DEPOSITS AT NON-PROPRIETARY ATMS Sample Clauses

DEPOSITS AT NON-PROPRIETARY ATMS. The Credit Union does not accept, and will not process, deposits made at non-proprietary ATMs.
DEPOSITS AT NON-PROPRIETARY ATMS. Funds from deposits of any nature (cash, checks, or other items) made at an automated teller machine (ATM) that we do not own or operate will not be available until the fifth (5th) business day after the date of your deposit. ATMs that we own or operate are identified as our machines by our name and/or logo on the machine.
DEPOSITS AT NON-PROPRIETARY ATMS. We may place a two-day hold on the aggregate of all funds over
DEPOSITS AT NON-PROPRIETARY ATMS. The Credit Union does not accept, and will not process, deposits made at non-proprietary ATMs, except those ATMs in the CO-OP ATM Network. For deposits accepted through a CO-OP ATM, your deposit will not be available until the fifth business day after the day of your deposit.
DEPOSITS AT NON-PROPRIETARY ATMS. The Credit Union does not
DEPOSITS AT NON-PROPRIETARY ATMS. We may place a two-day hold on the aggregate of all funds over $225.00 deposited per day at automated teller machines (ATMs) that we own (proprietary) and ATMs we do not own or operate (nonproprietary). All ATMs the Credit Union owns are identified as Credit Union ATMs. The first $225.00 deposited per day into an ATM will generally be available at the time of deposit.

Related to DEPOSITS AT NON-PROPRIETARY ATMS

  • Processing of Customer Personal Data 3.1 UKG will: 3.1.1 comply with all applicable Data Protection Laws in the Processing of Customer Personal Data; and 3.1.2 not Process Customer Personal Data other than for the purpose, and in accordance with, the relevant Customer’s instructions as documented in the Agreement and this DPA, unless Processing is required by the Data Protection Laws to which the relevant UKG Processor is subject, in which case UKG to the extent permitted by the Data Protection Laws, will inform Customer of that legal requirement before the Processing of that Customer Personal Data. 3.2 Customer hereby: 3.2.1 instructs UKG (and authorizes UKG to instruct each Subprocessor) to: (a) Process Customer Personal Data; and (b) in particular, transfer Customer Personal Data to any country or territory subject to the provisions of this DPA, in each case as reasonably necessary for the provision of the Services and consistent with the Agreement. 3.2.2 warrants and represents that it is and will at all relevant times remain duly and effectively authorized to give the instructions set out in Section 3.2.1 on behalf of each relevant Customer Affiliate; and 3.2.3 warrants and represents that it has all necessary rights in relation to the Customer Personal Data and/or has collected all necessary consents from Data Subjects to Process Customer Personal Data to the extent required by Applicable Law. 3.3 Schedule 1 to this DPA sets out certain information regarding UKG’s Processing of Customer Personal Data as required by Article 28(3) of the GDPR (and equivalent requirements of other Data Protection Laws).

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by ▇▇▇▇▇▇▇, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, ▇▇▇▇▇▇▇ will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.