Authentication Credentials. Licensee must monitor and maintain the security and proper use of all Authentication Credentials issued by Licensee or by Xxxxxx Mae for Licensee’s benefit and is solely responsible for all activities that occur through the use of such Authentication Credentials, whether or not the activities were authorized by Licensee. Authentication Credentials may not be transferred among Authorized Users or other individuals or systems. Licensee must take immediate steps to disable an Authorized User’s Authentication Credential if they cease to be associated with Licensee or no longer needs access to the Licensed Materials, and must immediately notify Xxxxxx Xxx if there is any loss, theft or unauthorized disclosure or use of an Authentication Credential. Licensee must periodically review and update its Authorized Users’ access rights. Xxxxxx Mae is not required to provide access to the Licensed Application to any individual or system, and reserves the right to refuse, change or revoke Authentication Credentials at any time. Licensee must revoke or reset Authentication Credentials as required by Xxxxxx Xxx, but in no event less than: (a) every ninety calendar days for individuals and
Authentication Credentials. You shall keep accounts and authentication credentials providing access to Products secure and confidential. You must notify Palo Alto Networks without undue delay about any misuse of your accounts or authentication credentials you become aware of.
Authentication Credentials. The User is responsible for maintaining the confidentiality of any non-public authentication credentials associated with its use of the Service.
Authentication Credentials. Notwithstanding the provisions of the Section of the Master Terms entitled "Management of Authentication Credentials," Authentication Credentials that have been issued to Licensee for company-wide use may be shared and used between and among individuals who are employees of Licensee or that are independent or affiliate underwriting and quality control contractors of Licensee to access and use FTP.
Authentication Credentials. You must ensure that each Authentication Credential issued to You is securely maintained and used only by the individual or system to whom it was assigned. You must implement all reasonable and necessary measures to prevent transfers of Authentication Credentials between individuals or systems.
Authentication Credentials. The systems shall be configured in such a manner that access will be granted exclusively to those provided with authentication credentials allowing unique identification of the user. This include: a code associated to a confidential password that shall only be known by the user, or an authentication device that shall only be held and used by the user, which may, in certain cases, be associated with an ID code or a password. Password – The use of a password, as far as concerns its basic features, being the obligation to change it at the first access, the minimum length, the absence of elements that may be easily referred to its holder, the rules about its complexity, the expiration, history, assessment of strength in context, display and storage, will comply with the best practices. Users being provided with credentials shall also receive specific instructions concerning the measures that must be adopted to ensure that such credentials remain secret. Logging – The systems may be configured in such a manner as to track access requests and, where appropriate, other activities that are carried out, in relation to the different types of users (Administrator, Super User, etc.), and shall be protected by appropriate security measures ensuring their integrity. Backup & Restore – Appropriate measures shall be implemented aimed at ensuring restoration of access to data in case of damages to such data or to electronic tools, within terms that are certain and consistent with the rights of the data subjects. It remains the responsibility of the Data Controller to decide whether to independently make backup copies during the term of the agreement and for a 60-day period following its termination. If so required by any agreement, a continuity operation plan shall be implemented and, where necessary, integrated with the disaster recovery plan. These plans ensure the availability and access to the systems also in the event of serious adverse events that may persist in time.
Authentication Credentials. Company has sole control over access and use by its End Users of SCC, and is responsible for ALL activity (whether authorized or unauthorized) occurring on Company's SCC account hereunder. Company is responsible for maintaining the confidentiality of any non-public authentication credentials associated with its access to and use of SCC. Company will ensure that all End Users comply with Company's obligations under these Terms of Use and that the terms and conditions of Company's agreement with each End User are consistent with these Terms of Use. If Company becomes aware of any breach or non-compliance of Company's obligations under these Terms of Use by an End User, Company will immediately terminate such End User's access to SCC and notify Cloudnosys. Further, Company is responsible for population, maintenance, security, protection, loss prevention, and backup of Company's systems, Company Data, and other content or information.
Authentication Credentials. The Bank shall not allow more than one person to use the same authentication credentials to access any Electronic Information. The Bank shall allow for separate authentication credentials by each Trust employee who may require access to its web site or system for any purpose related to this Agreement.
Authentication Credentials. Each Party shall have a user registration and deregistration procedure for systems that access, transmit or store Covered Information of the other Party with user accounts that are assigned to individuals assessing the system or particular work stations, which are only accessible by a limited number of identifiable employees of such Party whose access is strictly controlled and monitored. Each Party shall work in good faith to consider a reasonable procedure to issue individual user accounts for all roles, or implement compensating and reasonable controls to monitor use of shared user accounts. Default manufacturer passwords used in either Party’s products or Services shall be changed upon installation.
Authentication Credentials