THEFT PROTECTION Clause Samples
THEFT PROTECTION. Check this box if you wish to receive two (2) years of free identity protection and credit monitoring service.
THEFT PROTECTION. If a student is threatened or endangered by someone demanding the student’s Chromebook, the student should give it to the person and then report the theft. Since DPS can remotely lock the Chromebook’s system if it is lost or stolen, the Chromebook has little value to anyone other than a DPS student. Taking Care of Chromebooks Students are responsible for the general care of their Chromebooks and accessories. Chromebooks that are damaged or malfunctioning should be taken to the school’s technical support person (STR) for repair. Students should: ● Carry their Chromebook in the provided protective case when outside of classrooms. ● Close the Chromebook’s lid before carrying it. ● Keep food or drink away from the Chromebook. ● Wrap the Chromebook’s power cord loosely to avoid breakage. ● Shut down the Chromebook when not in use to conserve battery life. ● Never force the Chromebook into a book bag or a locker containing other heavy objects as this may damage the device. ● Never stack heavy items on top of the Chromebook. ● Insert all cords, cables, and flash drives carefully into the Chromebook to prevent damage. ● Never expose the Chromebook to extreme temperatures or direct sunlight for extended periods of time. Prolonged extreme heat or cold may cause damage to the Chromebook. ● Allow the Chromebook to reach room temperature prior to being turned on. ● Chromebook screens can be damaged if subjected to improper treatment. The screens are particularly sensitive to excessive pressure and temperatures. ● Do not lean on top of the Chromebook. ● Do not carry the Chromebook by the screen or with the lid open. ● Do not place anything near the Chromebook that could put pressure on the screen. ● Before closing the Chromebook lid, make sure the keyboard is cleared of pens, pencils, notebooks, earbuds, etc. ● Only clean the screen with a soft, dry anti-static, or micro-fiber cloth. Do not use window cleaner, water or any other liquid on the Chromebook or its screen. Chromebook Use Chromebooks are intended for use at school every day. Students are responsible for bringing their Chromebooks to all classes, unless otherwise instructed by their teachers. Students should use their Chromebooks and their DPS email accounts for school-related communications and schoolwork. School staff and administration have the right to check any material stored on a student’s Chromebook at any time. All students are required to take their Chromebooks home each night throughout the school y...
THEFT PROTECTION. A service that gives you access to: ● Toll-free legal advice from a Telephone Network Attorney to assist with legal-related problems that the theft of your identity may have caused. ● Identity Theft Materials, including: ● An Identity Theft Prevention Kit to help protect yourself from becoming a victim of identity theft in the first place, ● An Identity Theft Victim Action Kit to help speed your recovery should you become an identity theft victim, ● A tracking document to help you keep track of phone calls, e-mails and letters for attorneys, ● An Identity Theft Affidavit to help you report your identity theft to necessary parties. ● Identity Theft Specialists who will help you determine appropriate steps to begin recovery and help you monitor the progress of your recovery.
THEFT PROTECTION. The unauthorized tapping of cable plant and the unauthorized receipt of programming using cable converters purchased through unauthorized sources are problems which continue to challenge the entire cable industry. We have adopted specific measures to combat the unauthorized use of our plant to receive programming. For instance, in several of our regions, we have instituted a "perpetual audit" whereby each technician is required to check at least four other nearby residences during each service call to determine if there are any obvious signs of piracy, namely, a drop line leading from the main cable line into other homes. Addresses where the technician observes drop lines are then checked against our customer billing records. If the address is not found in the billing records, a sales representative calls on the unauthorized user to correct the "billing discrepancy" and persuade the user to become a formal customer. In our experience, approximately 25% of unauthorized users who are solicited in this manner become customers. Billing records are then closely monitored to guard against these new customers reverting to their status as unauthorized users. Unauthorized users who do not convert are promptly disconnected and, in certain instances, flagrant violators are referred for prosecution. In addition, we have prosecuted individuals who have sold cable converters programmed to receive our signals without proper authorization. 27
THEFT PROTECTION. SSN Subclass Members who submit a valid claim are eligible to receive 24 months of free credit and identity monitoring services, called Identity Defense Complete. These services include: • Credit Monitoring for credit files at Equifax®, Experian®, and TransUnion®, that also sends alerts when suspicious activity occurs that indicates fraud; • Monthly Credit Score and Tracker that tracks credit status and trends with a monthly VantageScore 3.0; • Change of Address Monitoring that sends an alert when mail is rerouted to a new address; • Real-Time Credit Inquiry and Authentication Alerts where you receive a request for certain types of credit inquiries and account transactions using the customer’s Social Security number; • Dark Web Monitoring that tracks and alerts you when personal information is found on the dark web – such as black market websites, secret chat rooms, and underground forums; • High-Risk Transaction Monitoring that monitors your personal information associated with high-risk transactions, such as online password resets, payday loan applications, tax refunds, wire transfers, and account access requests; • Lost wallet Protection, where trained specialists help individuals cancel or replace lost or stolen credit cards; • Security Freeze Assist that helps freeze credit files instantly from up to ten consumer reporting agencies, including the three major credit bureaus; • $1 million dollars in no-deductible insurance provided by a third-party insurer to cover certain costs related to identity theft or fraud; • Victim Assistance and Customer Support from individuals specially trained in identity theft, fraud discovery, high-risk monitoring, and remediation; and • Insight & tips for members on the user dashboard. I want the Free Identity Defense Complete Services for which I am eligible.
THEFT PROTECTION. S4.2 Each vehicle shall have a keylocking sys- tem which, whenever the key is removed, prevents: (a) The normal activation of the vehicle’s engine or motor; and (b) Either steering or forward selfmobility of the vehicle or both Model a keylocking de- vice with lock and un- lock conditions Design the keylocking system to prevent the activation of the motor and steering or selfmo- bility (or both)
THEFT PROTECTION. The Red Flags Rule, a law the Federal Trade Commission has been enforcing, requires certain businesses and organizations, including many doctor’s offices, hospitals and other healthcare providers to confirm the patient’s identity and validate medical insurance coverage to ensure that identity theft has not occurred. To safeguard your identity we will make a copy of your valid picture ID issued by a local, state or federal government agency (driver’s license, passport, military ID, etc.) and a copy of your current insurance card to confirm your identity.
THEFT PROTECTION. Check this box if you did not select the Alternative Cash Payment above and wish to receive two years of free identity protection and credit monitoring service.
THEFT PROTECTION. □ Check this box if you did not select the Alternative Cash Payment and wish to receive 24 months of free identity protection and credit monitoring service.
THEFT PROTECTION. The Wildcat tablet shall include attachment points for installing a standard notebook PC security cable. The attachment points shall allow the unit to be locked when mounted to the desktop docking station in either a portrait or landscape configuration.
