Teller Access Service Sample Clauses

Teller Access Service. U As part of the PPY check in accordance with our standard check cashing procedures. service, we will also make your issue files available to our branches to assist our tellers in cashing checks. This is referred to as “teller access.” We provide teller access because fraud involving checks presented to tellers for cashing is a common form of check fraud. Using our teller access service is a good way to defend against that form of fraud. If a check presented for payment over the counter in one of our branches against an account that uses teller access (A) is presented before we have received and processed an issue file for such check or (B) is a mismatched check, we will attempt to obtain approval for payment of the mismatched check by calling one of the people you must designate as a “telephone representative” for the relevant account in your PPY service profiles in effect at the relevant time. We will make one attempt to call each telephone representative for the relevant account until we have reached one of them. Each telephone representative is authorized to instruct us to pay or return any mismatched check. If the telephone representative we contact instructs us to pay the check, then you have authorized us to finally pay the check and charge it against the relevant account. If we are unable to contact a telephone representative, or the telephone representative we contact does not instruct us to pay the mismatched check, then you have authorized us to return the check unpaid to the person presenting it to us. Our documentation showing that we contacted or attempted to contact your telephone representatives will be conclusive evidence as to the reason for the action we took. If you do not name at least one telephone representative for each account for which you have elected the PPY service or you fail to keep the telephone representative information reflected in the relevant service profile up to date, you will be deemed to have “opted out” of the teller access service for that account and you agree that we will not have any liability for paying any check presented over the counter in one of our branches, whether or not such check bears a forged or unauthorized signature or is counterfeit, altered or otherwise fraudulent or not validly issued, so long as we otherwise process that check in accordance with our standard check cashing procedures.
AutoNDA by SimpleDocs

Related to Teller Access Service

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Switched Exchange Access Service The offering of transmission and switching services for the purpose of the origination or termination of Toll Traffic. Switched Exchange Access Services include but may not be limited to: Feature Group A, Feature Group B, Feature Group D, 700 access, 800 access, 888 access and 900 access.

  • Verizon OSS Services Access to Verizon Operations Support Systems functions. The term “Verizon OSS Services” includes, but is not limited to: (a) Verizon’s provision of Z-Tel Usage Information to Z-Tel pursuant to Section 8.1.3 below; and, (b) “Verizon OSS Information”, as defined in Section 8.1.4 below.

  • Special Access Service Conversions 5.3.6.1 IDS may not convert special access services to combinations of loop and transport network elements, whether or not IDS self-provides its entrance facilities (or obtains entrance facilities from a third party), unless IDS uses the combination to provide a significant amount of local exchange service, in addition to exchange access service, to a particular customer. To the extent IDS requests to convert any special access services to combinations of loop and transport network elements at UNE prices, IDS shall provide to BellSouth a letter certifying that IDS is providing a significant amount of local exchange service (as described in this Section) over such combinations. The certification letter shall also indicate under what local usage option IDS seeks to qualify for conversion of special access circuits. IDS shall be deemed to be providing a significant amount of local exchange service over such combinations if one of the following options is met:

  • Verizon Retail Telecommunications Service Any Telecommunications Service that Verizon provides at retail to subscribers that are not Telecommunications Carriers. The term “Verizon Retail Telecommunications Service” does not include any Exchange Access service (as defined in Section 3(16) of the Act, 47 U.S.C. § 153(16)) provided by Verizon.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to PCS for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers.

  • NETWORK INTERCONNECTION METHODS 64.1 This Section sets forth the terms and conditions for Network Interconnection Methods (NIMs) provided between CenturyLink and CLEC for the Interconnection Facilities established between the Parties’ networks. Additionally, this Section describes the physical architecture for the Interconnection of the Parties’ facilities and equipment required for the transmission and routing of Local Traffic, ISP-Bound Traffic, IntraLATA LEC Toll Traffic, VoIP-PSTN Traffic, Transit Traffic and Jointly Provided Switched Access Service Traffic.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

Time is Money Join Law Insider Premium to draft better contracts faster.