access Device, or PIN

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • FORMAT AND CONTENT FOR REGISTRY OPERATOR MONTHLY REPORTING Registry Operator shall provide one set of monthly reports per gTLD, using the API described in draft-­‐xxxxxx-­‐icann-­‐registry-­‐interfaces, see Specification 2, Part A, Section 9, reference 5, with the following content. ICANN may request in the future that the reports be delivered by other means and using other formats. ICANN will use reasonable commercial efforts to preserve the confidentiality of the information reported until three (3) months after the end of the month to which the reports relate. Unless set forth in this Specification 3, any reference to a specific time refers to Coordinated Universal Time (UTC). Monthly reports shall consist of data that reflects the state of the registry at the end of the month (UTC).

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Signaling protocol The Parties will interconnect their networks using SS7 signaling where Technically Feasible and available as defined in GR 905 Telcordia Standards including ISDN User Part (ISUP) for trunk signaling and TCAP for CCS-based features in the Interconnection of their networks. All Network Operations Forum (NOF) adopted standards shall be adhered to. Where available, CenturyLink signaling services to link its Signaling Transfer Points (STPs) for CLEC switches which connect to CenturyLink’s STPs via “A” links or for CLEC’s STPs to connect to CenturyLink’s STPs via “D” links which are dedicated to the transport of signaling for local Interconnection, may be ordered from the CenturyLink Tariff.

  • Monthly Data Download Not later than fifteen (15) days after the end of each month, beginning with the month in which the Commencement Date occurs and ending with the Final Shared-Loss Recovery Month, Assuming Bank shall provide Receiver:

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Bulk Registration Data Access to Icann Periodic Access to Thin Registration Data. In order to verify and ensure the operational stability of Registry Services as well as to facilitate compliance checks on accredited registrars, Registry Operator will provide ICANN on a weekly basis (the day to be designated by ICANN) with up-to-date Registration Data as specified below. Data will include data committed as of 00:00:00 UTC on the day previous to the one designated for retrieval by ICANN.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!