Adequacy of Security Procedures Sample Clauses

Adequacy of Security Procedures. Business Member acknowledges that the Security Procedures set forth in this Agreement, and as otherwise implemented by the Credit Union from time to time, will not detect errors in the transmission or content of the Wire Transfer instructions. Business Member acknowledges and agrees that it will strictly adhere to the Security Procedures as set forth in this Agreement, and as otherwise implemented by the Credit Union from time to time. Business Member further acknowledges and agrees that the Security Procedures set forth in this Agreement, and as otherwise implemented by the Credit Union from time to time, are commercially reasonable, and Business Member shall be bound by any Wire Transfer instructions issued in Business Member’s name and accepted by the Credit Union in good faith and in compliance with the Security Procedures set forth herein and as may otherwise be implemented by the Credit Union from time to time.
AutoNDA by SimpleDocs
Adequacy of Security Procedures. You acknowledge that the Security Procedures set forth in this Agreement, and as otherwise implemented by the Credit Union from time to time, will not detect errors in the transmission or content of the Wire Transfer instructions. You acknowledge and agree that you will strictly adhere to the Security Procedures as set forth in this Agreement, and as otherwise implemented by the Credit Union from time to time. You further acknowledge and agree that the Security Procedures set forth in this Agreement, and as otherwise implemented by the Credit Union from time to time, are commercially reasonable, and you shall be bound by any Wire Transfer instructions issued in your name and accepted by the Credit Union in good faith and in compliance with the Security Procedures set forth herein and as may otherwise be implemented by the Credit Union from time to time.
Adequacy of Security Procedures. BY USING THE WIRE SERVICE, YOU ACKNOWLEDGE AND AGREE THAT THIS AGREEMENT SETS FORTH SECURITY PROCEDURES FOR WIRE TRANSFERS THAT ARE COMMERCIALLY REASONABLE. YOU AGREE TO BE BOUND BY WIRE INSTRUCTIONS, WHETHER AUTHORIZED OR UNAUTHORIZED, WHICH WE IMPLEMENT IN COMPLIANCE WITH THESE SECURITY PROCEDURES, UNLESS YOU HAVE GIVEN US PRIOR NOTICE OF POSSIBLE UNAUTHORIZED USE AS DESCRIBED ABOVE (AND WE HAD A REASONABLE OPPORTUNITY TO ACT ON SUCH NOTICE). Each time you submit Wire Instructions using the Wire Service, you reaffirm your agreement that the Security Procedures are commercially reasonable. We may restrict or discontinue your ability to submit Wire Instructions using the Wire Service at any time without prior notice to you if necessary to maintain Bank’s security or the security of the Wire Service. You agree that any action that Bank takes beyond the Security Procedures in an attempt to detect or prevent an unauthorized use of the Wire Service or an error in the transmission or content of a Wire Instruction, shall not be deemed to be a part of the Security Procedures regardless of how often Bank takes such action.

Related to Adequacy of Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • Collection Procedures (a) On or before the Closing Date, the Seller and the Purchaser shall have established and shall maintain thereafter the system of collecting and processing Collections of Receivables in accordance with Section 2.02 of the Servicing Agreement. (b) The Seller shall cause all in-store payments to be (i) processed as soon as possible after such payments are received by the Seller but in no event later than the Business Day after such receipt, and (ii) delivered to the Servicer or, if a Daily Payment Event has occurred, deposited in the Collection Account no later than the second Business Day following the date of such receipt. (c) The Seller and the Purchaser shall deliver to the Servicer or, if a Daily Payment Event has occurred, deposit into the Collection Account all Recoveries received by it within two Business Days after the Date of Processing for such Recovery. (d) Any funds held by the Seller representing Collections of Receivables shall, until delivered to the Servicer or deposited in the Collection Account, be held in trust by the Seller on behalf of the Trustee as part of the Trust Estate. (e) The Seller hereby irrevocably waives any right to set off against, or otherwise deduct from, any Collections. (f) The Seller acknowledges that Seller shall not have any right, title or interest in and to any Trust Account.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Claim Procedures Claim forms or claim information as to the subject policy can be obtained by contacting Benmark, Inc. (800-544-6079). When the Named Fiduciary has a claim which may be covered under the provisions described in the insurance policy, they should contact the office named above, and they will either complete a claim form and forward it to an authorized representative of the Insurer or advise the named Fiduciary what further requirements are necessary. The Insurer will evaluate and make a decision as to payment. If the claim is payable, a benefit check will be issued in accordance with the terms of this Agreement. In the event that a claim is not eligible under the policy, the Insurer will notify the Named Fiduciary of the denial pursuant to the requirements under the terms of the policy. If the Named Fiduciary is dissatisfied with the denial of the claim and wishes to contest such claim denial, they should contact the office named above and they will assist in making an inquiry to the Insurer. All objections to the Insurer's actions should be in writing and submitted to the office named above for transmittal to the Insurer.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Notification Procedures To address non-compliance, the receiving Competent Authority would notify the providing Competent Authority pursuant to Article 5 of the IGA. The notification procedures would differ depending upon whether the receiving Competent Authority seeks to address administrative or other minor errors or significant non-compliance.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!