Compliance with Security Procedure Sample Clauses

Compliance with Security Procedure. Company will be solely responsible for protecting against any unauthorized access to PinnBank for Business. If an Entry, a request for cancellation (“Cancellation”), or amendment of an Entry (“Amendment”) received by Bank is judged in good faith to have been originated or authorized by Company, it will be deemed effective as Company’s Entry, Cancellation, or Amendment, and Company shall be obligated to pay Bank the amount of such Entry as provided herein even though the Entry, Cancellation or Amendment was not authorized by Company, provided Bank acted in compliance with security procedures referred to in this Agreement, with respect to such Entry, Cancellation or Amendment. If signature comparison is to be used as a part of security procedures, Bank shall be deemed to have complied with that part of such procedure if it compares the signature accompanying Entries, Cancellations or Amendments received with the signature of an authorized representative of Company (an “Authorized Representative”) and, on the basis of such comparison, believes the signature accompanying such file to be that of such Authorized Representative. If an Entry, Cancellation or Amendment received by Bank was originated or authorized by Company, Company shall be obligated to pay the amount of the Entry, Cancellation, or Amendment as provided herein, whether or not Bank complied with security procedures referred to in this Agreement, with respect to that Entry, Cancellation or Amendment and whether or not that Entry, Cancellation or Amendment was erroneous in any respect or that error would have been detected if Bank had complied with such procedure. Company agrees that the security procedures found in this Agreement, are the security procedures that are necessary for their business and such procedures are deemed to be commercially reasonable. Company agrees that Company shall be responsible for utilizing and implementing those security procedures in their daily operations.
AutoNDA by SimpleDocs
Compliance with Security Procedure. (a) If an Entry (or a request for cancellation of an Entry) received by Bank purports to have been transmitted or authorized by Company, it will be deemed effective as Company’s Entry (or request) and Company shall be obligated to pay Bank the amount of such Entry as provided herein even though the Entry (or request) was not authorized by Company, provided Bank acted in compliance with the security procedure referred to in Schedule B to this Exhibit with respect to such entry. If signature comparison is to be used as a part of that security procedure, Bank shall be deemed to have complied with that part of such procedure if it compares the signature accompanying a file of Entries (or request for cancellation of an Entry) received with the signature of an authorized representative of Company as set forth in Schedule D to this Exhibit (an “Authorized Representative”) and, on the basis of such comparison, believes the signature accompanying such file to be that of such authorized representative.
Compliance with Security Procedure. (a) If an Entry (or a request for cancellation or amendment of an Entry) received by ODFI purports to have been transmitted or authorized by Company, it will be deemed effective as Company's Entry (or request) and Company shall be obligated to pay ODFI the amount of such Entry even though the Entry (or request) was not authorized by Company, provided ODFI accepted the Entry in good faith and acted in compliance with the security procedure referred to in Attachment 5 with respect to such Entry. If signature comparison is to be used as a part of that security procedure, ODFI shall be deemed to have complied with that part of such procedure if it compares the signature accompanying a file of Entries (or request for cancellation or amendment of an Entry) received with the signature of an authorized representative of Company (an "Authorized Representative") and, on the basis of such comparison, believes the signature accompanying such file to be that of such authorized representative.
Compliance with Security Procedure a. If a request for a PIN Payment (or a request for cancellation or amendment of a PIN Payment) received by Chelsea Groton Bank purports to have been transmitted or authorized by You, it will be conclusively deemed effective by Chelsea Groton Bank, and Chelsea Groton Bank shall initiate the PIN Payment on your behalf and, except as limited by applicable law, You shall be obligated to pay Chelsea Groton Bank the amount of such PIN Payment even though the PIN Payment (or request) was not authorized by You, provided Chelsea Groton Bank accepted the PIN Payment in good faith and acted in compliance with the security procedure referred to in this Agreement with respect to such PIN Payment. Chelsea Groton Bank shall conclusively be deemed to have complied with that part of such procedure if the password entered in connection with the on-line session associated with the initiation of a request for a PIN Payment matches the password associated with Your Account on the Site.
Compliance with Security Procedure a. If an Entry (or a request for cancellation of an Entry) received by Bank purports to have been transmitted or authorized by Customer, it will be deemed effective as Customer’s Entry (or request) and Customer shall be obligated to pay Bank the amount of such Entry as provided herein even though the Entry (or request) was not authorized by Customer, provided Bank acted in compliance with the Security Procedure. If an Entry (or a request for cancellation of an Entry) received by Bank purports to have been transmitted or authorized by Customer (including, without limitation, any Authorized Representative or Authorized Agent), it will be deemed effective as Customer’s Entry (or request) and Customer shall be obligated to pay Bank the amount of such Entry as provided herein even though the Entry (or request) was not authorized by Customer, provided Bank acted in compliance with the Security Procedure with respect to such Entry. If signature comparison is to be used as a part of that Security Procedure, Bank shall be deemed to have complied with that part of such Security Procedure if it compares the signature accompanying a file of Entries (or request for cancellation of an Entry) received with the signature of an Authorized Representative and, on the basis of such comparison, believes the signature accompanying such file to be that of such Authorized Representative.
Compliance with Security Procedure. 1. If a request for a P2P Payment (or a request for cancellation or amendment of a P2P Payment) received by Reading Cooperative Bank purports to have been transmitted or authorized by You, it will be conclusively deemed effective by Reading Cooperative Bank, and Reading Cooperative Bank shall initiate the P2P Payment on your behalf and, except as limited by applicable law, You shall be obligated to pay Reading Cooperative Bank the amount of such P2P Payment even though the P2P Payment (or request) was not authorized by You, provided Reading Cooperative Bank accepted the P2P Payment in goodfaith and acted in;
Compliance with Security Procedure a. If an Entry (or a request for cancellation or amendment of an Entry) received by Bank purports to have been transmitted or authorized by Customer, it will be deemed effective as Customer's Entry and Customer shall be obligated to pay Bank the amount of such Entry even though the Entry was not authorized by Customer, provided Bank acted in compliance with the security procedure referenced in the Master Agreement.
AutoNDA by SimpleDocs
Compliance with Security Procedure. If an Entry (or a request for cancellation or amendment of an Entry) received by the Bank purports to have been transmitted or authorized by you, the entry will be deemed effective as your Entry (or request) and you shall be obligated to pay the Bank the amount of such Entry even though the Entry (or request) was not authorized by you, provided Bank accepted the Entry in good faith and acted in compliance with the security procedure referred to above with respect to such Entry. If an Entry (or request for cancellation or amendment of an Entry) received by Bank was transmitted or authorized by you, you shall pay Bank the amount of the Entry, whether or not Bank complied with the security procedure referred to above with respect to that Entry and whether or not that Entry was erroneous in any respect or that error would have been detected if Bank had complied with such procedure.
Compliance with Security Procedure. (a) If an Entry (or a request for cancellation or amendment of an Entry) received by Financial Institution purports to have been transmitted or authorized by Customer, it will be deemed effective as Customer’s Entry (or request) and Customer shall be obligated to pay Financial Institution the amount of such Entry even though the Entry (or request) was not authorized by Customer, provided Financial Institution accepted the entry in good faith and acted in compliance with the security procedure referred to in Schedule B with respect to such entry. If signature comparison is to be used as a part of that security procedure Financial Institution shall be deemed to have complied with that part of such procedure if it compares, the signature accompanying a file of Entries (or request for cancellation or amendment of an Entry) received with the signature of an authorized representative of the Customer and on the basis of such comparison believes the signature accompanying such file to be that of such authorized representative.
Compliance with Security Procedure. (a) If an Entry (or a request for cancellation or amendment of an Entry) received by Financial Institution purports to have been transmitted by an Authorized User of the Company, it will be deemed effective as the Company’s Entry and Company shall be obligated to pay Financial Institution the amount of such Entry (or amended Entry) even if the Entry was not authorized by Company, provided Financial Institution accepted the entry in good faith and acted in compliance with the security procedures referred to in Schedule C with respect to such Entry. If signature comparison is to be used as a part of the security procedures defined in Schedule C, this Financial Institution shall be deemed to have complied with that part of such procedure if it compares the signature received with the signature of an Authorized User of Company and, on the basis of such comparison, believes the signature to be that of such Authorized User.
Time is Money Join Law Insider Premium to draft better contracts faster.