Unauthorized payment operations Sample Clauses

Unauthorized payment operations. If an unauthorized payment operation is initiated through a payment initiation service provider, and to the extent that the Customer complies with the conditions laid down under point 5.10.1. and 5.10.2. above, regarding the payment operations within the scope of the Law on payment services, the Bank shall: (i) reimburse immediately or at the latest at the end of the next business day, the value of the unauthorized payment operation; and shall (ii) restore the payment account debited to the situation that it would have been in, if the unauthorized payment transaction had not taken place, if applicable. In such case, the Bank is entitled to address the payment initiation service provider, with the latter having the legal obligation to provide proof that, within the limits of its competence, the payment transaction was authenticated, correctly registered and was not affected by any a technical failure or other deficiencies related to the payment services that it is responsible for. In this context, the Customer shall cooperate with the Bank and shall provide the relevant information he/she holds, in order to support the Bank's efforts to get compensated for all losses incurred or amounts paid following the reimbursement granted to the Customer.
AutoNDA by SimpleDocs
Unauthorized payment operations. The institutions will be exempt from liability with respect to Payment orders, even being against the will of the payer, have been obtained as a result of an order received by the institution for whose authentication the established security requirements have been met. The use of the PIN by a person other than the HOLDER presupposes gross negligence or, fraud on the part of the HOLDER. The institutions without prejudice to adopting the measures it deems pertinent, is exempt from liability in case of lack of attention to your card by any of the businesses, banks and savings banks committed to the sale of goods or provision of services, or for incidents of a technical or operational nature in ATMs. The institutions will also be exempt from liability regardless of the incidents and responsibilities that may arise from the operation carried out between the establishment and the CARD HOLDER. The institutions exclude, from the scope of its application, Visa's Zero Liability Policy (Visa Global Zero Liability Policy), submitting to current European regulations on the matter. The system of liability of the ordering party in the event of unauthorised payment transactions, which, in each case, regulates the applicable legislation on the matter, shall apply. Specifically, the HOLDER who does not hold the status of consumer or micro-enterprise in the terms established in Royal Decree-Law 19/2018, of November 23, on payment services and other urgent measures in financial matters, will be obliged to bear the losses derived from unauthorised payment operations resulting from the use of the lost, stolen or improperly appropriated payment instrument by a third party, as long as the loss, theft or misappropriation of the payment instrument is not reported to the institutions.

Related to Unauthorized payment operations

  • Illegal or Unauthorized Payments; Political Contributions Neither the Company nor any of its Subsidiaries nor, to the best of the Company’s knowledge (after reasonable inquiry of its officers and directors), any of the officers, directors, employees, agents or other representatives of the Company or any of its Subsidiaries or any other business entity or enterprise with which the Company or any Subsidiary is or has been affiliated or associated, has, directly or indirectly, made or authorized any payment, contribution or gift of money, property, or services, whether or not in contravention of applicable law, (i) as a kickback or bribe to any Person or (ii) to any political organization, or the holder of or any aspirant to any elective or appointive public office except for personal political contributions not involving the direct or indirect use of funds of the Company or any of its Subsidiaries.

  • Sub-Advisor Compliance Policies and Procedures The Sub-Advisor shall promptly provide the Trust CCO with copies of: (i) the Sub-Advisor’s policies and procedures for compliance by the Sub-Advisor with the Federal Securities Laws (together, the “Sub-Advisor Compliance Procedures”), and (ii) any material changes to the Sub-Advisor Compliance Procedures. The Sub-Advisor shall cooperate fully with the Trust CCO so as to facilitate the Trust CCO’s performance of the Trust CCO’s responsibilities under Rule 38a-1 to review, evaluate and report to the Trust’s Board of Trustees on the operation of the Sub-Advisor Compliance Procedures, and shall promptly report to the Trust CCO any Material Compliance Matter arising under the Sub-Advisor Compliance Procedures involving the Sub-Advisor Assets. The Sub-Advisor shall provide to the Trust CCO: (i) quarterly reports confirming the Sub-Advisor’s compliance with the Sub-Advisor Compliance Procedures in managing the Sub-Advisor Assets, and (ii) certifications that there were no Material Compliance Matters involving the Sub-Advisor that arose under the Sub-Advisor Compliance Procedures that affected the Sub-Advisor Assets. At least annually, the Sub-Advisor shall provide a certification to the Trust CCO to the effect that the Sub-Advisor has in place and has implemented policies and procedures that are reasonably designed to ensure compliance by the Sub-Advisor with the Federal Securities Laws.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract. a. The contractor shall notify all potential subcontractors and suppliers and lessors of their EEO obligations under this contract. b. The contractor will use good faith efforts to ensure subcontractor compliance with their EEO obligations.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Regulatory Investigations TCI and TLIC agree to cooperate fully in any insurance or judicial regulatory investigation or proceeding arising in connection with Contracts distributed under this Agreement. TCI and TLIC further agree to cooperate fully in any securities regulatory inspection, inquiry, investigation or proceeding or any judicial proceeding with respect to TLIC, TCI, their affiliates and their representatives to the extent that such inspection, inquiry, investigation or proceeding or judicial proceeding is in connection with Contracts distributed under this Agreement. Without limiting the foregoing: (a) TCI will be notified promptly of any customer complaint or notice of any regulatory inspection, inquiry investigation or proceeding or judicial proceeding received by TLIC with respect to TCI or any representative or which may affect TLIC’s issuance of any Contracts marketed under this Agreement; and (b) TCI will promptly notify TLIC of any customer complaint or notice of any regulatory inspection, inquiry, investigation or judicial proceeding received by TCI or any representative with respect to TLIC or its affiliates in connection with any Contracts distributed under this Agreement. In the case of a customer complaint, TCI and TLIC will cooperate in investigating such complaint and shall arrive at a mutually satisfactory response.

  • Responsibilities of Business Associate Business Associate agrees:

  • Search, Enquiry, Investigation, Examination And Verification a. The Property is sold on an “as is where is basis” subject to all the necessary inspection, search (including but not limited to the status of title), enquiry (including but not limited to the terms of consent to transfer and/or assignment and outstanding charges), investigation, examination and verification of which the Purchaser is already advised to conduct prior to the auction and which the Purchaser warrants to the Assignee has been conducted by the Purchaser’s independent legal advisors at the time of execution of the Memorandum. b. The intending bidder or the Purchaser is responsible at own costs and expenses to make and shall be deemed to have carried out own search, enquiry, investigation, examination and verification on all liabilities and encumbrances affecting the Property, the title particulars as well as the accuracy and correctness of the particulars and information provided. c. The Purchaser shall be deemed to purchase the Property in all respects subject thereto and shall also be deemed to have full knowledge of the state and condition of the Property regardless of whether or not the said search, enquiry, investigation, examination and verification have been conducted. d. The Purchaser shall be deemed to have read, understood and accepted these Conditions of Sale prior to the auction and to have knowledge of all matters which would have been disclosed thereby and the Purchaser expressly warrants to the Assignee that the Purchaser has sought independent legal advice on all matters pertaining to this sale and has been advised by his/her/its independent legal advisor of the effect of all the Conditions of Sale. e. Neither the Assignee nor the Auctioneer shall be required or bound to inform the Purchaser of any such matters whether known to them or not and the Purchaser shall raise no enquiry, requisition or objection thereon or thereto.

  • LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Loop Testing/Trouble Reporting 2.1.6.1 Telepak Networks will be responsible for testing and isolating troubles on the Loops. Telepak Networks must test and isolate trouble to the BellSouth portion of a designed/non-designed unbundled Loop (e.g., UVL-SL2, UCL-D, UVL-SL1, UCL-ND, etc.) before reporting repair to the UNE Customer Wholesale Interconnection Network Services (CWINS) Center. Upon request from BellSouth at the time of the trouble report, Telepak Networks will be required to provide the results of the Telepak Networks test which indicate a problem on the BellSouth provided Loop. 2.1.6.2 Once Telepak Networks has isolated a trouble to the BellSouth provided Loop, and had issued a trouble report to BellSouth on the Loop, BellSouth will take the actions necessary to repair the Loop if a trouble actually exists. BellSouth will repair these Loops in the same time frames that BellSouth repairs similarly situated Loops to its End Users. 2.1.6.3 If Telepak Networks reports a trouble on a non-designed or designed Loop and no trouble actually exists, BellSouth will charge Telepak Networks for any dispatching and testing (both inside and outside the CO) required by BellSouth in order to confirm the Loop’s working status. 2.1.6.4 In the event BellSouth must dispatch to the end-user’s location more than once due to incorrect or incomplete information provided by Telepak Networks (e.g., incomplete address, incorrect contact name/number, etc.), BellSouth will xxxx Xxxxxxx Networks for each additional dispatch required to repair the circuit due to the incorrect/incomplete information provided. BellSouth will assess the applicable Trouble Determination rates from BellSouth’s FCC or state tariffs.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!