Browser Security Sample Clauses

Browser Security. HFCU requires the use of a secure browser to protect you while you access your account online. Secure browsers have a high level or protection, allowing your information to be encrypted when passed through the website to HFCU. For these reasons, only more recent browser versions of the following are permitted to be used when logging into eBranch: • Google Chrome • Firefox • Safari (macOS only) • Edge (Windows only) eBranch is available for member convenience twenty-four hours per day. Members will be notified of planned and unplanned maintenance/downtime as soon as practical. When an account is applied for online, it is important for each member, as well as HFCU, to make sure that we have correct and complete information, and that the information is verified and protected. We take protecting your information very seriously. Increased regulatory procedures have added information-gathering requirements for financial institutions. These are set in order to protect everyone and keep the financial system safe and secure. Ongoing advances in technology mean that we are constantly upgrading systems and securities to keep member information safe and secure. In order to access certain systems, as well as all functionalities on eBranch, you will need to use a user name and password. This information may either be provided for you or you will be allowed to choose your own. There are rules in place about the length and allowable characters for both of these items in order to make both your user name and password difficult to guess. The use of a user name and password are designed to protect you by confirming your identity, and should be kept confidential. HFCU employees do not have access to your password, nor can they manually create a password for you. When resetting a password, HFCU employees will be sending you notification of a temporary password that is system generated. After logging in with that temporary password, you will be prompted to reset your password. It is very important that you do not share your password with anyone or allow a computer to save or remember your password, especially if you are utilizing a computer with public or shared access. This is for your protection and security. You are responsible for the actions, transactions, and use of any sub-user you create on your account. HFCU will only reset passwords for sub-users and will not provide account information or any online banking information to any sub-user that is not an account owner or ...
AutoNDA by SimpleDocs
Browser Security. Online Banking transmits data using SSL (Secure Socket Layer) technology that supports 128-bit key encryption. It is important to verify that a secure connection between your browser and the Online Banking server has been established before transmitting any confidential account information over the Internet. This can be verified by an indicator on your compatible web browser, which should have a lock symbol that appears when data is being encrypted. When this symbol does not appear, a secure session has not been established. You agree not to engage in Online Banking transactions unless you have confirmed that a secure session has been established.
Browser Security. Whilst it shall always be for the Supplier to ensure compliance with the above-mentioned legislation and HMG security requirements when providing Services under the Framework Agreement, the broad sets of controls that follow in the remainder of this document are considered the minimum that the Supplier shall have in place. Where information is deemed by the Contracting Authority and/or their client to be particularly sensitive, the Supplier may be required to enter into further consultation with the Contracting Authority and/or their client’s security personnel to agree additional minimum controls.
Browser Security. Our Digital Service transmits data Using SSL (Secure Socket Layer) technology that supports 128-bit key encryption. It is important to verify that a secure connection between your browser and the Digital Services server has been established before transmitting any confidential account information over the Internet. An indicator on your web browser can verify this. For example, Microsoft Internet Explorer has a lock symbol that appears when data is being encrypted. When this symbol does not appear, a session is not secure.
Browser Security. First Community Bank believes the safety and security of its customers’ accounts and personal information is of highest importance. For the highest level of security, you must access Online Banking via a personal computer or mobile device with up to date operating systems and browsers. Using the most current versions of browsers ensures better security for internet protection. Updates for browsers can be downloaded from the software provider’s websites.
Browser Security. Some internet browsers may save users names and passwords. This will automatically complete any login for you and may allow people at your computer or mobile device to use your logins without knowing your passwords. For your security, review your internet browsers “Help” section to clear cookies (cookies are small data files that stay on your computer or other mobile device by the web server when a site is visited) or contact their Customer Support to see is this option is available and how to disable this option. It is your responsibility to obtain and maintain your internet browser to ensure that your connectivity secure and is in accordance with applicable requirements, including any requirements of web server companies and authorities. You are responsible for obtaining, installing, maintaining and operating all hardware, software and Internet access services necessary for obtaining and securing our Online Banking service.
Browser Security. The Farmers Bank Internet Banking transmits data using SSL (Secure Socket Layer) technology that supports 128-bit key encryption. It is important to verify that a secure connection between your browser and the Internet Banking server has been established before transmitting any confidential account information over the Internet. This can be verified by an indicator on your web browser. Netscape Navigator has a key symbol that appears in the lower left corner of the screen. When the symbol appears "solid" transmitted data is being encrypted. When this symbol appears "broken", a secure session has not been established. Similarly, Microsoft Internet Explorer has a lock symbol that appears when data is being encrypted. When this symbol does not appear, a session is not secure.
AutoNDA by SimpleDocs

Related to Browser Security

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS. 18.2 A Tender Securing Declaration shall use the form included in Section IV, Tendering Forms. 18.3 If a Tender Security is specified pursuant to ITT 18.1, the Tender Security shall be a demand guarantee in any of the following forms at the Tenderer option: i) cash; ii) a bank guarantee; iii) a guarantee by an insurance company registered and licensed by the Insurance Regulatory Authority listed by the Authority; or

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Insurer security Whilst we make every endeavour to place your insurances with insurers that are financially sound, we do not guarantee or otherwise warrant the solvency of any insurer we place your insurances with. If you have any concerns regarding any insurer chosen to meet your insurance requirements you should inform us as soon as possible and we will discuss them with you. A liability for the premium, whether in full or pro rata, may arise under policies where a participating insurer becomes insolvent.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!