CODES AND PASSWORDS Sample Clauses

CODES AND PASSWORDS. If the Company is approved to use the LYNX Services, the Bank will provide the Company with certain information, including, but not limited to, access codes, passwords and user identifications (“Credentials”). Each user authorized by the Company to access the LYNX Services must have their own unique Credentials. The Company acknowledges that it is solely responsible for safeguarding and ensuring that each user safeguards, the confidentiality of their Credentials. In furtherance of the foregoing, Company agrees to train users regarding the risks associated with sharing or disclosure of Credentials (including sharing with other employees of the Company) and will develop and maintain internal procedures to limit such risks, including, but not limited to (a) ensuring Credentials are changed upon the user’s first logon and thereafter periodically in accordance with industry standards; (b) not permitting users to share their Credentials; (c) deleting the Credentials of users who no longer have access to the LYNX Services; and (d) keeping all Credentials under secure conditions. The Company agrees to comply with any additional access or identification procedures the Bank may establish. The Company further agrees to immediately notify the Bank by telephone (and confirm such oral notification in writing) if it has reason to believe that any Credentials has been stolen, compromised, misused or has, or may, become known by an unauthorized person (whether or not employed by the Company). These responsibilities may not be waived or modified by agreement or authorization by any Bank employee, agent or representative. The Company acknowledges that such Credentials are appropriate and reasonable to afford protection against unauthorized use and agrees that use of Credentials in connection with the LYNX Services shall give rise to a conclusive presumption that the use is authorized. The Company shall be liable for, and shall indemnify and hold the Bank harmless from any and all claims, losses, damages, liabilities and expenses including, without limitation attorney’s fees, court costs and related litigation costs and expenses, arising from use of the LYNX Services, whether authorized or unauthorized, and without regard to the signing authority on an Account, by any person who utilizes the Credentials or who gains access by any other means. In furtherance of the foregoing, in the event an employee, agent or representative of the Company or anyone accessing the system by uti...
AutoNDA by SimpleDocs
CODES AND PASSWORDS. We will provide you a secured e-mail with your login information. You must immediately change your temporary Password the first time you log into the Site. Thereafter, you may change your Password at your convenience and discretion for enhanced security, and you are encouraged to do so periodically. . You are encouraged to institute procedures requiring that passwords be changed periodically. In addition, we may provide, or we may ask you (or, if you are not a Consumer, your Users) to provide, additional Codes for security purposes. You agree that the combination of Codes and Passwords constitutes a reasonable security procedure, and we are conclusively entitled to rely on, and act in accordance with, any inquiry, message, or instruction transmitted electronically using your Code and Password or (if you are not a Consumer) the Codes and Password of you and your CSA or User, which will constitute conclusive evidence that such inquiry, message or instruction is correct and has been duly authorized by you. Since the Services may be accessed from remote locations, such inquiry, message, or instruction will be deemed to be authorized by you regardless of where that transmission originates. However, we may, in our sole and arbitrary discretion, refrain from responding to, relying on, or acting in accordance with, any such inquiry, message or instruction if we believe that such inquiry, message, or instruction may not actually have been authorized by you or there may have occurred a security breach with respect thereto.
CODES AND PASSWORDS. USER agrees not to release USER’s authentication code or device or password to any other person or allow anyone else to access AIMM INFORMATION SYSTEMS under USER’s authentication code or password. USER agrees to notify AIMM immediately if USER becomes aware or suspects that another person has access to USER’s authentication code or device or password.
CODES AND PASSWORDS. DISH assumes sole responsibility for selection and use of any code or passwords as may be permitted to access any secured features on the Services, such as prepaid calling features or voice mail. AT&T Mobility shall have no responsibility or obligation for security of communications of End User using the Services, beyond its duty to exercise ordinary care.
CODES AND PASSWORDS. Guest shall not change any codes or passwords without written consent of Agent ‐ including gate, door, and garage codes, internet router passwords or any other technology device which is per‐configured with a code or password. Should a password be changed by Guest a $150.00 technology fee will be charged to the credit card on file to adjust back to the per‐configured setting.
CODES AND PASSWORDS. User will identify those employees who shall have access to SVHC’s Confidential Information pursuant to this Agreement as User Personnel. The User employees who shall be permitted to have access to SVHC’s Confidential Information as of the date of this Agreement are listed on “Exhibit B” which is attached. Any User Personnel who is no longer employed by the User shall have no further access to the SVHC Confidential Information. User will promptly inform the Security Officer of SVHC of (i) any employee termination so that said employee’s access to SVHC’s Confidential Information can be terminated, or (ii) any employee who becomes a member of the User Personnel so that said employee can be granted access to SVHC’s Confidential Information. SVHC will provide User with access codes (user names and passwords) which must be used to access the EMR. Access will be provided within fourteen (14) days of this Agreement being fully executed by the parties, barring any information technology issues that may arise. User agrees that the access code is the equivalent of a legal signature and that User is accountable and responsible for all work done using the SVHC access codes provided to User. No User Personnel shall disclose an access code to anyone other than the person who has been assigned such code. Moreover, employees of the User will not use an access code which is not one that is assigned to them. User agrees that User Personnel are not permitted to access the SVHC Information Systems for anything other than the intended job-related purpose relating to patient treatment of shared patients. User Personnel are not permitted access to any other individual’s health information because of a personal request, personal reasons or personal curiosity. Unauthorized access of the EMR, confidential files, or SVHC Information Systems without the proper security clearance and/or access authorization, for whatever reason, is considered a violation of the SVHC Security Policy (“SVHC Security Policy”) and a violation of this Agreement. Should User or any of its employees have reason to believe that SVHC’s access code has been disseminated, breached or someone learns an access code that has not been assigned to him or her, User will immediately contact the Security Officer of SVHC in accordance with SVHC’s policy. Passwords cannot be shared or posted. Passwords will be changed on a regular basis per SVHC policy. User Personnel must complete the Remote Secure Access (RSA) Agreement...
CODES AND PASSWORDS. You will manage and control access to each Transfer Service using the required passwords, codes and other access procedures. You are responsible for the establishment and maintenance of procedures to assure the confidentiality of the identification codes, passwords, repetitive request numbers and other access procedures (collectively the "Codes") and the Security Procedures. FAILURE TO PROTECT THE CODES OR SECURITY PROCEDURES MAY ALLOW AN UNAUTHORIZED PARTY TO ACCESS THE SERVICES. Except as otherwise specified in the applicable Service Documentation, you are required to develop and put in place internal procedures to limit such risk, including, but not limited to, (a) changing the password of each Operator at least once every 90 calendar days, (b) not permitting Operators to share their identification codes or passwords; (c) deleting the identification codes of Operators who no longer have access to a Service; (d) not keeping, in any form or in any place, any list of passwords; and (e) keeping every identification code and repetitive request number under secure conditions. You agree to comply with any additional access or identification procedures we establish, and, if you have reason to believe that any Code or Security Procedure has or may have become known by an unauthorized person (whether or not employed by you), you will immediately notify us by telephone and confirm to us in writing such oral notification within 24 hours.
AutoNDA by SimpleDocs

Related to CODES AND PASSWORDS

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Contractor Designation of Trade Secrets or Otherwise Confidential Information If the Contractor considers any portion of materials to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to Contract-related materials it has designated trade secret or otherwise confidential.

  • Patient Information Each Party agrees to abide by all laws, rules, regulations, and orders of all applicable supranational, national, federal, state, provincial, and local governmental entities concerning the confidentiality or protection of patient identifiable information and/or patients’ protected health information, as defined by any other applicable legislation in the course of their performance under this Agreement.

  • Confidential Nature of Information Each party agrees that it will treat in confidence all documents, materials and other information which it shall have obtained regarding the other party during the course of the negotiations leading to the consummation of the transactions contemplated hereby (whether obtained before or after the date of this Agreement), the investigation provided for herein and the preparation of this Agreement and other related documents, and, if the transactions contemplated hereby are not consummated, each party will return to the other party all copies of nonpublic documents and materials which have been furnished in connection therewith. Such documents, materials and information shall not be communicated to any third Person (other than, in the case of Buyer, to its counsel, accountants, financial advisors or lenders, and in the case of Seller, to its counsel, accountants or financial advisors). No other party shall use any confidential information in any manner whatsoever except solely for the purpose of evaluating the proposed purchase and sale of the Purchased Assets; provided, however, that after the Closing Buyer may use or disclose any confidential information included in the Purchased Assets or otherwise reasonably related to the Business or the Purchased Assets. The obligation of each party to treat such documents, materials and other information in confidence shall not apply to any information which (i) is or becomes available to such party from a source other than the other party, (ii) is or becomes available to the public other than as a result of disclosure by such party or its agents, (iii) is required to be disclosed under applicable law or judicial process, but only to the extent it must be disclosed, or (iv) such party reasonably deems necessary to disclose to obtain any of the consents or approvals contemplated hereby.

  • Client Information Protected Health Information in any form including without limitation, Electronic Protected Health Information or Unsecured Protected Health Information (herein “PHI”);

  • IDENTIFYING INFORMATION AND PRIVACY NOTIFICATION (a) FEDERAL EMPLOYER IDENTIFICATION NUMBER and/or FEDERAL SOCIAL SECURITY NUMBER. As a condition to NYSERDA’s obligation to pay any invoices submitted by Contractor pursuant to this Agreement, Contractor shall provide to NYSERDA its Federal employer identification number or Federal social security number, or both such numbers when the Contractor has both such numbers. Where the Contractor does not have such number or numbers, the Contractor must give the reason or reasons why the payee does not have such number or numbers.

  • OTHER PERTINENT INFORMATION Applicant owns the upland adjoining the lease premises.

  • Treatment of Information (a) Certain of the Lenders may enter into this Agreement and take or not take action hereunder or under the other Loan Documents on the basis of information that does not contain material non-public information with respect to any of the Loan Parties or their securities (“Restricting Information”). Other Lenders may enter into this Agreement and take or not take action hereunder or under the other Loan Documents on the basis of information that may contain Restricting Information. Each Lender acknowledges that United States federal and state securities laws prohibit any person from purchasing or selling securities on the basis of material, non-public information concerning the issuer of such securities or, subject to certain limited exceptions, from communicating such information to any other Person. Neither the Administrative Agent nor any of its Affiliates shall, by making any Communications (including Restricting Information) available to a Lender, by participating in any conversations or other interactions with a Lender or otherwise, make or be deemed to make any statement with regard to or otherwise warrant that any such information or Communication does or does not contain Restricting Information nor shall the Administrative Agent or any of its Affiliates be responsible or liable in any way for any decision a Lender may make to limit or to not limit its access to Restricting Information. In particular, none of the Administrative Agent nor any of its Affiliates (i) shall have, and the Administrative Agent, on behalf of itself and each of its Affiliates, hereby disclaims, any duty to ascertain or inquire as to whether or not a Lender has or has not limited its access to Restricting Information, such Lender’s policies or procedures regarding the safeguarding of material, nonpublic information or such Lender’s compliance with applicable laws related thereto or (ii) shall have, or incur, any liability to any Loan Party or Lender or any of their respective Affiliates arising out of or relating to the Administrative Agent or any of its Affiliates providing or not providing Restricting Information to any Lender. (b) Each Lender acknowledges that circumstances may arise that require it to refer to Communications that might contain Restricting Information. Accordingly, each Lender agrees that it will nominate at least one designee to receive Communications (including Restricting Information) on its behalf and identify such designee (including such designee’s contact information) on such Lender’s Administrative Questionnaire. Each Lender agrees to notify the Administrative Agent from time to time of such Lender’s designee’s e-mail address to which notice of the availability of Restricting Information may be sent by electronic transmission. (c) Each Lender acknowledges that Communications delivered hereunder and under the other Loan Documents may contain Restricting Information and that such Communications are available to all Lenders generally. Each Lender that elects not to take access to Restricting Information does so voluntarily and, by such election, acknowledges and agrees that the Administrative Agent and other Lenders may have access to Restricting Information that is not available to such electing Lender. None of the Administrative Agent nor any Lender with access to Restricting Information shall have any duty to disclose such Restricting Information to such electing Lender or to use such Restricting Information on behalf of such electing Lender, and shall not be liable for the failure to so disclose or use, such Restricting Information. (d) The provisions of the foregoing clauses of this Section 10.09 are designed to assist the Administrative Agent, the Lenders and the Loan Parties, in complying with their respective contractual obligations and applicable law in circumstances where certain Lenders express a desire not to receive Restricting Information notwithstanding that certain Communications hereunder or under the other Loan Documents or other information provided to the Lenders hereunder or thereunder may contain Restricting Information. Neither the Administrative Agent nor any of its Affiliates warrants or makes any other statement with respect to the adequacy of such provisions to achieve such purpose nor does the Administrative Agent or any of its Affiliates warrant or make any other statement to the effect that an Loan Party’s or Lender’s adherence to such provisions will be sufficient to ensure compliance by such Loan Party or Lender with its contractual obligations or its duties under applicable law in respect of Restricting Information and each of the Lenders and each Loan Party assumes the risks associated therewith.

  • Supply of Information The Republic agrees to deliver or cause to be delivered to each Stock Exchange copies of such documents as may be reasonably required for the purpose of obtaining such listing.

  • INFORMATION OF THE PARTIES Information of the Company Information of the Lessees

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!