Uncashed Checks If we remit your payment to a payee by mailing your payee a check drawn on your account and the check has not been presented for payment within [our payment cut-off period], we will investigate the status of the check. If the Payee cannot be reached, or the payment is to an individual and the check has not been presented for payment by ninety (90) days after the date the funds are withdrawn from your account, we will place a stop payment order on the check and refund your Account.
Substitute Checks You agree not to deposit any substitute check or similar item that you have created, or for which no financial institution has provided any substitute check warranties and indemnity. If you do so, you agree to indemnify us for all losses we incur in connection with the substitute check or item. You agree not to deposit any substitute check without our consent.
Unacceptable Uses The following uses will be regarded as not acceptable:
Credit Checks 9.1 The Customer agrees that:
Credit Check You are authorized, in your discretion, should you for any reason deem it necessary for your protection to request and obtain a consumer credit report for the Customer.
Background Checks The State may require that the Contractor and Contractor Parties undergo criminal background checks as provided for in the State of Connecticut Department of Emergency Services and Public Protection Administration and Operations Manual or such other State document as governs procedures for background checks. The Contractor and Contractor Parties shall cooperate fully as necessary or reasonably requested with the State and its agents in connection with such background checks.
Acceptable Insurers All insurance policies shall be issued by an insurance company currently authorized by the Insurance Commissioner to transact business of insurance or is on the List of Approved Surplus Line Insurers in the State of California, with an assigned policyholders’ Rating of A- (or higher) and Financial Size Category Class VI (or larger) in accordance with the latest edition of Best’s Key Rating Guide, unless otherwise approved by the DISTRICT’s Risk Manager.
Acceptable credit rating For the purposes of clause 12.1, an acceptable credit rating means that the Retailer or the third party (as the case may be):
Offense Level Calculations i. The base offense level is 7, pursuant to Guideline § 2B1.1(a)(1).
Unacceptable Use The following is considered unacceptable use of the school’s ICT facilities and online platforms by any member of the school community. Any breach of this policy may result in disciplinary or behaviour proceedings (see section 4.2 below). Unacceptable use of the school’s ICT facilities includes: Using the school’s ICT facilities to breach intellectual property rights or copyright Using the school’s ICT facilities to bully or harass someone else, or to promote unlawful discrimination Breaching the school’s policies or procedures Any illegal conduct, or statements which are deemed to be advocating illegal activity Accessing, creating, storing, linking to or sending material that is pornographic, offensive, obscene or otherwise inappropriate Activity which defames or disparages the school, or risks bringing the school into disrepute Sharing confidential information about the school, its pupils, or other members of the school community Connecting any device to the school’s ICT network without approval from authorised personnel Setting up any software, applications or web services on the school’s network without approval by authorised personnel, or creating or using any program, tool or item of software designed to interfere with the functioning of the ICT facilities, accounts or data Gaining, or attempting to gain, access to restricted areas of the network, or to any password-protected information, without approval from authorised personnel Allowing, encouraging, or enabling others to gain (or attempt to gain) unauthorised access to the school’s ICT facilities Causing intentional damage to ICT facilities Removing, deleting or disposing of ICT equipment, systems, programs or information without permission by authorised personnel Causing a data breach by accessing, modifying, or sharing data (including personal data) to which a user is not supposed to have access, or without authorisation Using inappropriate or offensive language Promoting a private business, unless that business is directly related to the school Using websites or mechanisms to bypass the school’s filtering mechanisms This is not an exhaustive list. The school reserves the right to amend this list at any time. The headteacher or other delegated member of SLT will use professional judgement to determine whether any act or behaviour not on the list above is considered unacceptable use of the school’s ICT facilities.