We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

CODES AND PASSWORDS Sample Clauses

CODES AND PASSWORDS. If the Company is approved to use the LYNX Services, the Bank will provide the Company with certain information, including, but not limited to, access codes, passwords and user identifications (“Credentials”). Each user authorized by the Company to access the LYNX Services must have their own unique Credentials. The Company acknowledges that it is solely responsible for safeguarding and ensuring that each user safeguards, the confidentiality of their Credentials. In furtherance of the foregoing, Company agrees to train users regarding the risks associated with sharing or disclosure of Credentials (including sharing with other employees of the Company) and will develop and maintain internal procedures to limit such risks, including, but not limited to (a) ensuring Credentials are changed upon the user’s first logon and thereafter periodically in accordance with industry standards; (b) not permitting users to share their Credentials; (c) deleting the Credentials of users who no longer have access to the LYNX Services; and (d) keeping all Credentials under secure conditions. The Company agrees to comply with any additional access or identification procedures the Bank may establish. The Company further agrees to immediately notify the Bank by telephone (and confirm such oral notification in writing) if it has reason to believe that any Credentials has been stolen, compromised, misused or has, or may, become known by an unauthorized person (whether or not employed by the Company). These responsibilities may not be waived or modified by agreement or authorization by any Bank employee, agent or representative. The Company acknowledges that such Credentials are appropriate and reasonable to afford protection against unauthorized use and agrees that use of Credentials in connection with the LYNX Services shall give rise to a conclusive presumption that the use is authorized. The Company shall be liable for, and shall indemnify and hold the Bank harmless from any and all claims, losses, damages, liabilities and expenses including, without limitation attorney’s fees, court costs and related litigation costs and expenses, arising from use of the LYNX Services, whether authorized or unauthorized, and without regard to the signing authority on an Account, by any person who utilizes the Credentials or who gains access by any other means. In furtherance of the foregoing, in the event an employee, agent or representative of the Company or anyone accessing the system by uti...
CODES AND PASSWORDS. We will provide you a secured e-mail with your login information. You must immediately change your temporary Password the first time you log into the Site. Thereafter, you may change your Password at your convenience and discretion for enhanced security, and you are encouraged to do so periodically. . You are encouraged to institute procedures requiring that passwords be changed periodically. In addition, we may provide, or we may ask you (or, if you are not a Consumer, your Users) to provide, additional Codes for security purposes. You agree that the combination of Codes and Passwords constitutes a reasonable security procedure, and we are conclusively entitled to rely on, and act in accordance with, any inquiry, message, or instruction transmitted electronically using your Code and Password or (if you are not a Consumer) the Codes and Password of you and your CSA or User, which will constitute conclusive evidence that such inquiry, message or instruction is correct and has been duly authorized by you. Since the Services may be accessed from remote locations, such inquiry, message, or instruction will be deemed to be authorized by you regardless of where that transmission originates. However, we may, in our sole and arbitrary discretion, refrain from responding to, relying on, or acting in accordance with, any such inquiry, message or instruction if we believe that such inquiry, message, or instruction may not actually have been authorized by you or there may have occurred a security breach with respect thereto.
CODES AND PASSWORDS. You will manage and control access to each Transfer Service using the required passwords, codes and other access procedures. You are responsible for the establishment and maintenance of procedures to assure the confidentiality of the identification codes, passwords, repetitive request numbers and other access procedures (collectively the "Codes") and the Security Procedures. FAILURE TO PROTECT THE CODES OR SECURITY PROCEDURES MAY ALLOW AN UNAUTHORIZED PARTY TO ACCESS THE SERVICES. Except as otherwise specified in the applicable Service Documentation, you are required to develop and put in place internal procedures to limit such risk, including, but not limited to, (a) changing the password of each Operator at least once every 90 calendar days, (b) not permitting Operators to share their identification codes or passwords; (c) deleting the identification codes of Operators who no longer have access to a Service; (d) not keeping, in any form or in any place, any list of passwords; and (e) keeping every identification code and repetitive request number under secure conditions. You agree to comply with any additional access or identification procedures we establish, and, if you have reason to believe that any Code or Security Procedure has or may have become known by an unauthorized person (whether or not employed by you), you will immediately notify us by telephone and confirm to us in writing such oral notification within 24 hours.
CODES AND PASSWORDS. Guest shall not change any codes or passwords without written consent of Agent ‐ including gate, door, and garage codes, internet router passwords or any other technology device which is per‐configured with a code or password. Should a password be changed by Guest a $150.00 technology fee will be charged to the credit card on file to adjust back to the per‐configured setting.
CODES AND PASSWORDS. USER agrees not to release USER’s authentication code or device or password to any other person or allow anyone else to access AIMM INFORMATION SYSTEMS under USER’s authentication code or password. USER agrees to notify AIMM immediately if USER becomes aware or suspects that another person has access to USER’s authentication code or device or password.
CODES AND PASSWORDS. User will identify those employees who shall have access to SVHC’s Confidential Information pursuant to this Agreement as User Personnel. The User employees who shall be permitted to have access to SVHC’s Confidential Information as of the date of this Agreement are listed on “Exhibit B” which is attached. Any User Personnel who is no longer employed by the User shall have no further access to the SVHC Confidential Information. User will promptly inform the Security Officer of SVHC of (i) any employee termination so that said employee’s access to SVHC’s Confidential Information can be terminated, or (ii) any employee who becomes a member of the User Personnel so that said employee can be granted access to SVHC’s Confidential Information. SVHC will provide User with access codes (user names and passwords) which must be used to access the EMR. Access will be provided within fourteen (14) days of this Agreement being fully executed by the parties, barring any information technology issues that may arise. User agrees that the access code is the equivalent of a legal signature and that User is accountable and responsible for all work done using the SVHC access codes provided to User. No User Personnel shall disclose an access code to anyone other than the person who has been assigned such code. Moreover, employees of the User will not use an access code which is not one that is assigned to them. User agrees that User Personnel are not permitted to access the SVHC Information Systems for anything other than the intended job-related purpose relating to patient treatment of shared patients. User Personnel are not permitted access to any other individual’s health information because of a personal request, personal reasons or personal curiosity. Unauthorized access of the EMR, confidential files, or SVHC Information Systems without the proper security clearance and/or access authorization, for whatever reason, is considered a violation of the SVHC Security Policy (“SVHC Security Policy”) and a violation of this Agreement. Should User or any of its employees have reason to believe that SVHC’s access code has been disseminated, breached or someone learns an access code that has not been assigned to him or her, User will immediately contact the Security Officer of SVHC in accordance with SVHC’s policy. Passwords cannot be shared or posted. Passwords will be changed on a regular basis per SVHC policy. User Personnel must complete the Remote Secure Access (RSA) Agreement...
CODES AND PASSWORDS. DISH assumes sole responsibility for selection and use of any code or passwords as may be permitted to access any secured features on the Services, such as prepaid calling features or voice mail. AT&T Mobility shall have no responsibility or obligation for security of communications of End User using the Services, beyond its duty to exercise ordinary care.

Related to CODES AND PASSWORDS

  • Usernames and Passwords 1. Staff will not share usernames and passwords with anyone, including supervisors and technical support staff. 2. In the event that staff suspect their password is compromised or known to others, staff will change their password and notify their supervisor immediately.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.

  • Codes The Developer agrees to abide by all ordinances, regulations, and codes of Teton County and those of the special purpose districts providing service to the Development.

  • Training Materials Training Materials will be provided for each student. Training Materials may be used only for either (i) the individual student’s reference during Boeing provided training and for review thereafter or (ii) Customer’s provision of training to individuals directly employed by the Customer.

  • Password To enable you, and only you, to use the Service, you will be asked to choose a password when you register and are accepted as a customer of the Service. This password is stored in encrypted form by us. You are responsible for maintaining the confidentiality of your Funds Transfer customer number and password. No one at MIT Federal Credit Union has access to your Accounts passwords or user ID’s. You are responsible for uses of the Service whether or not actually or expressly authorized by you. Therefore, it is important that you DO NOT SHARE YOUR ACCOUNT NUMBER OR PASSWORD WITH ANYONE FOR ANY REASON. No one at MIT Federal Credit Union will know or need to know your password, and MIT Federal Credit Union employees will never ask for your password. If you wish to make a transfer to an Account of another person, you will be asked to provide a separate code word or phrase (the “Shared Secret”) that is known only to you and to the person to whom you are transferring the funds (the “Recipient”). We recommend that you do not use commonly used words, phrases or dates. In order to complete the transfer, the Recipient must provide the Shared Secret and certain other identifying information. YOU AGREE THAT YOU WILL NOT GIVE THE SHARED SECRET TO ANYONE EXCEPT THE RECIPIENT FOR ANY REASON. YOU FURTHER AGREE THAT YOU WILL INSTRUCT THE RECIPIENT NOT TO GIVE THE SHARED SECRET TO ANYONE ELSE FOR ANY REASON. If you believe your password or Shared Secret has been lost or stolen, or that someone has transferred or may transfer money from your Account without your permission, call: 000-000-0000 or fax: 000-000-0000 , or e-mail: xxxxxx@xxx.xxx, or write: Funds Transfer Administrator, MIT Federal Credit Union 000 Xxxxxxxxxx Xxxxxx, Xxxxxxxxx, XX 00000-0000. You agree to notify us AT ONCE if you believe your password has been lost or stolen. Telephoning us promptly is the best way to protect yourself from possible losses. If you never tell us, you could lose all of the money in your account (plus your maximum non-sufficient funds/overdraft (NSF/OD) line of credit). However, if you tell us within 2 business days, you can lose no more than $50 if someone used your password without your permission. If you do NOT tell us within 2 business days after you learn of the loss or theft of your password, and we can prove we could have stopped someone from using your password without your permission if you had told us, you could lose as much as $500. You can see a complete statement of all your funds transfers effected or pending at any time by clicking on the History tab. If your statement shows transfers that you did not make, notify us AT ONCE. If you do not tell us within 60 days after the transfer was posted to your statement, you may not get back any money you lost after the 60 days, if we can prove that we could have stopped someone from taking the money if you had told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods.

  • User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)

  • CODES AND REGULATIONS The Contractor shall strictly comply with all Federal, State and local codes and regulations.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • CLEARANCE PATTERNS 7.1 The State shall develop separate clearance patterns for each of the following: The State shall develop separate clearance patterns for the Statewide Payroll and each program and independent functions within specific programs listed in sections 4.2 and 4.3 (any interest exempted program) of this Agreement. 7.2 The following shall develop the State's clearance patterns: The Department of Administration shall develop the State's clearance patterns. 7.3 The sources of data the State shall use when developing its clearance patterns are as follows: The data utilized in the development of clearance patterns comes from SABHRS (Statewide Accounting, Budget, and Human Resource System). The System is administered by the SABHRS Financial Services Technology Bureau of the State Financial Services Division within the Department of Administration. 7.4 The State shall use the following methodology when developing its clearance patterns: When developing each clearance pattern, the State shall track at least 99% of the funds disbursed, from issuance to clearance, for a period of at least three months. 7.5 The State shall identify for each check or warrant (hereafter, check) in the population: (1) the date the check was released for payment; (2) the date the check was debited from the State's account, and, (3) the amount of the check. 7.6 The State shall use the following method to calculate the dollar-weighted average day of clearance: To determine the number of days each check was outstanding (clearance time), the issue date shall be subtracted from the date the check cleared the State's account. To determine the percentage of the disbursement paid out each day following issuance, the amount of the checks that clear the State's account each day shall be summed and then divided by the amount of the total disbursement. For each day following issuance, the clearance time of the checks paid out that day shall be multiplied by the percentage of the total disbursement those checks represent. This product is the clearance factor. The dollar-weighted average day of clearance for the disbursement shall be determined by summing the clearance factor of each day following the disbursement. 7.7 The State shall adjust each clearance pattern to reflect the dollar-weighted proportion of funds paid out by EFT/Direct payroll, with the following exceptions: No exceptions. The State shall also adjust each clearance pattern to reflect: No exceptions. 7.8 Each of the State's clearance patterns is calculated in Business days. 7.9 An authorized State official shall certify that each clearance pattern developed by the State accurately corresponds to the clearance activity of the programs to which it is applied. This certification shall be provided to the Fiscal Service prior to the effective date of the Agreement. The State shall recertify its clearance patterns at least every five years. 7.10 The State shall follow the procedures of 31 CFR 205 if it has actual or constructive knowledge, at any time, that a clearance pattern does not correspond to a program's clearance activity.