Account Security User agrees and acknowledges that to the extent applicable, it will: (i) maintain strict confidentiality of all names, passwords, or other credentials of User’s Authorized End Users; (ii) instructing its Authorized End Users not to allow others to obtain or use their credentials or to access the Software. User is responsible for any costs or damages incurred due to unauthorized use or access through User’s Authorized End Users’ account credentials or systems.
Accessing the Website and Account Security We reserve the right to withdraw or amend this Website and any service or material we provide on the Website in our sole discretion without notice. We will not be liable if for any reason all or any part of the Website is unavailable at any time or for any period. From time to time, we may restrict access to some parts of the Website, or the entire Website, to users, including registered users. To access the Website or some of the resources it offers, you may be asked to provide certain registration details or other information. It is a condition of your use of the Website and any resources downloaded from the Website that all the information you provide on the Website is correct, current, and complete. You agree that all information you provide to register with this Website or otherwise, including but not limited to through the use of any interactive features on the Website, is governed by our Privacy Policy, and you consent to all actions we take with respect to your information consistent with our Privacy Policy. If you choose, or are provided with, a user name, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any other person or entity. You also acknowledge that your account is personal to you and agree not to provide any other person with access to this Website or portions of it using your user name, password or other security information. You agree to notify us immediately of any unauthorized access to or use of your user name or password or any other breach of security. You also agree to ensure that you exit from your account at the end of each session. You should use particular caution when accessing your account from a public or shared computer so that others are not able to view or record your password or other personal information. We have the right to disable any user name, password or other identifier, whether chosen by you or provided by us, at any time in our sole discretion for any or no reason, including if, in our opinion, you have violated any provision of these Terms of Use.
Certificate Account; Security Distributions On or before the issuance of the Lower Tier Classes, Xxxxxx Xxx shall either (i) open with an Eligible Depository one or more trust accounts in the name of the Trustee of the Lower Tier REMIC that shall collectively be the “Certificate Account,” (ii) in lieu of maintaining any such account or accounts, maintain the Certificate Account by means of appropriate entries on its books and records designating all amounts credited thereto in respect of the Mortgage Securities and all investments of any such amounts as being held by it in its capacity as Trustee for the benefit of the Holders of the Lower Tier Classes or (iii) maintain the Certificate Account in the form of any combination of accounts or book entries described in clauses (i) and (ii) above. Any manner or manners in which the Certificate Account is maintained may at any time be changed without notice to, or the approval of, Holders of the Lower Tier Classes so long as funds held in the Lower Tier REMIC by, or for the account of, the Trustee shall at all times be identified. To the extent that the Certificate Account is maintained by the Trustee in the manner provided for in clause (ii) above, all references herein to deposits and withdrawals from the Certificate Account shall be deemed to refer to credits and debits to the related books of the Trustee. Xxxxxx Mae shall deposit in the Certificate Account all Security Distributions received by it as Trustee hereunder. All Security Distributions deposited from time to time in the Certificate Account, all investments made with such moneys, including all income or other gain from such investments, shall be held by the Trustee in the Certificate Account as part of the Lower Tier REMIC as herein provided, subject to withdrawal by Xxxxxx Xxx for the purposes set forth in Section 4.05.
Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.
User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.
Terms and Conditions Pertaining to Individual Account Service Title Title to Firm Full-Requirements Power Supply will transfer from Competitive Supplier to Participating Customers at the Point of Sale. In accordance with the Distribution Utility's Terms and Conditions for Competitive Suppliers, the Competitive Supplier will be responsible for any and all losses incurred on the local network transmission systems and distribution systems, as determined by the Distribution Utility. Billing and Payment Unless otherwise specified in an Exhibit to this ESA, all billing under this ESA shall be based on the meter readings of each Participating Customer's meter(s) performed by the Distribution Utility. Competitive Supplier shall cause the Distribution Utility to prepare and mail bills to Participating Customers monthly. The Competitive Supplier shall adopt the billing and payment terms offered by the Distribution Utility to its Eligible Customers on Default Service. If actual meter date is unavailable, the Competitive Supplier may cause the Distribution Utility to xxxx based on its good faith estimates of usage. Any overcharge or under-charge will be accounted for in the next billing period for which actual meter data is available. Regional and Local Transmission The prices quoted in Exhibit A do not include current and future charges for distribution service costs collected by the Distribution Utility under its distribution service tariff or local transmission costs as may be imposed by NYISO or individual electric utilities that have FERC transmission tariffs. The Competitive Supplier understands that these costs will be collected by the Distribution Utility. If, in the future, Competitive Supplier becomes responsible for such distribution or transmission costs, Competitive Supplier shall be entitled to collect such costs from Participating Customers to the extent permitted by any Governmental Rules. These costs are "pass through" costs as determined by the appropriate regulatory agencies.
Subprocessor Security Before onboarding Subprocessors, Google conducts an audit of the security and privacy practices of Subprocessors to ensure Subprocessors provide a level of security and privacy appropriate to their access to data and the scope of the services they are engaged to provide. Once Google has assessed the risks presented by the Subprocessor, then subject to the requirements described in Section 11.3 (Requirements for Subprocessor Engagement) of this Data Processing Amendment, the Subprocessor is required to enter into appropriate security, confidentiality and privacy contract terms.
Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.
E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.
Electronic Payment The Debt Collection Improvement Act of 1996 requires that all payments except IRS tax refunds be made by Electronic Funds Transfer. It is the policy of the Nuclear Regulatory Commission to pay vendors by the Automated Clearing House (ACH) electronic funds transfer payment system. The electronic system is known as Vendor Express. Payment shall be made in accordance with FAR 52.232-33, entitled "Mandatory Information for Electronic Funds Transfer Payment" . To receive payment, the contractor shall complete the "Company Information" portion of the Standard Form 3881, entitled "ACH Vendor/Miscellaneous Payment Enrollment Form" found as an attachment to this document. The contractor shall take the form to the ACH Coordinator at the financial institution that maintains its company's bank account. The contractor shall discuss with the ACH Coordinator how the payment identification information (addendum record) will be passed to them once the payment is received by the financial institution. Further information concerning the addendum is provided at Attachment 2. The ACN Coordinator should fill out the "Financial Institution Information" portion of the form and return it to the Office of the Controller at the following address: Nuclear Regulatory Commission, Division of Accounting and Finance, Financial Operations Section, Mail Stop T-9-H-4, Washington, DC 20555, ATTN: ACH/Vendor Express. It is the responsibility of the contractor to ensure that the financial institution returns the completed form to the above cited NRC address. If the contractor can provide the financial information, signature of the financial institutions ACH Coordinator is not required. The NRC is under no obligation to send reminders. Only after the Office of the Controller has processed the contractor's sign-up form will the contractor be eligible to receive payments. Once electronic funds transfer is established for payments authorized by NRC, the contractor needs to submit an additional SF 3881 only to report changes to the information supplied. Questions concerning ACH/Vendor Express should be directed to the Financial Operations staff at (000) 000-0000."