USING A MOBILE WALLET Sample Clauses

USING A MOBILE WALLET. A mobile wallet permits you to embed your Card within a supported Mobile Device, and use your credentials to complete transactions using your account through a mobile application (“Mobile Wallet”). Mobile Wallet is a service that requires merchants to support specific point- of-sale hardware and software, and you may not be able to use Mobile Wallet at all locations where your Card is normally accepted. The Bank makes no warranty or representation that you will be able to use your Card through Mobile Wallet at all merchants. Mobile Wallets differ in their technology, functions and security procedures, so you must follow the instructions of the Mobile Wallet provider when you enroll in Mobile Wallet. Some Mobile Wallet providers may require you to download and install a mobile application (“App”) required to run the Mobile Wallet. To authorize a transaction you will need to use a biometric security feature (such as a fingerprint or facial recognition), special PIN and/or similar security feature depending on the type of Mobile Wallet. Purchases made using Mobile Wallet are, except as provided below, subject to the same terms and restrictions as purchases made using your Card.
AutoNDA by SimpleDocs
USING A MOBILE WALLET. A mobile wallet permits you to embed your eligible debit or credit card within a supported Mobile Device, and use your credentials to complete transactions using your Account through a mobile application (“Mobile Wallet”). Mobile Wallet is a service that requires merchants to support specific POS hardware, and you may not be able to use Mobile Wallet at all locations where your card is normally accepted. We make no warranty or representation that you will be able to use your card through Mobile Wallet at all merchants. Mobile Wallets differ in their technology, functions and security procedures, so you must follow the instructions of the Mobile Wallet provider when you enroll in Mobile Wallet. Some Mobile Wallet providers may require you to download and install a mobile application required to run the Mobile Wallet. To authorize a transaction, you will need to use a biometric fingerprint security feature, special PIN and/or similar security feature depending on the type of Mobile Wallet. Purchases made using Mobile Wallet are, except as provided below, subject to the same terms and restrictions as purchases made using your card.

Related to USING A MOBILE WALLET

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Integrated Digital Loop Carriers The feeder portion of some loops may be provide by means of Integrated Digital Loop Carrier (IDLC). IDLC provides a fiber optic cable transmission path that travels directly into BellSouth’s central office local switch. Where BellSouth uses IDLC ,if technically feasible and capacity does exist, BST will provide Al-Call with a Designed DS0 UVL by using alternative provisioning techniques including but not limited to such as “hairpinning” and DAC grooming. Alternative provisioning techniques will be provided at no additional cost to Al-Call . Hairpinning involves providing a DS0 signal from an IDLC-served loop to Al-Call ’s collocation equipment by using a dedicated pathway that traverses BellSouth’s central office switch. BellSouth will provide such DS0 signal to Al-Call by establishing a copper cross connect between the BellSouth switch and Al-Call ’s collocation equipment.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • -wire ADSL-Compatible Loop This is a designed Loop that is provisioned according to Revised Resistance Design (RRD) criteria and may be up to 18,000 feet long and may have up to 6,000 feet of bridged tap (inclusive of Loop length). The Loop is a 2-wire circuit and will come standard with a test point, OC, and a DLR.

  • Crossing Picket Lines The Company will not expect an employee to cross a picket line, including a picket line at a customer site, if to do so would place the employee's life, limb or personal property in jeopardy.

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • wire HDSL-Compatible Loop This is a designed Loop that meets Carrier Serving Area (CSA) specifications, may be up to 12,000 feet long and may have up to 2,500 feet of bridged tap (inclusive of Loop length). It may be a 2-wire or 4-wire circuit and will come standard with a test point, OC, and a DLR.

  • Searchable Whois Notwithstanding anything else in this Agreement, Registry Operator must offer a searchable Whois service compliant with the requirements described in Section 1.10 of Specification 4 of this Agreement. Registry Operator must make available the services only to authenticated users after they logged in by supplying proper credentials (i.e., user name and password). Registry Operator must issue such credentials exclusively to eligible users and institutions that supply sufficient proof of their legitimate interest in this feature (e.g., law enforcement agencies).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!