TERMS FOR THE USE OF THE SERVICES Sample Clauses

TERMS FOR THE USE OF THE SERVICES. The Member agrees that he/she shall be bound at all times by the Terms of Use for each Service offered under the Plan. The details of the Services provided and a summary of the Terms of Use for each Service are provided in the following clauses.
AutoNDA by SimpleDocs
TERMS FOR THE USE OF THE SERVICES. The Member agrees that he/she shall be bound at all times by the Terms of Use for the Service offered. The details of the Service provided and a summary of the Terms of Use for each Service are provided in the following clauses. MWR Life, in association with CLC ID Protect, provides the following services to the Member: The Member shall be entitled to unlimited access to Fraud Resolution Specialists, including a limited Power of Attorney to assist the Member in the recovery. The Member will also be entitled for a 60-minute consultation with a network attorney in order to get assistance regarding any legal needs resulting from being a victim of Identity Theft. The Member shall also be entitled to a 25% discount on the normal fees and charges of the legal network attorney. Emergency Response Kit – By making a Call to the Fraud Resolution Specialist will activate this benefit which includes a 7 step Fraud Resolution Emergency Response ™ and also includes assisting Members with reporting fraud to: Credit Bureaus, Creditors, & Authorities. Automated Alerts – Upon enrolling in monitoring, the Member will receive real-time text or email alerts. When an alert comes into your dashboard, you have the capability to easily click on the “Red Alert”-Not Me” response. This response will be pushed back to the source of the transaction alert and can sometimes stop the fraudulent transaction. High Risk Transaction Monitoring (SSN) - Social Security Number monitoring feature uses cutting-edge technology to monitor hundreds of millions of online records for unauthorized usage of your SSN. When we find anything suspicious you receive a real time alert that allows you to take action to protect the most important you own. Credit/Debit Card Monitoring - We monitor the Internet for fraudulent activity involving consumers’ personal information, such as a credit card account, debit card account, PIN numbers and other personal information in Internet hacker chat rooms and the dark web Data Sweep Monitoring - We monitor the Internet to find your exposed personal information—phone numbers, addresses, birth date, and more —then we help you take it down and automatically process opt-outs on your behalf. Identity Risk Score - Our scan returns an on-time analysis of identity fraud risk based on proprietary algorithms and historical data. Credit Report (single bureau) - 24/7 view from member’s dashboard of TransUnion’s credit report. Refreshed once each year. Credit Score - 24/7 view from m...

Related to TERMS FOR THE USE OF THE SERVICES

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • Sub-adviser’s Use of the Services of Others The Sub-Adviser may (at its cost except as contemplated by Section 5 of this Agreement) employ, retain, or otherwise avail itself of the services or facilities of other persons or organizations for the purpose of obtaining such statistical and other factual information, such advice regarding economic factors and trends, such advice as to occasional transactions in specific securities, or such other information, advice, or assistance as the Sub-Adviser may deem necessary, appropriate, or convenient for the discharge of its obligations hereunder or otherwise helpful to the Sub-Adviser, as appropriate, or in the discharge of Sub-Adviser's overall responsibilities with respect to the other accounts that it serves as investment manager or counselor, provided that the Sub-Adviser shall at all times retain responsibility for making investment recommendations with respect to the Fund.

  • Use of the Service 12.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 12; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 12.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 12.3 You must ensure that any software you use in relation to the Service is properly licensed. 12.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 12.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 12.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 12.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 12.8 You may request additional users on the Service in accordance with the Pricing Schedule. 12.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 12.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Fair Use Policy or upon the request of an authorised authority. 12.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • B1 The Services The Contractor shall supply the Services during the Contract Period in accordance with the Authority’s requirements as set out in the Specification and the provisions of the Contract in consideration of the payment of the Contract Price. The Authority may inspect and examine the manner in which the Contractor supplies the Services at the Premises during normal business hours on reasonable notice.

  • Manager’s Use of the Services of Others The Manager may (at its cost except as contemplated by Paragraph 4 of this Agreement) employ, retain or otherwise avail itself of the services or facilities of other persons or organizations for the purpose of providing the Manager or the Corporation or Fund, as appropriate, with such statistical and other factual information, such advice regarding economic factors and trends, such advice as to occasional transactions in specific securities or such other information, advice or assistance as the Manager may deem necessary, appropriate or convenient for the discharge of its obligations hereunder or otherwise helpful to the Corporation or Fund, as appropriate, or in the discharge of Manager's overall responsibilities with respect to the other accounts which it serves as investment manager.

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

  • Scope of the Services UNOPS intends to retain the Contractor for the implementation of the Services, and the Contractor intends to provide the Services. The Contractor has represented to UNOPS that it has the appropriate experience, expertise, licences, and resources to undertake the Services and has agreed to undertake the Services in accordance with the Contract. In reliance on the Contractor’s representations UNOPS has entered into the Contract. The Contract sets out the terms and conditions upon which the Contractor will undertake the Services.

  • Performance of the Services In addition to the Common Articles, it is specified that:

  • Access to the Services ID’s for access to Vendor Core Research and Analyst Inquiry may not be shared. Access to the Services is restricted to the number of named individuals (each a “Licensed User”) as identified in the Customer Purchase Order.

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!