Additional Security Procedures Sample Clauses

Additional Security Procedures. We may from time to time implement additional or alternative procedures to protect the security and confidentiality of your Online Banking transactions. Such procedures may include, without limitation, encryption, creating security firewalls in our computer systems and implementing other commercially reasonable security procedures. You agree to comply with all security procedures we may impose in connection with Online Banking, including any changes to such procedures that we might make from time to time. You agree that all security procedures used by us, our affiliates and agents in connection with Online Banking are commercially reasonable security procedures and, as a result, you assume all risk of loss for unauthorized transactions where we have followed our then-current security procedures. You acknowledge that we reserve the right to change the security procedures from time to time upon notice to you (if such notice is required by law). Your continued use of Online Banking constitutes your agreement to comply with such changed procedures and your acknowledgement that such changed procedures are commercially reasonable.
AutoNDA by SimpleDocs
Additional Security Procedures. Enhanced Log-In/ Transaction Security. In addition to the above individual User IDs and individual Passwords, access to the Business Online Service includes a multi-factor or layered authentication security procedure at log-in or prior to initiating certain transactions for you, including your administrator and authorized users (hereinafter “Enhanced Log-in/ Transaction Security”). Enhanced Log-in Security may include, but is not limited to, additional log-in security features such as identification and verification of IP addresses. Enhanced Log-In Security will also require each User of the Business Online Service to establish and utilize, in addition to individual User IDs and passwords, his/her own individual authentication through the use of personal identifying questions and image verification as part of a multi-part credential. Enhanced Transaction Security may require each User of the Business Online Service to establish and utilize his/her own individual authentication through the use of personal identifying questions prior to initiating certain transactions. - You are responsible for providing security for your Systems and Account(s). Passwords must be kept private. You should make sure that no one is physically watching as Passwords are entered. It is important to remember to click “Log Off” after completing each Business Online Service session. This will deter unauthorized access to your Account(s) if your computer is shared or available to others. You should not leave your computer unattended with the browser running and a valid User ID and Password cached as anyone can gain access to the Account(s). We recommend that you use a separate computer that is not utilized for e- mail or other Internet communications to establish and conduct transactions through the Services. (*) – These Security Procedures may / may not apply in every case, as they are subject to availability, connectivity and standard parameters set forth in our multi-factor product, as those parameters may be modified from time to time.
Additional Security Procedures. You agree that the following additional security procedures govern your use of the eBanking Services when accessing your accounts with us: • You are liable for all transactions that you or any of your Authorized Users make or authorize, even if that person exceeds his/her authority. You will also be liable for all transactions by an Authorized User until you have notified us of the revocation of the Authorized User's authority, and we have had a reasonable time to act on such notice to block the affected User ID, Password and/or security information. You are also liable for any and all unauthorized use that occurs before you have notified us that your User ID, Password and/or security information, or other access means in your possession or control have been lost or stolen or used without your authority and before we have had a reasonable opportunity to act. • Your use of eBanking constitutes your agreement that our security procedures are commercially reasonable. You acknowledge and agree that the security procedures are not designed to detect errors in the content of instructions or transactions. You also understand and agree that the security procedures, even when properly implemented by us and by you, do not provide a guarantee against unauthorized access to information or unauthorized transactions. Accordingly, you agree to assume risks in connection with the establishment and/or use of eBanking. Without limiting the generality of the foregoing, you agree that if account information is accessed, or if an instruction is made (such as a transfer or payment order), by a person using your User ID, Password and/or security information, we may treat that access request or instruction as being authorized by you (regardless of whether or not it was actually authorized by you), and you agree to be bound by any transactions implemented through those instructions. • You represent and warrant to us that you have taken all action necessary to access and use eBanking and that any resolutions, certifications, authorizations or other documents submitted to us in connection with the eBanking Services are true, accurate, completed and will be kept up to date. You, and each person you designate to use eBanking on your behalf during enrollment or on other documents for eBanking, as permitted by us, also represent and warrant to us that each person whose name is listed during the enrollment or on such other documents is duly authorized to bind the business in all transact...
Additional Security Procedures. We may from time to time use reasonable additional or alternative procedures to ensure the security and confidentiality of your financial records and transactions using Columbia OnLine for Business™. Such procedures may include, without limitation, encryption, creating security firewalls in our computer systems and implementing other commercially reasonable security procedures. At all times you agree to comply with all security procedures we may impose in connection with your use of Columbia OnLine for Business™. You agree that all security procedures used by us, our affiliates and agents in connection with Columbia OnLine for Business™ are commercially reasonable security procedures and, as a result, you assume all risk of loss for unauthorized transactions where we have followed our then current security procedures. You acknowledge that we reserve the right to change the security procedures from time to time upon notice to you (if such notice is required by law), and furthermore agree that your continued use of any such changed procedures evidences your acceptance of and agreement to the commercial reasonableness of such changed procedures.
Additional Security Procedures a. Additional Verification b. Dual Controls and T ransaction Limits The dual controls and transaction limits described in this ACH Services Agreement and its Schedules also constitute security procedures required to process ACH credit or debit transactions.
Additional Security Procedures. Notwithstanding other terms of this Agreement or any agreement between DISTRIBUTOR, XXXXXXXXXX.XXXXX and any other party, both parties agree to follow appropriate procedures to protect the security of Cardholder Information received during the Term of this Agreement, including: (i) installing and maintaining a working network firewall to protect data accessible via the internet; (ii) using and regularly updating anti-virus software; (iii) ensuring security patches are current; (iv) encrypting stored data and data sent over open networks; (v) maintaining an information security policy for employees and contractors; (vi) storing all materials containing Cardholder Information in a restricted area; (vii) restricting access to Cardholder Information to those on a limitedneed to know” basis; (viii) retaining Cardholder Information only as is reasonably appropriate, and consistent with, each party’s authorized use and service; (ix) discarding Cardholder Information in a manner that ensures complete destruction; (x) assigning a unique ID to each person with computer access to Cardholder Information, and (xi) ensuring that unauthorized parties do not have access to any systems containing Cardholder Information.
Additional Security Procedures. We may, at our option, offer you additional Security Procedures to enhance the security of your Authorized Account(s) and Cash Management Service(s) We have the right to implement additional verification and identification steps, factors or procedures that we deem necessary or appropriate in our discretion. These may be implemented as an amendment to the Security Procedures selected by you or as an additional Security Procedure available to you.
AutoNDA by SimpleDocs

Related to Additional Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Additional Procedures (i) Once initiated by an Auction Notice, the Auction Party may not withdraw an Auction other than a Failed Auction. Furthermore, in connection with any Auction, upon submission by a Lender of a Qualifying Bid, such Lender (each, a “Qualifying Lender”) will be obligated to sell the entirety or its allocable portion of the Reply Amount, as the case may be, at the Applicable Price. (ii) To the extent not expressly provided for herein, each purchase of Term Loans pursuant to an Auction shall be consummated pursuant to procedures consistent with the provisions in this definition, established by the Auction Agent acting in its reasonable discretion and as reasonably agreed by the Borrower. (iii) In connection with any Auction, the Borrower and the Lenders acknowledge and agree that the Auction Agent may require as a condition to any Auction, the payment of customary fees and expenses by the Auction Party in connection therewith as agreed between the Auction Party and the Auction Agent. (iv) Notwithstanding anything in any Loan Document to the contrary, for purposes of this definition, each notice or other communication required to be delivered or otherwise provided to the Auction Agent (or its delegate) shall be deemed to have been given upon the Auction Agent’s (or its delegate’s) actual receipt during normal business hours of such notice or communication; provided that any notice or communication actually received outside of normal business hours shall be deemed to have been given as of the opening of business on the next Business Day. (v) The Borrower and the Lenders acknowledge and agree that the Auction Agent may perform any and all of its duties under this definition by itself or through any Affiliate of the Auction Agent and expressly consent to any such delegation of duties by the Auction Agent to such Affiliate and the performance of such delegated duties by such Affiliate. The exculpatory provisions pursuant to this Agreement shall apply to each Affiliate of the Auction Agent and its respective activities in connection with any purchase of Term Loans provided for in this definition as well as activities of the Auction Agent.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each JBE Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such JBE Work Location.

  • Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Project Delivery Order Procedures The TIPS Member having approved and signed an interlocal agreement, or other TIPS Membership document, may make a request of the awarded vendor under this Agreement when the TIPS Member has services that need to be undertaken. Notification may occur via phone, the web, email, fax, or in person. Upon notification of a pending request, the awarded vendor shall make contact with the TIPS Member as soon as possible, but must make contact with the TIPS Member within two working days. Scheduling of projects (if applicable) may be accomplished when the TIPS Member issues a Purchase Order and/or an Agreement or Contract that will serve as “the notice to proceed” as agreed by the Vendor and the TIPS Member. The period for the delivery order will include the mobilization, materials purchase, installation and delivery, design, weather, and site cleanup and inspection. No additional claims may be made for delays as a result of these items. When the tasks have been completed the awarded vendor shall notify the client and have the TIPS Member or a designated representative of the TIPS Member inspect the work for acceptance under the scope and terms in the Purchase Order and/or Agreement or Contract. The TIPS Member will issue in writing any corrective actions that are required. Upon completion of these items, the TIPS Member will issue a completion notice and final payment will be issued per the contractual requirements of the project with the TIPS Member. Any Construction contract prepared by the TIPS Member’s Legal Counsel may alter the terms of this subsection, “Scheduling of Projects”.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Indemnity Procedures Promptly after receipt by an Indemnified Party of any claim or notice of the commencement of any action or administrative or legal proceeding or investigation as to which the indemnity provided for in Article 18.1 may apply, the Indemnified Party shall notify the Indemnifying Party of such fact. Any failure of or delay in such notification shall not affect a Party’s indemnification obligation unless such failure or delay is materially prejudicial to the Indemnifying Party. Except as stated below, the Indemnifying Party shall have the right to assume the defense thereof with counsel designated by such Indemnifying Party and reasonably satisfactory to the Indemnified Party. If the defendants in any such action include one or more Indemnified Parties and the Indemnifying Party and if the Indemnified Party reasonably concludes that there may be legal defenses available to it and/or other Indemnified Parties which are different from or additional to those available to the Indemnifying Party, the Indemnified Party shall have the right to select separate counsel to assert such legal defenses and to otherwise participate in the defense of such action on its own behalf. In such instances, the Indemnifying Party shall only be required to pay the fees and expenses of one additional attorney to represent an Indemnified Party or Indemnified Parties having such differing or additional legal defenses. The Indemnified Party shall be entitled, at its expense, to participate in any such action, suit or proceeding, the defense of which has been assumed by the Indemnifying Party. Notwithstanding the foregoing, the Indemnifying Party (i) shall not be entitled to assume and control the defense of any such action, suit or proceedings if and to the extent that, in the opinion of the Indemnified Party and its counsel, such action, suit or proceeding involves the potential imposition of criminal liability on the Indemnified Party, or there exists a conflict or adversity of interest between the Indemnified Party and the Indemnifying Party, in such event the Indemnifying Party shall pay the reasonable expenses of the Indemnified Party, and (ii) shall not settle or consent to the entry of any judgment in any action, suit or proceeding without the consent of the Indemnified Party, which shall not be unreasonably withheld, conditioned or delayed.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!