Secure your PIN, Passwords and SIM Card Sample Clauses

Secure your PIN, Passwords and SIM Card. 13.1 You must ensure that you keep the SIM Card safe and secure whilst it is in your possession and you must ensure that you are able to return it to us, if required to do so by us at any time, as set out in these Conditions. There will be a charge for any replacement SIM Card, unless the original SIM Card is defective.
AutoNDA by SimpleDocs

Related to Secure your PIN, Passwords and SIM Card

  • Loading Your Card You may add funds to your Card, called "value loading", at any time. Value will be "loaded" or added to the Card after it has been activated and the authenticity of the Card and/or "load" instruction has been verified. You can add ("reload") additional value to your Card in any of the following ways: (a) making a payment at your local Xxxxxxx Federal Credit Union branch; (b) direct deposit to the Card through an Automated Clearing House (“ACH”) funds transfer and receive the funds up to 2 days early dependent on the timing of payer’s submission of ach deposit versus the scheduled payment date; (c) visiting xxx.xxxx.xxx or calling 866-901- 8090 to initiate an ACH funds transfer from your designated funding account; d) transfer funds to your Card from an eligible checking or savings account held by you at a U.S. financial institution by means of using the Bank’s online banking system; or e) visit participating Visa ReadyLink merchants to reload, merchants reserve the right to charge a fee. Find a Visa ReadyLink merchant at: xxxxx://xxx.xxxx.xxx/pay-with-visa/cards/services-locator.html. A load or reload fee may apply for each load or reload. The minimum amount of the initial load and each reload transaction load is $10.00. The maximum amount of the initial cash load and each cash reload is $2500.00 per transaction, with a total cumulative cash load/reload limit of $2500.00 per day. The maximum amount of value that can reside on the Card at any time is $2500.00. The number of loads on a Non-Personalized Card is limited to four (4) including the initial load. Personalized Cards have unlimited reload capabilities. We may increase or decrease these limits from time to time in our sole discretion without prior notice to you. We will limit the number of Cards provided to you. We reserve the right to accept or reject any request to load or reload value to the Card at our sole discretion. With the exception of reloads performed through direct deposit, the Card may only be reloaded by the Cardholder. AN UNAUTHORIZED USER MAY NOT RELOAD FUNDS TO THE CARD. You can receive Automated Clearing House (“ACH”) direct deposits. You may provide your Card Account number for these deposits, but you agree not to provide your Card Account number to third parties to withdraw funds. If you are a party to an ACH entry, you agree to be bound by the rules and regulations of the National Automated Clearing House Association ("NACHA") Operating Rules and Guidelines (collectively, the “NACHA Rules”), the rules of any local ACH, and the rules of any other system through which the entry is made. Provisional Payment. Credit we give you with respect to an ACH credit entry is provisional until we receive final settlement for that entry through a Federal Reserve Bank. If we do not receive final settlement, you agree that we are entitled to a refund of the amount credited to you in connection with the entry, and the party making the payment to you via such entry (i.e., the originator of the entry) shall not be deemed to have paid you in the amount of such entry. Notice of Receipt. Under the NACHA Rules, which are applicable to ACH transactions involving your Card Account, we are not required to give next day notice to you of receipt of ACH item and we will not do so. However, we will continue to notify you of the receipt of payments in the account transaction history made available to you. You may also use the Mobile Cashed Check Load service offered by Ingo Money, Inc. (a third-party service provider) to load funds from eligible cashed checks to your Card using your mobile device. Even though we may allow use of the Mobile Cashed Check Load service to add money to your Card, we do not provide this service and are not responsible for any service-related issues. To use this service, you must agree to the terms and conditions the service provider establishes from time to time. Although we do not charge any fees in connection with Mobile Cashed Check Loads, the service provider providing such service may charge a fee depending on the funding option you select. The terms and conditions, including the applicable fees, will be provided to you at the time you sign up for the service. You can sign up for this service by visiting xxxxx://xxx.xxxxxxxxx.xxx. The service provider should notify you about any fees for a particular load before you authorize the load. Generally, you will not have access to the money you load via the Mobile Cashed Check Load service until your check clears (this can take up to ten (10) business days). The service provider may offer immediate funds availability for a fee. See the Ingo Money Service Terms and Conditions at xxxxx://xxxxxxxxx.xxx/terms- conditions.html for limitations and complete details. Currently, these are the only methods that you can load your Card by check or money order.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Secure Your Tax Records from Identity Theft Identity theft occurs when someone uses your personal information such as your name, SSN, or other identifying information, without your permission, to commit fraud or other crimes. An identity thief may use your SSN to get a job or may file a tax return using your SSN to receive a refund. To reduce your risk: • Protect your SSN, • Ensure your employer is protecting your SSN, and • Be careful when choosing a tax preparer. If your tax records are affected by identity theft and you receive a notice from the IRS, respond right away to the name and phone number printed on the IRS notice or letter. If your tax records are not currently affected by identity theft but you think you are at risk due to a lost or stolen purse or wallet, questionable credit card activity or credit report, contact the IRS Identity Theft Hotline at 1-800-908-4490 or submit Form 14039. For more information, see Publication 4535, Identity Theft Prevention and Victim Assistance. Victims of identity theft who are experiencing economic harm or a system problem, or are seeking help in resolving tax problems that have not been resolved through normal channels, may be eligible for Taxpayer Advocate Service (TAS) assistance. You can reach TAS by calling the TAS toll-free case intake line at 1-877-777-4778 or TTY/TDD 1-800-829-4059. Protect yourself from suspicious emails or phishing schemes. Phishing is the creation and use of email and websites designed to mimic legitimate business emails and websites. The most common act is sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to xxxxxxxx@xxx.xxx. You may also report misuse of the IRS name, logo, or other IRS property to the Treasury Inspector General for Tax Administration (TIGTA) at 1-800-366-4484. You can forward suspicious emails to the Federal Trade Commission at: xxxx@xxx.xxx or contact them at xxx.xxx.xxx/xxxxxxx or 1-877-IDTHEFT (1-877-438-4338). Visit XXX.xxx to learn more about identity theft and how to reduce your risk.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)

  • Restricted Use By Outsourcers / Facilities Management, Service Bureaus or Other Third Parties Outsourcers, facilities management or service bureaus retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: 1) Licensee gives notice to Contractor of such party, site of intended use of the Product, and means of access; and 2) such party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and 3) if such party is engaged in the business of facility management, outsourcing, service bureau or other services, such third party will maintain a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non-Disclosure Agreement create or impose any liabilities on the State or Licensee. Any third party with whom a Licensee has a relationship for a state function or business operation, shall have the temporary right to use Product (e.g., JAVA Applets), provided that such use shall be limited to the time period during which the third party is using the Product for the function or business activity.

Time is Money Join Law Insider Premium to draft better contracts faster.