Authentication Process Sample Clauses

Authentication Process. Client hereby acknowledges that CIC shall maintain strict procedures and protocols relating to its enrollment and authentication processes (including timed-out and other security measures), and failure by an Individual to follow such procedures and protocols may result in a failed enrollment. Client also acknowledges that there are a number of additional reasons and factors that may cause Individuals to fail authentication or enrollment, including, without limitation: corporate firewalls, proxy servers, spam blockers, fraud alerts, credit file freezes, data errors, inaccurate out-of-wallet information, or incorrect social security numbers. Upon any such failure, each affected Individual shall be provided with the toll-free number to CIC Customer Care. When an Individual initiates such a call, a CIC customer care representative will attempt to manually authenticate such Individual by asking additional security questions. In the event such a telephonic authentication is not possible, additional steps may be taken. CIC shall endeavor to make the enrollment process as “user-friendly” as reasonably possible without compromising its security standards. CIC reserves the right, at its sole and absolute discretion, to modify or alter the enrollment process and/or the services associated therewith from time to time without notice to Client.
AutoNDA by SimpleDocs
Authentication Process. During the start of the interaction, system roles A and B must authenticate their respective identities using the ECDSA technique. System roles A and B may comprise appropriate government agencies (CA), healthcare providers (MI), insurance firms (IC), banking (BK), and individuals (PT).
Authentication Process. The complete Data Block described in Appendix 1(a) will be signed by an Authenticator to provide authentication of the source and validation of the data. This allows the content of the message to be sent in plain text and still to be validated and authenticated by authorised parties only. There are four elements used in the calculation of the authenticator. These are:

Related to Authentication Process

  • Authentication This Note shall not be valid until authenticated by the manual signature of the Trustee or an authenticating agent.

  • Authentic Text This Agreement is drawn up in duplicate in the Danish, Dutch, English, Finnish, French, German, Greek, Italian, Portuguese, Spanish and Swedish languages, each of these texts being equally authentic.

  • Access by and Authentication of Authorized Users Authorized Users of the Participating Institutions shall be granted access to the Licensed Materials pursuant to the following:

Time is Money Join Law Insider Premium to draft better contracts faster.