THEFT PROTECTION Sample Clauses

THEFT PROTECTION. Check this box if you wish to receive thirty (30) months of free identity protection and credit monitoring service.
AutoNDA by SimpleDocs
THEFT PROTECTION. Check this box if you did not select the Alternative Cash Payment above and wish to receive two years of free identity protection and credit monitoring service.
THEFT PROTECTION. The Wildcat tablet shall include attachment points for installing a standard notebook PC security cable. The attachment points shall allow the unit to be locked when mounted to the desktop docking station in either a portrait or landscape configuration.
THEFT PROTECTION. S4.2 Each vehicle shall have a keylocking sys- tem which, whenever the key is removed, prevents: (a) The normal activation of the vehicle’s engine or motor; and (b) Either steering or forward selfmobility of the vehicle or both Model a keylocking de- vice with lock and un- lock conditions Design the keylocking system to prevent the activation of the motor and steering or selfmo- bility (or both)
THEFT PROTECTION. If a student is threatened or endangered by someone demanding the student’s Chromebook, the student should give it to the person and then report the theft. Since DPS can remotely lock the Chromebook’s system if it is lost or stolen, the Chromebook has little value to anyone other than a DPS student. Taking Care of Chromebooks Students are responsible for the general care of their Chromebooks and accessories. Chromebooks that are damaged or malfunctioning should be taken to the school’s technical support person (STR) for repair. General Precautions Students should: ● Carry their Chromebook in the provided protective case when outside of classrooms. ● Close the Chromebook’s lid before carrying it. ● Keep food or drink away from the Chromebook. ● Wrap the Chromebook’s power cord loosely to avoid breakage. ● Shut down the Chromebook when not in use to conserve battery life. ● Never force the Chromebook into a book bag or a locker containing other heavy objects as this may damage the device. ● Never stack heavy items on top of the Chromebook. ● Insert all cords, cables, and flash drives carefully into the Chromebook to prevent damage. ● Never expose the Chromebook to extreme temperatures or direct sunlight for extended periods of time. Prolonged extreme heat or cold may cause damage to the Chromebook. ● Allow the Chromebook to reach room temperature prior to being turned on. Chromebook Screen Care ● Chromebook screens can be damaged if subjected to improper treatment. The screens are particularly sensitive to excessive pressure and temperatures. ● Do not lean on top of the Chromebook. ● Do not carry the Chromebook by the screen or with the lid open. ● Do not place anything near the Chromebook that could put pressure on the screen. ● Before closing the Chromebook lid, make sure the keyboard is cleared of pens, pencils, notebooks, earbuds, etc. ● Only clean the screen with a soft, dry anti-static, or micro-fiber cloth. Do not use window cleaner, water or any other liquid on the Chromebook or its screen. Chromebook Use At School Chromebooks are intended for use at school every day. Students are responsible for bringing their Chromebooks to all classes, unless otherwise instructed by their teachers. Students should use their Chromebooks and their DPS email accounts for school-related communications and schoolwork. School staff and administration have the right to check any material stored on a student’s Chromebook at any time. Chromebooks Left at Home: If students ...
THEFT PROTECTION. A service that gives you access to: ● Toll-free legal advice from a Telephone Network Attorney to assist with legal-related problems that the theft of your identity may have caused. ● Identity Theft Materials, including: ● An Identity Theft Prevention Kit to help protect yourself from becoming a victim of identity theft in the first place, ● An Identity Theft Victim Action Kit to help speed your recovery should you become an identity theft victim, ● A tracking document to help you keep track of phone calls, e-mails and letters for attorneys, ● An Identity Theft Affidavit to help you report your identity theft to necessary parties. ● Identity Theft Specialists who will help you determine appropriate steps to begin recovery and help you monitor the progress of your recovery.
THEFT PROTECTION. The unauthorized tapping of cable plant and the unauthorized receipt of programming using cable converters purchased through unauthorized sources are problems which continue to challenge the entire cable industry. We have adopted specific measures to combat the unauthorized use of our plant to receive programming. For instance, in several of our regions, we have instituted a "perpetual audit" whereby each technician is required to check at least four other nearby residences during each service call to determine if there are any obvious signs of piracy, namely, a drop line leading from the main cable line into other homes. Addresses where the technician observes drop lines are then checked against our customer billing records. If the address is not found in the billing records, a sales representative calls on the unauthorized user to correct the "billing discrepancy" and persuade the user to become a formal customer. In our experience, approximately 25% of unauthorized users who are solicited in this manner become customers. Billing records are then closely monitored to guard against these new customers reverting to their status as unauthorized users. Unauthorized users who do not convert are promptly disconnected and, in certain instances, flagrant violators are referred for prosecution. In addition, we have prosecuted individuals who have sold cable converters programmed to receive our signals without proper authorization. 27
AutoNDA by SimpleDocs
THEFT PROTECTION. The Red Flags Rule, a law the Federal Trade Commission has been enforcing, requires certain businesses and organizations, including many doctor’s offices, hospitals and other healthcare providers to confirm the patient’s identity and validate medical insurance coverage to ensure that identity theft has not occurred. To safeguard your identity we will make a copy of your valid picture ID issued by a local, state or federal government agency (driver’s license, passport, military ID, etc.) and a copy of your current insurance card to confirm your identity. We hope this answers any questions you might have concerning the financial policy of this office. Once again we welcome you to our office, and will be glad to answer any further questions that you might have. I have read and agree to all of the above. __________________________________________ ________________ Signature Date
THEFT PROTECTION. Check this box if you wish to receive free credit monitoring and identity protection with $1 million in insurance. If you check this box, you will be offered 2 years of credit monitoring.

Related to THEFT PROTECTION

  • Whistleblower Protection Notwithstanding anything to the contrary contained herein, no provision of this Agreement shall be interpreted so as to impede the Employee (or any other individual) from reporting possible violations of federal law or regulation to any governmental agency or entity, including but not limited to the Department of Justice, the Securities and Exchange Commission, the Congress, and any agency Inspector General, or making other disclosures under the whistleblower provisions of federal law or regulation. The Employee does not need the prior authorization of the Company to make any such reports or disclosures and the Employee shall not be not required to notify the Company that such reports or disclosures have been made.

  • PATENT PROTECTION The vendor agrees to indemnify and defend the State of New Hampshire from alleged and actual patent infringements and further agrees to hold the State of New Hampshire harmless from any liability arising under RSA 382- A:2-312(3). (Uniform Commercial Code).

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • SAFETY AND HEALTH 20.1 The Employer, employee and Union have a significant responsibility for workplace safety and health.

  • Fire Protection Contractor shall take adequate and reasonable precautions to protect the Work against damage by fire and smoke. For example, without limitation, Contractor shall do the following:

Time is Money Join Law Insider Premium to draft better contracts faster.