Sentences with phrase «from unauthorized activity»

You get a zero fraud liability guarantee that protects you from unauthorized activity.

Not exact matches

Frame the Services or Content, make the Services or Content available via in - line or «deep» links, otherwise display the Services or Content in connection with an unauthorized logo or mark, or do anything that could falsely suggest a relationship between the Provider or its affiliates and any third party or potentially deprive us of revenue (including, without limitation, revenue from advertising, branding, or promotional activities);
Prohibit employees from engaging in financial transactions using nonpublic Government information, making unauthorized commitments, using public office for private gain, and engaging in nonofficial activities that conflict with the performance of duty.
To protect you from unauthorized billing activities you need to verify that you are the true owner or authorized user of the card.
Preventing unauthorized billing activity saves us from dealing with fraudulent purchases and we pass that savings on to you.
You should regularly check your credit report for unauthorized activity from your former spouse and to ensure the bills are getting paid.
Most guarantees offered by Canadian discount brokerages are limited to «direct losses» in your online brokerage account that come about from «unauthorized» activity.
Our Online Banking Guarantee * protects you from fraud loss, which means that we'll cover any loss to your account due to unauthorized activity when you promptly notify us.
By monitoring their report on a regular basis and reviewing it for unauthorized activity and inaccurate information, consumers can prevent credit card fraud from damaging their credit rating.
In addition to FDIC insurance, CIT Bank offers transaction and activity monitoring, layered security, and firewalls to help block unauthorized individuals or networks from accessing your information.
You will receive 100 % reimbursement for any losses that you have incurred, resulting from an unauthorized online activity in your Virtual Brokers account *.
Total amount granted: USD 140,000: i) USD 30,000 from the Rapid Response Facility for the monitoring of unauthorized activities in the Bladen Nature Reserves which were impacting the property; ii) USD 30,000 for emergency conservation actions in favour of the critically endangered wide sawfish (2010); iii) USD 80,000 in support of public use planning and site financing strategy development for the Blue Hole Natural Monument (2008 - 2009).
USD 140,000: i) USD 30,000 from the Rapid Response Facility for the monitoring of unauthorized activities in the Bladen Nature Reserves which were impacting the property; ii) USD 30,000 for emergency conservation actions in favour of the critically endangered wide sawfish (2010); iii) USD 80,000 in support of public use planning and site financing strategy development for the Blue Hole Natural Monument (2008 - 2009).
You further agree that you will not (a) use the Website for any illegal or unauthorized purposes that violate any laws (including import, export and copyright laws); (b) download, post, display, publish, copy, distribute, transmit, broadcast or create derivative works from, or otherwise exploit any of the Website Proprietary Contents; (c) alter, edit, delete, remove, change the meaning or appearance of any of the Website Proprietary Contents, including without limitation the removal or alteration of any trademarks, trade names, logos, service marks, copyright notices or any other proprietary notices on any Website Proprietary Contents; (d) attempt to gain unauthorized access to our computer system or engage in any activity that interferes with the performance of, or impairs the functionality of the Website or any goods or services provided through the Website.
4) VTech was unable to detect potential intruder threats or unauthorized / unusual activities (i.e., no alarm bells went off when customer data was removed from its networks) because it did not employ adequate host and network security logging / monitoring services.
Similar activities from other judges and attorneys have resulted in violations of both the Code of Professional Conduct and the Code of Judicial Conduct, from unauthorized practice of law across state lines and breaching attorney - client privilege to posting inappropriate comments and sending friend requests to litigants and related attorneys.
The Minister may also authorize his IT people «to intercept private communications in relation to an activity or class of activities specified in the authorization, if such communications originate from, are directed to or transit through any such computer system or network, in the course of and for the sole purpose of identifying, isolating or preventing any harmful unauthorized use of, any interference with or any damage to those systems or networks, or any damage to the data that they contain.»
Professional Experience Telsource Corporation (Fairfield, NJ) 1996 — 2010 Sales Support Manager (Year — Year) • Analyzed and evaluated subcontractor proposals, performed cost / price analysis, negotiated Subcontracts Agreements and executed a wide range of contractual documents; Non-Disclosure agreements (NDAs), and Teaming Agreements (TAs) • Monitored and managed contract change activity to prevent unauthorized work or scope creep • Composed responses to Request for Proposal (RFP), Request for Information (RFI), and federal / state / local bidder's lists • Conducted strategic planning sessions with sales, product management, operations, subject matter experts, and senior management to gain understanding of the prospect and how to best position the RFP response • Re - wrote / edited information received from other departments and ensured information met requirements of RFP • Managed annual proof of compliance documents for customers • Developed and maintained boilerplate proposal, statement of work, and correspondence templates • Customized and maintained client specific order forms • Trained new hires on internal ERP system, Sant Suite, and departmental processes and procedures
a b c d e f g h i j k l m n o p q r s t u v w x y z