Compliance with Security Procedures. Customer shall have complied with applicable Security Procedures for the Service as may be required by Bank from time to time.
Compliance with Security Procedures. If an Entry (or request for cancellation or amendment of an Entry) received by the Bank purports to have been transmitted or authorized by Customer, it will be deemed effective as Customer's Entry (or request) and Customer shall be obligated to pay the Bank the amount of such Entry even though the Entry (or request) was not authorized by Customer, provided the Bank accepted the Entry in good faith and acted in compliance with the Security Procedures referred to in this Agreement or in the Appendix with respect to such Entry. If an Entry (or request for cancellation or amendment of an Entry) received by the Bank was transmitted or authorized by Customer, Customer shall pay Bank the amount of the Entry, whether or not Bank complied with the Security Procedure referred to in Schedule A and Schedule D with respect to that Entry and whether or not that Entry was erroneous in any respect or that error would have been detected if Bank had complied with such procedures.
Compliance with Security Procedures. If an Entry (or request for cancellation or amendment of an Entry) received by the Bank purports to have been transmitted or authorized by Customer, it will be deemed effective as Customer's Entry (or request) and Customer shall be obligated to pay the Bank the amount of such Entry even though the Entry (or request) was not authorized by Customer, provided the Bank accepted the Entry in good faith and acted in compliance with the Security Procedures referred to in this Agreement or in the Appendix with respect to such Entry. If an Entry (or request for cancellation or amendment of an Entry) received by the Bank was transmitted or authorized by Customer, Customer shall pay Bank the amount of the Entry, whether or not Bank complied with the Security Procedure referred to in Schedule A and Schedule D with respect to that Entry and whether or not that Entry was erroneous in any respect or that error would have been detected if Bank had complied with such procedures. Until Customer is notified otherwise by the Bank, the Bank's ACH Contact for purposes of the Security Procedures is Deposit Operations, toll free 000-000-0000. You acknowledge that you are aware of the ACH Rules as they refer to payments you initiate, and that you are in compliance with and will adhere to the applicable requirements contained in the ACH Rules (as in effect and amended from time to time) when using ACH Services. You also agree to comply with procedures we may establish from time to time, including any limitations that may be imposed on the amount or type of Entries that may be initiated. Customer acknowledges it has a copy or has access to a copy of the ACH Rules. The ACH Rules may also be purchased online at xxx.xxxxx.xxx under the publications tab. Customer agrees to comply with and be subject to the ACH Rules in existence at the date of this Agreement, and any amendments to these ACH Rules made from time to time. You acknowledge that you will not generate transactions that violate the laws or regulations of the United States. This includes, but is not limited to, sanction laws administered by OFAC. It shall be your responsibility to obtain information regarding such OFAC enforced sanctions. This information may be obtained directly from the OFAC Compliance Hotline at 800-540-OFAC, or from the OFAC’s home page site at xxx.xxxxxxx.xxx/xxxx. You agree that the performance of any action by the Bank to debit or credit an account or transfer funds otherwise required by the ACH Rules is...
Compliance with Security Procedures. 6.1 If an Entry (or a request for cancellation or amendment of an Entry) received by Bank was transferred in accordance with the Security Procedures applicable to the Service and thereby purports to have been transmitted or authorized by Customer, it shall be deemed effective as Customer's Entry (or request), even if the Entry (or request) was not authorized by Customer. If Bank accepted the Entry (a) in compliance with the Security Procedures with respect to such Entry, (b) in compliance with any written agreement or instruction of Customer restricting acceptance of payment orders issued in Customer's name, and (c) in good faith, then with respect to a credit Entry, Customer shall be obligated to pay Bank the amount of such Entry, and with respect to a debit Entry, Customer shall maintain sufficient funds in the Settlement Account, as defined in Section 15, to fund the reversal of such Entry, if necessary.
6.2 If an Entry (or a request for cancellation or amendment of an Entry) received by Bank was actually transmitted or authorized by Customer, Customer shall pay Bank the amount of any such credit Entry and shall maintain funds in the Customer's Settlement Account to fund the reversal of any such debit Entry, whether or not Bank complied with the Security Procedures described herein or otherwise in the Appendix and whether or not that Entry was erroneous in any respect or that any such error would have been detected if Bank had complied with the Security Procedures.
Compliance with Security Procedures. If a Data File (or request for cancellation or amendment of an entry in a Data File) received by the Bank purports to have been transmitted or authorized by Customer, it will be deemed effective as Customer's Data File (or request) and Customer shall be obligated to pay the Bank the amount of such Data File even though the Data File (or request) was not authorized by Customer, provided the Bank accepted the Data File in good faith and acted in compliance with the Security Procedures referred to in this Agreement or in the Appendix with respect to such Data File. If a Data File (or request for cancellation or amendment of an entry in a Data File) received by the Bank was transmitted or authorized by Customer, Customer shall pay Bank the amount of the Data File, whether or not Bank complied with the Security Procedure with respect to that Data File and whether or not that Data File was erroneous in any respect or that error would have been detected if Bank had complied with such procedures.
Compliance with Security Procedures a. If an Entry (or a request for cancellation or amendment of a File) received by the Bank purports to have been transmitted or authorized by the Business Entity, it will be deemed effective as the Business Entity's Entry (or request) and the Business Entity shall be obligated to pay the Bank the amount of such Entry (or request) even though the Entry (or request) was not actually authorized by the Business Entity, whether or not the Bank acted in compliance with the security procedure referenced in Schedule A. If signature comparison is to be used as a part of that security procedure, the Bank shall be deemed to have complied with that part of such procedure if it compares the signature accompanying a file of Entries (or request) with the signature of an Authorized Representative of the Business Entity and, on the basis of such comparison, believes the signature to be that of such Authorized Representative.
Compliance with Security Procedures. Except as otherwise required by applicable law, if a Payment Order (or a request for cancellation or amendment of a Payment Order) received by Bank purports to have been transmitted or authorized by Client, it will be deemed effective as Client's Payment Order (or request) and Client shall be obligated to pay Bank the amount of such Payment Order as provided herein even though the Payment Order (or request) was not authorized by Client, provided Bank acted in compliance with the security procedure referred to in Appendix A with respect to such Payment Order.
Compliance with Security Procedures. If an Entry (or a request for cancellation or amendment of an Entry) received by Bank purports to have been transmitted or authorized by Client, it will be deemed effective as Client’s Entry (or request) and Client shall be obligated to pay Bank the amount of such Entry even though the Entry (or request) was not authorized by Client, provided Bank accepted the Entry in good faith and acted in compliance with the Security Procedures with respect to such Entry.
Compliance with Security Procedures. Subject to applicable law and regulations, if an Entry (or a request for cancellation or amendment of an Entry) received by us purports to have been transmitted or authorized by you, it will be deemed effective as your Entry (or request) and you shall be obligated to pay us or the other applicable financial institution the amount of such Entry even though the Entry (or request) was not authorized by you, provided we accepted the Entry in good faith and acted in compliance with the security procedures previously described with respect to such Entry. If an Entry (or request for cancellation or amendment of an Entry) received by us was transmitted or authorized by you, you shall pay us or the other applicable financial institution the amount of the Entry, whether or not we complied with the security procedures previously described with respect to that Entry and whether or not that Entry was erroneous in any respect or that error would have been detected if we had complied with such security procedure.
Compliance with Security Procedures. The authorizations in Exhibit 3 (or Exhibit 5-B in the case of third-party processors) and security procedures in Exhibit 3 (or Exhibit 5-B in the case of third-party processors) shall apply equally to Entries and requests for cancellation or amendment of Entries. Accordingly, in this Section 19, “Entry” shall be construed to include requests for cancellation or amendment of Entries. If an Entry received by the Bank was transmitted or authorized by the Company, or if an Entry received by the Bank purports to have been transmitted or authorized by the Company, and the Bank has complied with the security procedures provided for herein, then, in either case, it will be deemed effective as the Company’s Entry. If signature comparison is to be part of that security procedure, the Bank shall be deemed to have complied with that part of such procedure if the signature accompanying a file or Entries bears any resemblance whatsoever to the signature of the Company’s authorized representative for submission of Entries. The Company is responsible for maintaining the confidentiality of the security procedures hereunder and shall promptly report to the Bank any breach thereof. The Bank shall have no liability for losses occasioned by the Company’s failure to maintain the confidentiality of its security procedures. The Bank may change, add, or delete any procedures established pursuant to this Agreement, from time to time, upon notice to the Company.