Bank Security Procedures Sample Clauses

Bank Security Procedures. The Bank requires that the Customer establish separate User IDs and Passwords for each Authorized User, and develop and adhere to internal procedures set forth above to prevent the disclosure of the Password to other persons and to prevent unauthorized use. The Bank shall take steps to authenticate the Customer’s identity and any Authorized User’s identity for purposes of fraud prevention. The Bank may also utilize information or security measures to identify the customers such as a token and PIN. The Bank will require that the Customer establish a Company Administrator (the Bank will assign the initial Administrator password). The Customer’s Company Administrator will establish individual Authorized User IDs and User Passwords for use to sign-on to the Service. The Bank will never contact the Customer requesting passwords. If such a request is made of the Customer, the Customer is required to notify the Bank immediately. The Bank will require that the Administrator perform other administrative tasks in connection with the Customer’s use of the Business Banking Services, including adding and deleting Authorized Users, supervising the security of the Customer’s systems, and setting up and modifying communication settings. The Administrator will be required to designate different levels of access for Authorized Users, including tokens. The Bank may, at its option, verify any instruction (e.g., call back verification), as an alternative security procedure. The Bank may elect not to act on a transmission for the Customer’s protection, if the Bank is unable to obtain proper verification The Bank will not be responsible for any delay in the processing of any transmission resulting from the Bank’s inability to reach Authorized User to verify the authenticity or accuracy of any such transmission. The Bank will provide the Customer with a comprehensive guide to the Online Business Banking Service at time of Application.
AutoNDA by SimpleDocs
Bank Security Procedures. We will make commercially reasonable efforts to control access to Online Banking Services through the use of Security Procedures we establish and amend from time to time. You are required to comply with all Security Procedures required by us or this Agreement. We reserve the right to reject any transaction or service request that is not made in accordance with our required Security Procedures. You acknowledge receiving an electronic copy of our current Security Procedures. You acknowledge that our required Security Procedures shall be deemed commercially reasonable in all respects. You are required at all times to use a web browser that supports 128-bit SSL and 128-bit RC4 minimum encryptions. You are also required to change passwords for the Master User and each Sub-User on a regular basis no less frequent than every one hundred eighty (180) days. You acknowledge that using your computer, browser, Access Device, or other Required Technology to store login information, passwords, or passcodes, or authenticated fingerprints, facial image data, or other biometric information or other Security Procedures used to authorize or authenticate your use of Online Banking Services increases the risk of Unauthorized Use. You assume any and all risk associated with such storage. In the event you fail to change passwords in accordance with this Agreement, our liability to you or any third party for any loss or damage resulting from, or arising out of, your failure to change passwords may be limited or discharged pursuant to this Agreement or Applicable Law. You understand that our required Security Procedures are not for the purpose of detecting errors in transmission or content of a payment order or other request not initiated by us. You acknowledge that anyone with knowledge of the Security Procedures will be able to use Online Banking Services and act on your behalf. You are required to inform all Sub- Users that Security Procedures should not be shared with any Person and maintain a secure environment to ensure against Unauthorized Use, including but not limited to securing physical access to the Access Device used for services when the Master User or a Sub-User has logged on to use Online Banking Services or otherwise. Due to emerging technologies and ensuing changes in Security Procedures, we reserve the right to supplement or amend our Security Procedures from time to time upon reasonable notice to you as published on the Web Site or otherwise. If we shall in goo...
Bank Security Procedures. To the extent, MFC and its agents, representatives, and employees operate the Bank’s systems and software utilized in the performance of the services such operations shall be in accordance with procedures established by the Bank from time to time.
Bank Security Procedures 

Related to Bank Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • SAFETY PROCEDURES The Contractor shall:

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • AML/KYC Procedures “AML/KYC Procedures” means the customer due diligence (CDD) procedures of a Reporting Financial Institution pursuant to the anti-money laundering or similar requirements of the jurisdiction concerned to which such Reporting Financial Institution is subject.

  • BIDDING PROCEDURES 4.1. Bidders have to login at EHSAN AUCTIONEERS SDN. BHD. Website using the same registered email 30 minute before Auction Time.

Time is Money Join Law Insider Premium to draft better contracts faster.