Unauthorized Transfer Of Property Sample Clauses

Unauthorized Transfer Of Property. We" do not cover loss or damage to property that has been transferred to a person or to a place outside the described premises on the basis of unauthorized instructions.
AutoNDA by SimpleDocs
Unauthorized Transfer Of Property. We" do not cover loss or damage to property that has been transferred to a person or to a place outside the described premises on the basis of unauthorized instructions. a. entering through an opening created by a covered peril; or b. the loss or damage is caused by or results from thawing of snow, sleet, or ice on the building or structure. 6. Jewelry, Watches, Jewels, Pearls, Precious Stones, Or Metals -- "We" do not pay more than $2,500 total in any one occurrence for loss by theft of jewelry; watches; watch movements; jewels; pearls; precious or semi-precious stones; bullion, gold, silver, or other precious alloys or metals; or items consisting primarily of precious metals. However, this limitation does not apply to jewelry or watches worth $100 or less per item. 7. Missing Property -- "We" do not cover missing property where the only proof of loss is unexplained or mysterious disappearance, shortage discovered upon taking inventory, or any other instance where there is no physical evidence to show what happened to the property. "We" provide the following additional property coverages. Unless otherwise stated, each additional coverage provides an additional amount of insurance.

Related to Unauthorized Transfer Of Property

  • UNAUTHORIZED TRANSFERS To report a lost or stolen Card, PIN, Access Code or any combination thereof, You will call Us at the telephone number shown in this Agreement. You may also report the loss of a Card, PIN, Access Code or any combination thereof, by writing to Us at the address shown in this Agreement. You should also call the number or write to the address listed above if You believe a transfer has been made using the information from Your check without Your permission.

  • Unauthorized Transactions You are not responsible for unauthorized Transactions. A Transaction is considered an “unauthorized Transaction” if we complete an investigation and determine that: • The Account was used by someone other than you; • You did not receive any benefit from the Transaction; • You co-operated fully with us in our investigation; and • You followed your responsibilities under this Agreement, including in these sections: i. “Unauthorized Transactions” , ii. “Using the Account”

  • Transfer of Materials To facilitate the conduct of activities under the Research Plan or an Additional Research Plan, as applicable, either Party (the “Transferor Party”) may, at its election, provide Materials to the other Party (the “Transferee Party”) solely as mutually agreed by the Parties or as set forth in the Research Plan or any Additional Research Plan. All such Materials (a) will remain the sole property of the Transferor Party, (b) will be used only in the exercise if the Transferee Party’s rights or fulfillment of the Transferee Party’s obligations under this Agreement, (c) except as provided in the Research Plan or Additional Research Plan or as otherwise agreed by the Parties, (i) will remain solely under the control of the Transferee Party, (ii) will not be used or delivered by the Transferee Party to or for the benefit of any Third Party, and (iii) will not be used in research or testing involving human subjects, and (d) will be subject to all additional restrictions and obligations that the Transferor Party has identified in a written notice to the Transferee Party as being necessary for the Transferor Party to comply with its obligations to Third Parties with respect to the applicable Material, which notice is provided at or prior to the delivery of such Materials to the Transferee Party. Without limitation to ARTICLE 7, all Materials supplied under this Section 2.1.9 are supplied “as is”, with no warranties of fitness for a particular purpose, and must be used with prudence and appropriate caution in any experimental work, as not all of their characteristics may be known. Following the completion of the activities for which the applicable Materials were supplied under this Section 2.1.9 or upon the Transferor Party’s earlier request, the Transferee Party will either destroy or return to the Transferor Party, at the Transferor Party’s sole discretion, all Materials provided by the Transferor Party that are unused; provided that Vertex will have the right to retain and continue to use any Materials provided by Company that Vertex has the right to Exploit under the license granted to Vertex pursuant to Section 4.1.1.

  • Transfer of Personal Information Supplier warrants to DXC that Personal Information provided to Supplier or obtained by Supplier under this Agreement on behalf of DXC (including any SOW) shall not be transferred across national boundaries unless authorized by law or specified within this Agreement or the applicable SOW as authorized for transfer across national boundaries. Supplier agrees that any such transfer will only be made in compliance with applicable Data Privacy Laws. If there is a conflict between this Section ‘Data Protection and Privacy’ and the other provisions of this Agreement, the requirements of this Section shall take precedence.

  • Contact in Event of Unauthorized Transfer If you believe your Card and/or access code has been lost or stolen or that someone has transferred or may transfer money from your account without your permission, either call us immediately at:

  • Your Liability for Unauthorized Transfers Immediately following your discovery of an unauthorized Payment Instruction, you shall communicate with customer care for the Service in the manner set forth in Section 6 of the General Terms above. You acknowledge and agree that time is of the essence in such situations. If you tell us within two (2) Business Days after you discover your password or other means to access your account through which you access the Service has been lost or stolen, your liability is no more than $50.00 should someone access your account without your permission. If you do not tell us within two (2) Business Days after you learn of such loss or theft, and we can prove that we could have prevented the unauthorized use of your password or other means to access your account if you had told us, you could be liable for as much as $500.00. If your monthly financial institution statement contains payments that you did not authorize, you must tell us at once. If you do not tell us within sixty (60) days after the statement was sent to you, you may lose any amount transferred without your authorization after the sixty (60) days if we can prove that we could have stopped someone from taking the money had you told us in time. If a good reason (such as a long trip or a hospital stay) prevented you from telling us, we will extend the time periods specified above to a reasonable period.

  • Transfer of Personal Data The Participant authorizes, agrees and unambiguously consents to the transmission by the Company (or any Subsidiary) of any personal data information related to the RSUs awarded under this Agreement for legitimate business purposes (including, without limitation, the administration of the Plan). This authorization and consent is freely given by the Participant.

  • Transfer of Licenses Lessee shall use reasonable efforts (i) to transfer to Lessor or Lessor’s nominee all licenses, operating permits and other governmental authorizations and all contracts, including contracts with governmental or quasi-governmental entities, that may be necessary for the operation of the Hotel (collectively, “Licenses”), or (ii) if such transfer is prohibited by law or Lessor otherwise elects, to cooperate with Lessor or Lessor’s nominee in connection with the processing by Lessor or Lessor’s nominee of any applications for, all Licenses; provided, in either case, that the costs and expenses of any such transfer or the processing of any such application shall be paid by Lessor or Lessor’s nominee.

  • Transfer of Data The Participant consents to the Company or any Affiliate thereof processing data relating to the Participant for legal, personnel, administrative and management purposes and in particular to the processing of any sensitive personal data relating to the Participant. The Company may make such information available to any Affiliate thereof, those who provide products or services to the Company or any Affiliate thereof (such as advisers and payroll administrators), regulatory authorities, potential purchasers of the Company or the business in which the Participant works, and as may be required by law.

  • Transfer of Technology 1. The Parties agree to exchange views and information on their law and international practices on the protection and enforcement of intellectual property rights, affecting transfer of technology. This shall, in particular, include exchanges on measures to facilitate information flows, business partnerships, and voluntary licensing and subcontracting agreements. Particular attention shall be paid to the conditions necessary to create an adequate enabling environment for technology transfer in the host countries, including issues such as the domestic legal framework and the development of human capital. 2. When measures are taken with regard to technology transfer, the legitimate interests of the intellectual property right holders shall be protected.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!