Xxx/Mastermoney Sample Clauses

Xxx/Mastermoney. You may use your Card and PIN (Personal Identification Number) in automated teller machines of the Credit Union, MAC, Plus Networks, and such other machines or facilities as the Credit Union may designate. At the present time, you may use your Card to: Make deposits to your checking accounts. Withdraw funds from your checking accounts. Make POS (Point-of-Sale) transactions with your Card and PIN (Personal Identification Number) to purchase goods or services at POS terminals that carry MAC, Plus network logo(s). The following limitations on the frequency and amount of ATM transactions may apply: You may make two (2) cash withdrawals in any one day You may withdraw up to a maximum of $200 in any one day, if there are sufficient funds in your account You may make two (2) POS Transactions in any one day. You may purchase up to a maximum of $200.00 form POS Terminals per day, if there are sufficient funds in your account. See Section 2 for transfer limitations that may apply to these transactions. Because of the servicing schedule and processing time required in ATM operations, there is a delay between the time a deposit (either cash or check) is made and when it will be available for withdrawal. You should review the Credit Union's Funds Availability Policy to determine the availability for funds deposited at ATMs.
AutoNDA by SimpleDocs

Related to Xxx/Mastermoney

  • Xxxxxxx Money After acceptance by all Parties, the Buyer agrees to make a payment in the amount of $ as consideration by , 20 at : ☐ AM ☐ PM (“Xxxxxxx Money”). The Xxxxxxx Money shall be applied to the Purchase Price at Closing and subject to the Buyer’s ability to perform under the terms of this Agreement. Any Xxxxxxx Money accepted ☐ is ☐ is not required to be placed in a separate trust or escrow account in accordance with State law.

  • Xxxxxx and Recall An employee in receipt of notice of layoff pursuant to 9.08(A)(a)(ii) may:

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • Xxxxxxxx and X X. Xxxxx. 1930. Checklist of the fishes and fishlike vertebrates of North and Middle America north of the northern boundary of Venezuela and Columbia. Rept. U.S. Fish Comm. 1928(2):1-670. Jordan, D.S. and X.X. Xxxxxxxx. 1896. The fishes of North and Middle America. Part 1. U.S. Natl. Mus. Bul. 47:1-1240. Xxxxx, S. and X. Xxxxxx. 2005..Hydrogeologic setting of the snake valley hydrologic basin, Xxxxxxx County, Utah, and White Pine and Lincoln Counties, Nevada – implications for possible effects of proposed water xxxxx. Report of investigation 254, Utah Geological Survey. Xxxxxxx, M.C. 1982. Status report of three Bonneville basin endemic fishes. Prepared for the U.S. Fish and Wildlife Service. 27 pp. May, B. E. and X. X. Xxxxx. 1981. Comparative effects of sheep and cattle grazing on the Xxxxx Creek drainage. Transactions of the Bonneville Chapter American Fisheries Society. 1981:48-62. Xxxxx, X.X. 1985. Predation and species replacement in American Southwestern fishes: a case study. Southwestern Naturalist. 30:173-187. Xxxxxx, X. X. and X. X. Xxxxxx. 1985. Two New Intergeneric Cyprinid Hybrids from the Bonneville Basin, Utah. Copeia, 1985(2):509-515. Xxxxxx, X.X. 1972. Threatened freshwater fishes of the United States. Trans. Amer, Fish. Soc. 101(2):239-252.

  • Xxxxx and X Xxxxxxxxxx. Non-Commutative Geometry, Non- Associative Geometry and the Standard Model of Particle Physics, 1401.5083.

  • Personal Protective Clothing and Equipment The Government considers operators as fireline personnel who will use and wear specified articles of personal protective equipment.

  • Xxxx and X Xxxx: Scalable protocols for authenticated group key exchange, in: Advances in Cryp- tology – Crypto’03, LNCS 2729, pp. 110–125, 2003.

  • Xxxxxxxxx and X Xxxxxxx. A

  • Personal Protective Equipment 64.1 While not being part of any issue of work clothing/equipment supplied (see clause 26), the Employer shall be required to provide personal protective equipment (SAA approved) for use, when necessary for the Employee to perform their required duties including:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!