Authentication Procedures Sample Clauses

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance with an Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.
Authentication Procedures. 3.1 In order to access the electronic lodgement facility and entity details facility each user must enter a unique username and password. 3.2 We will ensure our users do not disclose their username or password to any person not authorised by us to use them. 3.5 If we suspect that a user’s username or password has been disclosed to a person not authorised by us to use ASX Online, we must immediately de-activate the user or change the password and notify the ASX Help Desk by telephone and email to the following number and email address. ASX Online Help Desk ASX Limited 00 Xxxxxx Xxxxxx Xxxxxx XXX 0000 Ph: 0000 000 000 Email: xxxxxxxxx@xxx.xxx.xx 4.1 We agree to comply with all directions issued by ASX which relate to access and use of the electronic lodgement facility or entity details facility. 4.2 ASX is not obliged to provide training in use of the electronic lodgement facility or entity details facility. We acknowledge that if ASX does provide any training to us, ASX takes no responsibility for that training. 5.1 After an eLodged document has been released to the market, ASX will email an acknowledgment of release to the email address or addresses nominated by us using the entity details facility.
Authentication Procedures. The Bank may require that the Client’s identity be authenticated using an authentication procedure selected by the Client when it initially logged on to the Online Services (the “Authentication Procedure”). The Client hereby acknowledges that it has selected such Authentication Procedure freely and voluntarily with full knowledge that different authentication procedures offered by the Bank may afford the Client differing degrees of security. The Client agrees that the Authentication Procedure is a commercially reasonable security procedure. At the Bank's sole discretion, the Bank may change the authentication procedures available to the Client; thereafter, the Client will be instructed to select an alternative authentication procedure.
Authentication Procedures. 3.1. All Payment Orders must be issued in accordance with the Authentication Procedures identified in the Enrollment Form. Customer acknowledges that it has been given a choice of Authentication Procedures, has had an opportunity to select an Authentication Procedure, and has voluntarily and freely selected the marked Authentication Procedures identified on the Enrollment Form. 3.2. Use of a PIN by any person other than an identified Authorized Representative on the Enrollment Form shall raise a presumption that Customer's security has been breached. Until new PINs are issued, the Bank shall have the right to require that all Payment Orders be made at the Bank. PINs may be changed by Bank from time to time. However, any Payment Order issued in compliance with the Authentication Procedures and accepted by Bank shall be effective as the Customer's Payment Order, and Customer agrees to be bound by the same whether or not authorized. 3.3. Customer agrees to preserve the confidentiality of the Authentication Procedures. If Customer chooses to utilize Bank's Business Online Banking Service to initiate the Service, all rules and Security Procedures associated with the Business Online Banking Service also apply to Payment Order processing.
Authentication Procedures. The Card/Account Holder agrees to comply with the following authentication procedures: 4.1. For ATM transactions, insert the Cash Card in the ATM card slot and enter Cash Card PIN for ATM. 4.2. For Contactless transactions, Tap only or Tap and enter PIN/Sign (depending on amount) 4.3. For POS transactions using Cash Card, swipe the Cash Card on the BDO miniPOS and enter Cash Card PIN for ATM and/or sign transaction slip. 4.4. For Online Banking initial transactions, enroll Cash Card in Online Banking and enter User ID and Password; for subsequent transactions, enter User ID and Password. 4.5. For Phone Banking initial transactions, enroll Cash Card in Online Banking, and enter telephone PIN (“TPIN”); for subsequent transactions, enter TPIN.
Authentication Procedures. In this subsection, there are three scenarios where a node moves into a WLAN from WLAN, a node moves into an MANET from WLAN, and a node moves into an MANET from MANET. The notations are used in our proposal are listed in Table 1.
Authentication Procedures. State Street will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by State Street in accordance with an Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.
Authentication Procedures. The Bank has adopted commercially reasonable authentication procedures and security procedures in accordance with guidance issued by the Federal Financial Institutions Examination Council for Authentication in an Internet Banking Environment. There is inherent risk associated with banking over the Internet. You are solely responsible for controlling the safekeeping of and access to your Login and Password to Online Banking. If you believe that your Login and Password have been used by an unauthorized individual, you must notify CNB and arrange to change your Login and Password. To the extent permitted by applicable law, you agree that these authentication and security procedures shall be sufficient to verify and authenticate your identity and to evidence your acceptance of and agreement to be bound by the terms and conditions of such electronic record.

Related to Authentication Procedures

  • Authentication This Note shall not be valid until authenticated by the manual signature of the Trustee or an authenticating agent.