Additional Security Procedures Sample Clauses

Additional Security Procedures. We may from time to time implement additional or alternative procedures to protect the security and confidentiality of your Online Banking transactions. Such procedures may include, without limitation, encryption, creating security firewalls in our computer systems and implementing other commercially reasonable security procedures. You agree to comply with all security procedures we may impose in connection with Online Banking, including any changes to such procedures that we might make from time to time. You agree that all security procedures used by us, our affiliates and agents in connection with Online Banking are commercially reasonable security procedures and, as a result, you assume all risk of loss for unauthorized transactions where we have followed our then-current security procedures. You acknowledge that we reserve the right to change the security procedures from time to time upon notice to you (if such notice is required by law). Your continued use of Online Banking constitutes your agreement to comply with such changed procedures and your acknowledgement that such changed procedures are commercially reasonable.
Additional Security Procedures. Enhanced Log-In/ Transaction Security. In addition to the above individual User IDs and individual Passwords, access to the Premier Business Connect Service includes a multi-factor or layered authentication security procedure at log-in or prior to initiating certain transactions for you, including your administrator and authorized users (hereinafter “Enhanced Log-in/ Transaction Security”). Enhanced Log-in Security may include, but is not limited to, additional log-in security features such as identification and verification of IP addresses. Enhanced Log- In Security will also require each User of the Premier Business Connect Service to establish and utilize, in addition to individual User IDs and passwords, his/her own individual authentication through the use of one time passwords as part of a multi-part credential. Enhanced Transaction Security may require each User of the Premier Business Connect Service to utilize a token generated One-Time-Password prior to initiating certain transactions. - You are responsible for providing security for your Systems and Account(s). Passwords must be kept private. You should make sure that no one is physically watching as Passwords are entered. It is important to remember to click “Log Off” after completing each Premier Business Connect Service session. This will deter unauthorized access to your Account(s) if your computer is shared or available to others. You should not leave your computer and/or mobile device unattended with the browser/app running and a valid User ID and Password cached as anyone can gain access to the Account(s). We recommend that you use a separate computer that is not utilized for e-mail or other Internet communications to establish and conduct transactions through the Services. (*) – These Security Procedures may / may not apply in every case, as they are subject to availability, connectivity and standard parameters set forth in our multi-factor product, as those parameters may be modified from time to time.
Additional Security Procedures. You agree that the following additional security procedures govern your use of the eBanking Services when accessing your accounts with us: • You are liable for all transactions that you or any of your Authorized Users make or authorize, even if that person exceeds his/her authority. You will also be liable for all transactions by an Authorized User until you have notified us of the revocation of the Authorized User's authority, and we have had a reasonable time to act on such notice to block the affected User ID, Password and/or security information. You are also liable for any and all unauthorized use that occurs before you have notified us that your User ID, Password and/or security information, or other access means in your possession or control have been lost or stolen or used without your authority and before we have had a reasonable opportunity to act. • Your use of eBanking constitutes your agreement that our security procedures are commercially reasonable. You acknowledge and agree that the security procedures are not designed to detect errors in the content of instructions or transactions. You also understand and agree that the security procedures, even when properly implemented by us and by you, do not provide a guarantee against unauthorized access to information or unauthorized transactions. Accordingly, you agree to assume risks in connection with the establishment and/or use of eBanking. Without limiting the generality of the foregoing, you agree that if account information is accessed, or if an instruction is made (such as a transfer or payment order), by a person using your User ID, Password and/or security information, we may treat that access request or instruction as being authorized by you (regardless of whether or not it was actually authorized by you), and you agree to be bound by any transactions implemented through those instructions. • You represent and warrant to us that you have taken all action necessary to access and use eBanking and that any resolutions, certifications, authorizations or other documents submitted to us in connection with the eBanking Services are true, accurate, completed and will be kept up to date. You, and each person you designate to use eBanking on your behalf during enrollment or on other documents for eBanking, as permitted by us, also represent and warrant to us that each person whose name is listed during the enrollment or on such other documents is duly authorized to bind the business in all transact...
Additional Security Procedures. We may from time to time use reasonable additional or alternative procedures to ensure the security and confidentiality of your financial records and transactions using Columbia OnLine for Business™. Such procedures may include, without limitation, encryption, creating security firewalls in our computer systems and implementing other commercially reasonable security procedures. At all times you agree to comply with all security procedures we may impose in connection with your use of Columbia OnLine for Business™. You agree that all security procedures used by us, our affiliates and agents in connection with Columbia OnLine for Business™ are commercially reasonable security procedures and, as a result, you assume all risk of loss for unauthorized transactions where we have followed our then current security procedures. You acknowledge that we reserve the right to change the security procedures from time to time upon notice to you (if such notice is required by law), and furthermore agree that your continued use of any such changed procedures evidences your acceptance of and agreement to the commercial reasonableness of such changed procedures.
Additional Security Procedures a. Additional Verification b. Dual Controls and T ransaction Limits The dual controls and transaction limits described in this ACH Services Agreement and its Schedules also constitute security procedures required to process ACH credit or debit transactions.
Additional Security Procedures. Notwithstanding other terms of this Agreement or any agreement between DISTRIBUTOR, ▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇ and any other party, both parties agree to follow appropriate procedures to protect the security of Cardholder Information received during the Term of this Agreement, including: (i) installing and maintaining a working network firewall to protect data accessible via the internet; (ii) using and regularly updating anti-virus software; (iii) ensuring security patches are current; (iv) encrypting stored data and data sent over open networks; (v) maintaining an information security policy for employees and contractors; (vi) storing all materials containing Cardholder Information in a restricted area; (vii) restricting access to Cardholder Information to those on a limitedneed to know” basis; (viii) retaining Cardholder Information only as is reasonably appropriate, and consistent with, each party’s authorized use and service; (ix) discarding Cardholder Information in a manner that ensures complete destruction; (x) assigning a unique ID to each person with computer access to Cardholder Information, and (xi) ensuring that unauthorized parties do not have access to any systems containing Cardholder Information.
Additional Security Procedures. We may, at our option, offer you additional Security Procedures to enhance the security of your Authorized Account(s) and Cash Management Service(s) We have the right to implement additional verification and identification steps, factors or procedures that we deem necessary or appropriate in our discretion. These may be implemented as an amendment to the Security Procedures selected by you or as an additional Security Procedure available to you.