ACH Security Procedures Sample Clauses

ACH Security Procedures. The Security Procedures for the ACH Transfer service are described below. You agree that use of the ACH Transfer service constitutes acceptance of the below Security Procedures, and agree that the Security Procedures are commercially reasonable for your use of the service, including the size, type and f requency of any possible transactions that may be initiated from your accounts thatmay be associated with the service now or in the future. • Users will be required to use valid access credentials to sign on to the app lication, and must have been granted necessary entitlements to be able to use the ACH Transfer service. • In order to transmit an ACH entry, an entitled user must enter a one-time passcode in order for the entry to be released and processed. Any entry or other instruction purporting to have been transmitted or authorized by you, but, which in fact was not authorized, will be deemed effective as your entry or instruction, and you will be obligated to us for the amount thereof, provided we acted in good faith and in compliance with the Security Procedures. With respect to any entry or other instruction, which was in fact transmitted or authorized by you, you will be obligated to us for the amount thereof, whether or not we complied with the Security Procedures and whether or not the entry was erroneous in any way or the error would have been detected had we complied with such procedures.
AutoNDA by SimpleDocs
ACH Security Procedures. The following Security Procedures apply to ACH Entries (the “ACH Security Procedures”): (i) User IDs / Passwords; and (ii)Tokens / Secure Access Codes. Additionally, depending on the Transaction and subject to the Bank’s discretion, the ACH Entry may be subject to further verification. You may also set up additional Security Procedures in the AFB Digital System, but these additional procedures must be instituted by you and in your discretion. You acknowledge that we could impose stricter security procedures but that in order to avoid additional burdens for you in completing ACH transfers you have carefully reviewed the ACH Security Procedures and your own internal security and are willing to assume the risk that the ACH Security Procedures may not detect every instance of unauthorized access to the AFB Digital System. You agree that these ACH Security Procedures are commercially reasonable. You are solely responsible for maintaining your own internal security and you agree to use the utmost care in selecting any individual who is an Online User authorized to initiate ACH Entries. We recommend that you require dual control of your internal ACH functions (such as the dual control which you can set up in the system) in order to provide a higher level of internal security. Without dual control, a single individual user within your organization will be authorized to initiate and to submit ACH transfer requests without any further, review, approval, or oversight. You understand and agree that the Bank shall not be liable for any losses stemming in whole or in part from you decision to forego dual control of ACH transfer functions.
ACH Security Procedures. The following Security Procedures apply to your submission to us of ACH Entries using the Platform (the “ACH Security Procedures”). When you submit ACH Entries to us using the Platform, your Authorized Users must log in to the Platform using their Credentials, which are their (i) User IDs and Passwords; and (ii) secure access codes or other dual factor authorization. Additionally, depending on the Transaction and subject to the Bank’s discretion, the ACH Entry may be subject to further verification. You acknowledge that you have carefully reviewed the ACH Security Procedures and your own internal security and are willing to assume the risk that the ACH Security Procedures may not detect every instance of unauthorized access to the Platform. You are solely responsible for maintaining your own internal security and you agree to use the utmost care in selecting any individual who is an Authorized User authorized to initiate ACH Entries. You agree that these ACH Security Procedures are commercially reasonable in light of the anticipated size, type, and frequency of your instructions regarding ACH Entries. Provided we comply with the ACH Security Procedures outlined herein, you shall be liable for payment of the transferred amount in relation to any ACH Credit Entry plus applicable fees as listed in our Rate and Fee Disclosure, even if you did not in fact authorize the transaction. If we do not comply with the ACH Security Procedures outlined herein but can demonstrate that you originated the ACH Entry, you will still be liable for the transfer amount plus applicable fees as listed in our Rate and Fee Disclosure. We are responsible for performing the ACH Service contemplated in this ACH Schedule, and we are only liable for our own gross negligence or willful misconduct in performing these services. We are not liable for your acts or omissions or the acts or omissions of any other person including, without limitation, any funds transfer system, any Federal Reserve Bank, any beneficiary’s financial institution, and any beneficiary, none of which are our agent. You are solely responsible for the security of all computer and other systems you use in connection with the ACH Service and the Platform and for backing up any data and information stored in those computer and other systems. You will adopt and enforce a commercially reasonable security program that is tailored to your computer and other systems used in connection with the ACH Service and the Platform and t...
ACH Security Procedures. When transmitting entries and other information to us in connection with the ACH Origination Services, you agree to follow all ACH security procedures we establish. You acknowledge the purpose of the ACH security procedures is to verify the authenticity of your instructions and not to detect any errors in the content or transmission thereof. In our discretion, our verification procedures in any instance may include contacting you or your administrator(s), and for your protection we may choose not to carry out or we may delay implementing any instructions if we are unable to obtain verification satisfactory to us. Any entry or other instruction purporting to have been transmitted or authorized by you, but which in fact was not authorized, will be deemed effective as your entry or instruction, and you will be obligated to us for the amount thereof, provided we acted in good faith and in compliance with the ACH security procedures. With respect to any entry or other instruction, which was in fact transmitted or authorized by you, you will be obligated to us for the amount thereof, whether or not we complied with the ACH security procedures and whether or not the entry was erroneous in any way or the error would have been detected had we complied with such procedures.
ACH Security Procedures a. User(s) will have access to the ACH Services subject to the Security Procedures. You are solely responsible for accurate creation, modification and deletion of the Account information maintained on your computers and used for the ACH Services. You shall comply with all procedures provided by us for the creation, maintenance and initiation of Entries, including any internal controls that we may require from time to time. b. You shall use the Security Procedures when you deliver Entries or Reversal/Deletion Requests to us. You authorize us to act on any Entries or Reversal/Deletion Requests when the Security Procedures have been followed. If the Security Procedures have been followed, you shall be bound by such Entries or Reversal/Deletion Requests whether or not they were in fact authorized.
ACH Security Procedures 

Related to ACH Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • Collection Procedures (a) On or before the Closing Date, the Seller and the Purchaser shall have established and shall maintain thereafter the system of collecting and processing Collections of Receivables in accordance with Section 2.02 of the Servicing Agreement. (b) The Seller shall cause all in-store payments to be (i) processed as soon as possible after such payments are received by the Seller but in no event later than the Business Day after such receipt, and (ii) delivered to the Servicer or, if a Daily Payment Event has occurred, deposited in the Collection Account no later than the second Business Day following the date of such receipt. (c) The Seller and the Purchaser shall deliver to the Servicer or, if a Daily Payment Event has occurred, deposit into the Collection Account all Recoveries received by it within two Business Days after the Date of Processing for such Recovery. (d) Any funds held by the Seller representing Collections of Receivables shall, until delivered to the Servicer or deposited in the Collection Account, be held in trust by the Seller on behalf of the Trustee as part of the Trust Estate. (e) The Seller hereby irrevocably waives any right to set off against, or otherwise deduct from, any Collections. (f) The Seller acknowledges that Seller shall not have any right, title or interest in and to any Trust Account.

  • Disbursement Procedures The Issuing Bank shall, promptly following its receipt thereof, examine all documents purporting to represent a demand for payment under a Letter of Credit. The Issuing Bank shall promptly notify the Administrative Agent and the Borrower by telephone (confirmed by telecopy) of such demand for payment and whether the Issuing Bank has made or will make an LC Disbursement thereunder; provided that any failure to give or delay in giving such notice shall not relieve the Borrower of its obligation to reimburse the Issuing Bank and the Lenders with respect to any such LC Disbursement.

  • Loan Procedures (a) In order to request a Borrowing, the Borrower --------------- shall hand deliver or telecopy (or notify by telephone and promptly confirm by hand delivery or telecopy) to the Agent the completed Borrowing Request (i) in the case of a Eurodollar Borrowing, not later than 2:00 p.m., Philadelphia time, three Business Days before a proposed Borrowing and (ii) in the case of a Base Rate Borrowing, not later than 11:00 a.m., Philadelphia time, on the day of a proposed Borrowing. Such notice shall be irrevocable and shall in each case specify (x) whether the Borrowing then being requested is to be a Eurodollar Borrowing or a Base Rate Borrowing; (y) the date of such Borrowing (which shall be a Business Day) and the amount thereof; and (z) if such Borrowing is to be a Eurodollar Borrowing, the Interest Period with respect thereto. If no election as to the Type of Borrowing is specified in any such notice, then the requested Revolving Borrowing shall be a Base Rate Borrowing. If no Interest Period with respect to any Eurodollar Borrowing is specified in any such notice, then the Borrower shall be deemed to have selected an Interest Period of one month's duration. The Agent shall promptly advise the Lenders of any notice given pursuant to this Section 2.2 and of each Lender's portion of the requested Borrowing. (b) Subject to Section 2.3(a), each Lender shall make each Loan to be made by it hereunder on the proposed date thereof by wire transfer of immediately available funds to the designated account of the Agent in Philadelphia, Pennsylvania, not later than 2:00 p.m., Philadelphia time, and the Agent shall by 3:00 p.m., Philadelphia time, wire transfer the amounts so received to the designated account of the Borrower or, if a Borrowing shall not occur on such date because any condition precedent herein specified shall not have been met, return the amounts so received to the respective Lenders. Unless the Agent shall have received notice from a Lender prior to the date of any Borrowing that such Lender will not make available to the Agent such Lender's portion of such Borrowing, the Agent may assume that such Lender has made such portion available to the Agent on the date of such Borrowing in accordance with this paragraph (b) and the Agent may, in reliance upon such assumption, make available to the Borrower on such date a corresponding amount. If and to the extent that such Lender shall not have made such portion available to the Agent, such Lender and the Borrower severally agree to repay to the Agent forthwith on demand such corresponding amount together with interest thereon, for each day from the date such amount is made available to the Borrower until the date such amount is repaid to the Agent at the interest rate applicable at the time to the Loans comprising such Borrowing. If such Lender shall repay to the Agent such corresponding amount, such amount shall constitute such Lender's Loan as part of such Borrowing for purposes of this Agreement.

  • RECOVERY PROCEDURES The nature and severity of any disaster will influence the recovery procedures. One crucial factor in determining how BellSouth will proceed with restoration is whether or not BellSouth's equipment is incapacitated. Regardless of who's equipment is out of service, BellSouth will move as quickly as possible to aid with service recovery; however, the approach that will be taken may differ depending upon the location of the problem.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!