Use of the OTM Service Sample Clauses

Use of the OTM Service. You may use the OTM service with Details regarding OTM's functionality and certain formatting and other respect to the accounts and services that you have identified (in a form technical requirements that you must follow when using the OTM acceptable to us) and that we have included in our implementation of your setup for the OTM service at the relevant time. Page 44 of 61 TREASURY MANAGEMENT 11 II��� SUDii UST TERMS AND CONDITIONS 3. Security Administrators and Contact. In order to use the OTM least two authorized users be involved in the initiation and release of service, you must designate at least one person who will act as your any wire transfer or ACH transaction through the OTM service. One OTM security administrator and a person who will act as your OTM user with sufficient initiation entitlements must input the transaction contact. You may identify your OTM security administrator(s) and your information; and at least one other user with sufficient approval OTM contact we are to include in our implementation of your setup of entitlements must approve the transaction before it is released and the OTM service in your OTM service profiles as they are in effect at the processed. relevant time. You may set up one or more additional OTM security administrators directly through the OTM service by granting (b) .Secure Browsing Software_. Effective on the administration entitlements to a user. In addition to the OTM security requirement date for the secure browsing software, the security administrator(s) reflected in your OTM service profiles as they are in procedures for the OTM service will include the requirement that each of effect at the relevant time, the term "OTM security administrator" your users logs on to the OTM service from a computer on which you includes any other user set up in the OTM service who is granted have installed and have running Rapport, the secure browsing software administration entitlements by any other OTM security administrator(s). provided by Trusteer Inc. (or one of its affiliates), or other secure In addition to any of the rights and responsibilities of an OTM security browsing software which we may have approved for use with the OTM administrator or OTM contact described in these OTM terms and service from time to time. Trusteer Rapport or such other approved conditions or any OTM reference materials, each of your OTM security secure browsing software is referred to herein as the "secure browsing administrators and OTM co...
AutoNDA by SimpleDocs

Related to Use of the OTM Service

  • Use of Service Each Party shall make commercially reasonable efforts to ensure that its Customers comply with the provisions of this Agreement (including, but not limited to the provisions of applicable Tariffs) applicable to the use of Services purchased by it under this Agreement.

  • Use of Service Areas The service areas, as located within the Project, shall be ear- marked for purposes such as parking spaces and services including but not limited to electric sub-station, transformer, DG set rooms, underground water tanks, Pump rooms, maintenance and service rooms, firefighting pumps and equipment etc. and other permitted uses as per sanctioned plans. The Allottee shall not be permitted to use the services areas in any manner whatsoever, other than those earmarked as parking spaces and the same shall be reserved for use by the Association for rendering maintenance services.

  • Use of the Service 12.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 12; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 12.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 12.3 You must ensure that any software you use in relation to the Service is properly licensed. 12.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 12.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 12.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 12.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 12.8 You may request additional users on the Service in accordance with the Pricing Schedule. 12.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 12.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Fair Use Policy or upon the request of an authorised authority. 12.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • Use of Services Subject to the terms of this Agreement, Stripe grants you a worldwide, non-exclusive, non-transferable, non-sublicensable, royalty-free license during the Term to access the Documentation, and access and use the Stripe Technology, as long as your access and use is (a) solely as necessary to use the Services; (b) solely for your business purposes; and (c) in compliance with this Agreement and the Documentation.

  • USE OF EMPLOYER FACILITIES 27.01 Reasonable space on bulletin boards including electronic bulletin boards where available, in convenient locations will be made available to the Institute for the posting of official Institute notices. The Institute shall endeavour to avoid requests for posting of notices that the Employer, acting reasonably, could consider adverse to its interests or to the interests of any of its representatives. Posting of notices or other materials shall require the prior approval of the Employer, except notices of meetings of their members and elections, the names of Institute representatives, and social and recreational events. Such approval shall not be unreasonably withheld. 27.02 The Employer will also continue its present practice of making available to the Institute specific locations on its premises for the placement of reasonable quantities of literature of the Institute. 27.03 A duly accredited representative of the Institute may be permitted access to the Employer’s premises to assist in the resolution of a complaint or grievance and to attend meetings called by management. Permission to enter the premises shall, in each case, be obtained from the Employer. 27.04 The Institute shall provide the Employer, a list of such Institute representatives and shall advise promptly of any change made to the list.

  • Use of the Name “Xxxxx Xxxxx”. The Adviser hereby consents to the use by the Fund of the name “Xxxxx Xxxxx” as part of the Fund’s name; provided, however, that such consent shall be conditioned upon the employment of the Adviser or one of its affiliates as the investment adviser of the Fund. The name “Xxxxx Xxxxx” or any variation thereof may be used from time to time in other connections and for other purposes by the Adviser and its affiliates and other investment companies that have obtained consent to the use of the name “Xxxxx Xxxxx.” The Adviser shall have the right to require the Fund to cease using the name “Xxxxx Xxxxx” as part of the Fund’s name if the Fund ceases, for any reason, to employ the Adviser or one of its affiliates as the Fund’s investment adviser. Future names adopted by the Fund for itself, insofar as such names include identifying words requiring the consent of the Adviser, shall be the property of the Adviser and shall be subject to the same terms and conditions.

  • COMMERCIAL REUSE OF SERVICES The member or user herein agrees not to replicate, duplicate, copy, trade, sell, resell nor exploit for any commercial reason any part, use of, or access to 's sites.

  • Use of Volunteers The School covenants and represents that all volunteers it allows access to its students or the Facility will comply with state regulations regarding the use of volunteers set out in Section 6.50.18

  • Use of Contractors (a) If the employer wishes to engage contractors and their employees to perform work in the classifications covered by this agreement, the employer must first consult in good faith with the union. Consultation will occur prior to the engagement of sub-contractors. (b) If the employer decides to engage subcontractors, the employer shall ensure that these contractors and their employees receive wages, allowances and conditions equal to or better than those contained in this agreement. (c) The use of sham sub contracting arrangements is a breach of this agreement. The contractor who engages subcontractors is responsible for ensuring the employees of sub- contractors receive wages, allowances and conditions equal to or better those contained in this agreement, this obligation extends to liability for all outstanding wages conditions and entitlements under this agreement.

  • Use of the Name BlackRock The Advisor has consented to the use by the Trust of the name or identifying word "BlackRock" in the name of the Trust. Such consent is conditioned upon the employment of the Advisor as the investment advisor to the Trust. The name or identifying word "BlackRock" may be used from time to time in other connections and for other purposes by the Advisor and any of its affiliates. The Advisor may require the Trust to cease using "BlackRock" in the name of the Trust if the Trust ceases to employ, for any reason, the Advisor, any successor thereto or any affiliate thereof as investment advisor of the Trust.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!