Access codes - Security Sample Clauses

Access codes - Security. The confidential password that You selected during the creation of Your Account, associated to Your handle, is strictly confidential and placed under Your sole responsibility. You agree and accept that it is Your responsibility to take all necessary measures to assure that the confidentiality is preserved. You take it upon Yourself to formally notify Us without delay in the event that You have lost Your password or if it has been divulged to an unauthorized third party. By default, and by mutual agreement, any operation made using Your Access Codes (handle and password) is reputed to have been made under Your responsibility and with Your agreement. Gandi is not responsible for the utilization, made under Your sole responsibility, of Your Gandi Prepaid Account. You acknowledge that with regards to this matter, the data in Our operating systems is authentic within the framework of Our relations as well as in disputes.
AutoNDA by SimpleDocs

Related to Access codes - Security

  • Access Codes Tenant shall provide Landlord/Broker with all access codes to all entrance gates and security systems located on the Property.

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Premises Security 10.1 Security of premises and control of access.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code.

  • Dress Code CONTRACTOR shall maintain a dress code for their employee’s with a minimum of shirts, pants, and work shoes/boots, in decent condition, at all times while the work is being performed. In the event the COUNTY determines ID badges are necessary, the COUNTY will provide CONTRACTOR with ID badges and CONTRACTOR agrees to enforce that its employees, whether employed by CONTRACTOR or a subcontractor, wear such ID badge while working on site for the Project/Service.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Security Rule “Security Rule” shall mean the Standards for the Protection of Electronic Protected Health Information at 45 CFR Part 160 and Part 164, Subparts A and C.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • E1 Data Protection Act E1.1 For the purposes of this Clause E1, the terms “Data Controller”, “Data Processor”, “Data Subject”, “Personal Data”, “Process” and “Processing shall have the meaning prescribed under the DPA.

  • Rights Protection Mechanisms Registry Operator shall implement and adhere to the rights protection mechanisms (“RPMs”) specified in this Specification. In addition to such RPMs, Registry Operator may develop and implement additional RPMs that discourage or prevent registration of domain names that violate or abuse another party’s legal rights. Registry Operator will include all RPMs required by this Specification 7 and any additional RPMs developed and implemented by Registry Operator in the registry-­‐registrar agreement entered into by ICANN-­‐accredited registrars authorized to register names in the TLD. Registry Operator shall implement in accordance with requirements set forth therein each of the mandatory RPMs set forth in the Trademark Clearinghouse as of the date hereof, as posted at xxxx://xxx.xxxxx.xxx/en/resources/registries/tmch-­‐requirements (the “Trademark Clearinghouse Requirements”), which may be revised in immaterial respects by ICANN from time to time. Registry Operator shall not mandate that any owner of applicable intellectual property rights use any other trademark information aggregation, notification, or validation service in addition to or instead of the ICANN-­‐

Time is Money Join Law Insider Premium to draft better contracts faster.