Additional Security Procedures Sample Clauses

Additional Security Procedures. We may from time to time implement additional or alternative procedures to protect the security and confidentiality of your Online Banking transactions. Such procedures may include, without limitation, encryption, creating security firewalls in our computer systems and implementing other commercially reasonable security procedures. You agree to comply with all security procedures we may impose in connection with Online Banking, including any changes to such procedures that we might make from time to time. You agree that all security procedures used by us, our affiliates and agents in connection with Online Banking are commercially reasonable security procedures and, as a result, you assume all risk of loss for unauthorized transactions where we have followed our then-current security procedures. You acknowledge that we reserve the right to change the security procedures from time to time upon notice to you (if such notice is required by law). Your continued use of Online Banking constitutes your agreement to comply with such changed procedures and your acknowledgement that such changed procedures are commercially reasonable.
AutoNDA by SimpleDocs
Additional Security Procedures. You agree that the following additional security procedures govern your use of the Digital Banking Services when accessing your accounts with us:  You are liable for all transactions that you or any of your Authorized Users make or authorize, even if that person exceeds his/her authority. You will also be liable for all transactions by an Authorized User until you have notified us of the revocation of the Authorized User's authority, and we have had a reasonable time to act on such notice to block the affected User ID, Password and/or security information. You are also liable for any and all unauthorized use that occurs before you have notified us that your User ID, Password and/or security information, or other access means in your possession or control have been lost or stolen or used without your authority and before we have had a reasonable opportunity to act.  Your use of Digital Banking constitutes your agreement that our security procedures are commercially reasonable. You acknowledge and agree that the security procedures are not designed to detect errors in the content of instructions or transactions. You also understand and agree that the security procedures, even when properly implemented by us and by you, do not provide a guarantee against unauthorized access to information or unauthorized transactions. Accordingly, you agree to assume risks in connection with the establishment and/or use of Digital Banking. Without limiting the generality of the foregoing, you agree that if account information is accessed, or if an instruction is made (such as a transfer or payment order), by a person using your User ID, Password and/or security information, we may treat that access request or instruction as being authorized by you (regardless of whether or not it was actually authorized by you), and you agree to be bound by any transactions implemented through those instructions.  You represent and warrant to us that you have taken all action necessary to access and use Digital Banking and that any resolutions, certifications, authorizations or other documents submitted to us in connection with the Digital Banking Services are true, accurate, completed and will be kept up to date. You, and each person you designate to use Digital Banking on your behalf during enrollment or on other documents for Digital Banking, as permitted by us, also represent and warrant to us that each person whose name is listed during the enrollment or on such other documents is dul...
Additional Security Procedures. Enhanced Log-In/ Transaction Security. In addition to the above individual User IDs and individual Passwords, access to the Premier Business Connect Service includes a multi-factor or layered authentication security procedure at log-in or prior to initiating certain transactions for you, including your administrator and authorized users (hereinafter “Enhanced Log-in/ Transaction Security”). Enhanced Log-in Security may include, but is not limited to, additional log-in security features such as identification and verification of IP addresses. Enhanced Log- In Security will also require each User of the Premier Business Connect Service to establish and utilize, in addition to individual User IDs and passwords, his/her own individual authentication through the use of one time passwords as part of a multi-part credential. Enhanced Transaction Security may require each User of the Premier Business Connect Service to utilize a token generated One-Time-Password prior to initiating certain transactions. - You are responsible for providing security for your Systems and Account(s). Passwords must be kept private. You should make sure that no one is physically watching as Passwords are entered. It is important to remember to click “Log Off” after completing each Premier Business Connect Service session. This will deter unauthorized access to your Account(s) if your computer is shared or available to others. You should not leave your computer and/or mobile device unattended with the browser/app running and a valid User ID and Password cached as anyone can gain access to the Account(s). We recommend that you use a separate computer that is not utilized for e-mail or other Internet communications to establish and conduct transactions through the Services. (*) – These Security Procedures may / may not apply in every case, as they are subject to availability, connectivity and standard parameters set forth in our multi-factor product, as those parameters may be modified from time to time.
Additional Security Procedures. We may, at our option, offer you additional Security Procedures to enhance the security of your Authorized Account(s) and Cash Management Service(s) We have the right to implement additional verification and identification steps, factors or procedures that we deem necessary or appropriate in our discretion. These may be implemented as an amendment to the Security Procedures selected by you or as an additional Security Procedure available to you.
Additional Security Procedures. Notwithstanding other terms of this Agreement or any agreement between DISTRIBUTOR, XXXXXXXXXX.XXXXX and any other party, both parties agree to follow appropriate procedures to protect the security of Cardholder Information received during the Term of this Agreement, including: (i) installing and maintaining a working network firewall to protect data accessible via the internet; (ii) using and regularly updating anti-virus software; (iii) ensuring security patches are current; (iv) encrypting stored data and data sent over open networks; (v) maintaining an information security policy for employees and contractors; (vi) storing all materials containing Cardholder Information in a restricted area; (vii) restricting access to Cardholder Information to those on a limitedneed to know” basis; (viii) retaining Cardholder Information only as is reasonably appropriate, and consistent with, each party’s authorized use and service; (ix) discarding Cardholder Information in a manner that ensures complete destruction; (x) assigning a unique ID to each person with computer access to Cardholder Information, and (xi) ensuring that unauthorized parties do not have access to any systems containing Cardholder Information.
Additional Security Procedures a. Additional Verification In its sole discretion, Bank may seek verification or further authorization of any ACH credit or debit transactions order or related instruction in addition to any verification procedures described in other provisions of this Agreement. Bank may contact Customer by any reasonable means in order to obtain assurance of the authenticity or other correctness of a payment order. However, Bank shall be under no obligation to do so in any case. If, upon attempting to obtain such verification, Bank is unable to do so, Bank may, in its sole discretion, either make the transfer or decline to make the transfer or follow the instructions or decline to follow the instructions. In such an event, Bank shall not be liable to Customer for any actual loss of any kind or for any consequential, punitive, or exemplary damages in any amount, provided Bank has acted in good faith.
Additional Security Procedures. We may from time to time use reasonable additional or alternative procedures to ensure the security and confidentiality of your financial records and transactions using Columbia OnLine for Business™. Such procedures may include, without limitation, encryption, creating security firewalls in our computer systems and implementing other commercially reasonable security procedures. At all times you agree to comply with all security procedures we may impose in connection with your use of Columbia OnLine for Business™. You agree that all security procedures used by us, our affiliates and agents in connection with Columbia OnLine for Business™ are commercially reasonable security procedures and, as a result, you assume all risk of loss for unauthorized transactions where we have followed our then current security procedures. You acknowledge that we reserve the right to change the security procedures from time to time upon notice to you (if such notice is required by law), and furthermore agree that your continued use of any such changed procedures evidences your acceptance of and agreement to the commercial reasonableness of such changed procedures.
AutoNDA by SimpleDocs

Related to Additional Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.

  • SAFETY PROCEDURES The Contractor shall:

  • Project Delivery Order Procedures The TIPS Member having approved and signed an interlocal agreement, or other TIPS Membership document, may make a request of the awarded vendor under this Agreement when the TIPS Member has services that need to be undertaken. Notification may occur via phone, the web, email, fax, or in person. Upon notification of a pending request, the awarded vendor shall make contact with the TIPS Member as soon as possible, but must make contact with the TIPS Member within two working days. Scheduling of Projects Scheduling of projects (if applicable) may be accomplished when the TIPS Member issues a Purchase Order and/or an Agreement or Contract that will serve as “the notice to proceed” as agreed by the Vendor and the TIPS Member. The period for the delivery order will include the mobilization, materials purchase, installation and delivery, design, weather, and site cleanup and inspection. No additional claims may be made for delays as a result of these items. When the tasks have been completed the awarded vendor shall notify the client and have the TIPS Member or a designated representative of the TIPS Member inspect the work for acceptance under the scope and terms in the Purchase Order and/or Agreement or Contract. The TIPS Member will issue in writing any corrective actions that are required. Upon completion of these items, the TIPS Member will issue a completion notice and final payment will be issued per the contractual requirements of the project with the TIPS Member. Any Construction contract prepared by the TIPS Member’s Legal Counsel may alter the terms of this subsection, “Scheduling of Projects”.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • AML/KYC Procedures “AML/KYC Procedures” means the customer due diligence (CDD) procedures of a Reporting Financial Institution pursuant to the anti-money laundering or similar requirements of the jurisdiction concerned to which such Reporting Financial Institution is subject.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

Time is Money Join Law Insider Premium to draft better contracts faster.