Unauthorized Use Charges Sample Clauses

Unauthorized Use Charges. In the event of any unauthorized receipt or delivery of Gas by or on behalf of Service User not related to an approved Hub Transaction, the Service User causing such unauthorized use of service shall be charged a charge of $10.00 per MMBtu for unauthorized service, such charge being in addition to all other maximum charges for such service as set forth in these General Terms and Conditions; provided, however, nothing herein shall prevent waiver of such charge by both Hub Administrator and Hub Operator, or any portion thereof, on a non-discriminatory basis. An unauthorized transaction is herein defined as a transaction not otherwise covered by an existing tariff.
AutoNDA by SimpleDocs

Related to Unauthorized Use Charges

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.

  • Unauthorized Carrier Change Charges In the event either Party requests that the other Party install, provide, change, or terminate a Customer’s Telecommunications Service (including, but not limited to, a Customer’s selection of a primary Telephone Exchange Service Provider) without having obtained authorization from the Customer for such installation, provision, selection, change or termination in accordance with Applicable Laws, the requesting Party shall be liable to the other Party for all charges that would be applicable to the Customer for the initial change in the Customer’s Telecommunications Service and any charges for restoring the Customer’s Telecommunications Service to its Customer-authorized condition (all such charges together, the “Carrier Change Charges”), including to the appropriate primary Telephone Exchange Service provider. Such Carrier Change Charges may be assessed on the requesting Party by the other Party at any time after the Customer is restored to its Customer-authorized condition.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Authorized Users Authorized Users" are:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!