RISK OF HOLD MAIL Sample Clauses

RISK OF HOLD MAIL. The Client hereby acknowledges that there may be risk in providing PRU with an authority to hold mail or direct his mail to third parties and that it is important for the Client to promptly collect in person all execution reports, daily and/or monthly statements of his account and review them in detail to ensure that any anomalies or mistakes can be detected in a timely manner. PRU should confirm with the client at least on an annual basis whether that client wishes to revoke the authority. For the avoidance of doubt, it will be acceptable for PRU to send a notification to the client before the expiry date of the authority and inform the client that it is automatically renewed unless the client specifically revokes it in writing before the expiry date.
AutoNDA by SimpleDocs
RISK OF HOLD MAIL. The Client hereby acknowledges that there may be risk in providing MAGUSTA with an authority to hold mail or direct his mail to third parties and that it is important for the Client to promptly collect in person all execution reports, daily and/or monthly statements of his account and review them in detail to ensure that any anomalies or mistakes can be detected in a timely manner. MAGUSTA should confirm with the Client at least on an annual basis whether that Client wishes to revoke the authority. For the avoidance of doubt, it will be acceptable for MAGUSTA to send a notification to the Client before the expiry date of the authority and inform the Client that it is automatically renewed unless the Client specifically revokes it in writing before the expiry date.

Related to RISK OF HOLD MAIL

  • Spread of Hours The ordinary hours of work prescribed in this agreement shall be between the hours of 6.00 am and 6.00 pm on any day or all of the days of the week, Monday to Friday. The spread of hours may be varied by mutual agreement between the parties to meet specific needs of the Company or employees.

  • Notices; Xxxxxxxx’s Physical Address All notices given by Borrower or Lender in connection with this Security Instrument must be in writing.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Transmission of business Where a business is transmitted from one employer to another, as set out in clause 4.4 - Redundancy, the period of continuous service that the employee had with the transmittor or any prior transmittor is deemed to be service with the transmittee and taken into account when calculating notice of termination. However, an employee shall not be entitled to notice of termination or payment in lieu of notice for any period of continuous service in respect of which notice has already been given or paid for.

  • Electronic Mail (E-mail If you send the Bank an e-mail message, the Bank will be deemed to have received it on the following business day. You should not rely on e-mail if you need to report an unauthorized transaction from one of your accounts or if you need to stop a payment that is scheduled to occur. • NOTE: E-mail transmissions outside of the Online Banking site are not secure. We advise you not to send us or ask for sensitive information such as account numbers, Password, account information, etc. via any general or public e-mail system. If you wish to contact us electronically, please use the e-mail link provided on our Online Banking site. Use this secure form to e-mail the Bank regarding inquiries about an electronic funds transfer error resolution, reporting unauthorized transactions, or contacting the Bank regarding other concerns of a confidential nature.

  • Certified Mail When mailed by certified mail, return receipt requested, notice is effective upon receipt, if delivery is confirmed by a return receipt.

  • Usage for Voice Mail Message Service 6.1.2 Rated Incollects (originated in BellSouth and from other companies) can also be on Optional Daily Usage File. Rated Incollects will be intermingled with BellSouth recorded rated and unrated usage. Rated Incollects will not be packed separately.

  • Meetings During the Grievance Process 22.4.1 Subject to operational requirements,

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • Postal Interruption A Party to this Agreement will not mail a document it is required to mail under this Agreement if the Party is aware of an actual or impending disruption of postal service.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!