UNAUTHORIZED RETURN LOCATION Sample Clauses

UNAUTHORIZED RETURN LOCATION. If your rental is not returned to the agreed return location, you may be charged an unauthorized Rental return location fee of up to $75.00 plus an additional mileage or towing cost to cover the cost of collecting the rental. If the Rental is abandoned or left outside the 100-mile radius of our location, you will be charged for all costs associated with towing the rental back to our storage facility, plus an additional fee of $150.00 for the unauthorized return location.
AutoNDA by SimpleDocs
UNAUTHORIZED RETURN LOCATION. In the event your Vehicle is not returned to the agreed Return Location, you may be charged an unauthorized vehicle return location fee of up to $75.00 plus an additional mileage or towing cost to cover the cost to RNR of collecting the Vehicle. If the Vehicle is abandoned or left outside the Driving Area Limit, you will be charged for all costs associated with towing the Vehicle back to our vehicle storage facility plus an additional fee of $150.00 for the unauthorized return location.

Related to UNAUTHORIZED RETURN LOCATION

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Carrier Change Charges In the event either Party requests that the other Party install, provide, change, or terminate a Customer’s Telecommunications Service (including, but not limited to, a Customer’s selection of a primary Telephone Exchange Service Provider) without having obtained authorization from the Customer for such installation, provision, selection, change or termination in accordance with Applicable Laws, the requesting Party shall be liable to the other Party for all charges that would be applicable to the Customer for the initial change in the Customer’s Telecommunications Service and any charges for restoring the Customer’s Telecommunications Service to its Customer-authorized condition (all such charges together, the “Carrier Change Charges”), including to the appropriate primary Telephone Exchange Service provider. Such Carrier Change Charges may be assessed on the requesting Party by the other Party at any time after the Customer is restored to its Customer-authorized condition.

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Protection from Unauthorized Use Licensee shall secure that Participating Institutions will use reasonable efforts to restrict access to the Licensed Materials to Authorized Users.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

Time is Money Join Law Insider Premium to draft better contracts faster.