Unauthorized Charges Sample Clauses

Unauthorized Charges. You must immediately notify Rogers by calling Rogers Customer Care in the event that the SIP Services are used in an unauthorized manner. You will be responsible to pay Rogers for all charges up to the time you notify Rogers Customer Care of the breach. You also agree to treat as confidential and non-transferable all access codes and/or passwords that Rogers may provide to you for use with the SIP Services.
AutoNDA by SimpleDocs
Unauthorized Charges. You must immediately notify Rogers by calling Rogers Customer Care in the event that the Services are used in an unauthorized manner. You will be responsible for paying Rogers for all charges up to the time you notify Rogers Customer Care of the breach. You also agree to treat as confidential and non-transferable all access codes and/or passwords that Rogers may provide to you for use with the Services.
Unauthorized Charges. You must immediately notify Rogers by calling Rogers Customer Care in the event that the SIP Voice for Microsoft Teams Services are used in an unauthorized manner. You will be responsible to pay Rogers for all charges up to the time you notify Rogers Customer Care of the breach. You also agree to treat as confidential and non-transferable all access codes and/or passwords that Rogers may provide to you for use with the SIP Voice for Microsoft Teams Services.
Unauthorized Charges. SUBSCRIBER SHOULD USE CARE WHEN ALLOWING ANOTHER PERSON, INCLUDING A CHILD OR OTHER MINOR, TO USE A DEVICE ON SUBSCRIBER'S ACCOUNT. Subscriber is obligated to pay all charges incurred, including charges from any other user of a Device associated with Subscriber's account. Many services and applications are accessible on or through a Device, including purchases of games, movies, music, and other Content. Some of these services are provided by Altice. Others are provided by third parties that may offer the option to bill charges to Subscriber's Xxxxxx xxxx or other methods of payment. Charges may be one- time or recurring. If the purchaser is permitted to have charges billed to Subscriber's account and so chooses, such charges will become part of the amount due for that billing cycle. Subscriber is solely responsible for all charges to such third parties, including all applicable taxes. In addition, Subscriber is solely responsible for protecting the security of credit card and other personal information provided to others in connection with such transactions. Altice may agree to provide billing services on behalf of third parties, as the agent of the third party. Xxxxxx will not be responsible for any dispute regarding charges between Subscriber and any third party. Subscriber must address all such disputes directly with the third party.
Unauthorized Charges. An unauthorized charge is a sale that has been abstracted without approval. (These charges will lack an approval code from the P.O.S. system, have an invalid authorization code, lack an approval code from the credit center, or lack an approval code for amounts over the floor limit when floor limits are in effect. It is understood that charges that are equal to or less than the floor limit when it is in effect will be deemed authorized.) Monogram and MW shall work closely to continue the charge authorization control mechanisms in place in Stores prior to the Conversion Date and to develop new mechanisms to minimize violations of the authorization system. Monogram may immediately chargeback to MW unauthorized charges that are made on a stolen plate or a fraudulent account, provided that Monogram has notified MW and, if the Store is not operated by the Signature Companies or MW, the Store at which the sale was made, of the unauthorized charges within thirty (30) days after receipt by Monogram and/or Assignees of a complaint from a Cardholder. In addition, Monogram may chargeback to MW other unauthorized charges to an Account that is or becomes delinquent, provided that Monogram has notified MW and, if the Store is not operated by the Signature Companies or MW, the Store at which the sale was made, of the unauthorized charges within thirty (30) days after Monogram's discovery of the unauthorized charges.
Unauthorized Charges. An unauthorized charge is a sale that has been abstracted without Bank approval. (These charges will lack an approval code from the P.O.S. system, have an invalid authorization code, lack an approval code from the credit center, or lack an approval code for amounts over the floor limit when floor limits are in effect. It is understood that charges that are equal to or less than the floor limit when it is in effect will be deemed authorized). Bank and Retailer shall work closely to continue the charge authorization control mechanisms in place in Retailer Locations and to develop new mechanisms to minimize violations of the authorization system. Bank may immediately chargeback to Retailer unauthorized charges that are made on a stolen plate or a fraudulent account, provided that Bank has notified Retailer of the unauthorized charges within thirty (30) days of its receipt of a complaint from a Cardholder. In addition, Bank may chargeback to Retailer other unauthorized charges to an Account that is or becomes delinquent (based on the methodology for determining defaulted indebtedness then in effect), provided that Bank has notified Retailer of the unauthorized charges within thirty (30) days of Bank's discovery of the unauthorized charges.
Unauthorized Charges. You are responsible for all charges attributable to your account. You agree to notify Megaphone immediately, in writing or by calling the Megaphone contact number (000) 000-0000, if you believe that Services are being stolen or fraudulently used. You are responsible for all usage charges attributable to your account, even if incurred as the result of fraudulent or unauthorized use by third parties, until you report the theft or fraudulent use of the Services. You are solely responsible for securing all passwords and access numbers to guard against and prevent unauthorized access to Services by third parties. Megaphone, may, but is not obligated to, detect or report unauthorized use or fraudulent use of Services, and may, but is not obligated to, suspend service when fraud is suspected. You agree to save, defend, indemnify and hold Megaphone harmless from all claims, costs, liabilities and damages arising out of such fraudulent use. ALL FRAUD MUST BE NOTICED TO MEGAPHONE WITHIN THIRTY DAYS OF THE INVOICE CONTAINING THE CHARGES, OTHERWISE, YOU ARE RESPONSBILE FOR THE CHARGES.
AutoNDA by SimpleDocs
Unauthorized Charges. Provider shall not impose an additional fee, surcharge, or otherwise “balance xxxx” for Covered Services. In the event that Solstice or Payer receives notification of the imposition of any such additional fee, surcharge or other cost by Provider for Covered Services, Solstice shall take appropriate action to investigate such allegations. Should Solstice, find that an additional surcharge or other cost has been imposed upon an Enrollee by Provider for Covered Services, Solstice shall have the right to take such other necessary action to obtain reimbursement from Provider for such an inappropriate charge and have the right to immediately terminate this contract.

Related to Unauthorized Charges

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!