Compliance with Security Procedures. Customer shall have complied with applicable Security Procedures for the Service as may be required by Bank from time to time.
Compliance with Security Procedures. If an Entry (or request for cancellation or amendment of an Entry) received by the Bank purports to have been transmitted or authorized by Customer, it will be deemed effective as Customer's Entry (or request) and Customer shall be obligated to pay the Bank the amount of such Entry even though the Entry (or request) was not authorized by Customer, provided the Bank accepted the Entry in good faith and acted in compliance with the Security Procedures referred to in this Agreement or in the Appendix with respect to such Entry. If an Entry (or request for cancellation or amendment of an Entry) received by the Bank was transmitted or authorized by Customer, Customer shall pay Bank the amount of the Entry, whether or not Bank complied with the Security Procedure referred to in Schedule A and Schedule D with respect to that Entry and whether or not that Entry was erroneous in any respect or that error would have been detected if Bank had complied with such procedures.
Compliance with Security Procedures. If an Entry (or a request for cancellation or amendment of an Entry) received by Bank purports to have been transmitted or authorized by Client, it will be deemed effective as Client’s Entry (or request) and Client shall be obligated to pay Bank the amount of such Entry even though the Entry (or request) was not authorized by Client, provided Bank accepted the Entry in good faith and acted in compliance with the Security Procedures with respect to such Entry.
Compliance with Security Procedures. If a Data File (or request for cancellation or amendment of an entry in a Data File) received by the Bank purports to have been transmitted or authorized by Customer, it will be deemed effective as Customer's Data File (or request) and Customer shall be obligated to pay the Bank the amount of such Data File even though the Data File (or request) was not authorized by Customer, provided the Bank accepted the Data File in good faith and acted in compliance with the Security Procedures referred to in this Agreement or in the Appendix with respect to such Data File. If a Data File (or request for cancellation or amendment of an entry in a Data File) received by the Bank was transmitted or authorized by Customer, Customer shall pay Bank the amount of the Data File, whether or not Bank complied with the Security Procedure with respect to that Data File and whether or not that Data File was erroneous in any respect or that error would have been detected if Bank had complied with such procedures.
Compliance with Security Procedures a. If an Entry (or a request for cancellation or amendment of a File) received by the Bank purports to have been transmitted or authorized by the Business Entity, it will be deemed effective as the Business Entity's Entry (or request) and the Business Entity shall be obligated to pay the Bank the amount of such Entry (or request) even though the Entry (or request) was not actually authorized by the Business Entity, whether or not the Bank acted in compliance with the security procedure referenced in Schedule A. If signature comparison is to be used as a part of that security procedure, the Bank shall be deemed to have complied with that part of such procedure if it compares the signature accompanying a file of Entries (or request) with the signature of an Authorized Representative of the Business Entity and, on the basis of such comparison, believes the signature to be that of such Authorized Representative.
Compliance with Security Procedures. If an Entry (or a request for cancellation or amendment of an Entry) received by the Bank purports to have been transmitted or authorized by the Customer, it will be deemed effective as the Customer's Entry (or request) and the Customer shall be obligated to pay the Bank the amount of such Entry (or request) even though the Entry (or request) was not authorized by the Customer, provided the Bank acted in compliance with the security procedures sent to Customer. If signature comparison is to be used as part of that security procedure, the Bank shall be deemed to have complied with that part of such procedure if it compares the signature accompanying a file of Entries (or request) with the signature of an Authorized Representative of the Customer and, on the basis of such comparison, believes the signature to be that of such Authorized Representative.
Compliance with Security Procedures. (a) If an Entry (or a request for cancellation or amendment of an Entry) received by the Credit Union purports to have been transmitted or authorized by a Member user, it will be deemed effective as Member’s Entry (or request) and Member shall be obligated to pay the Credit Union the amount of such Entry even though the Entry (or request) was not authorized by Member, provided the Credit Union accepted the Entry in good faith and acted in compliance with the Security Procedures. If signature comparison is to be used as a part of those security procedures, Credit Union shall be deemed to have complied with that part of such procedures if it compares the signature accompanying a file of Entries (or request for cancellation or amendment of an Entry) received with the signature of an authorized representative of Member (an “Authorized Representative”) and, on the basis of such comparison, believes the signature of Member sending such file to be that of such authorized representative.
Compliance with Security Procedures. (a) Except as otherwise required by applicable law, if a Payment Order (or a request for cancellation or amendment of a Payment Order) received by Bank purports to have been transmitted or authorized by Client, it will be deemed effective as Client's Payment Order (or request) and Client shall be obligated to pay Bank the amount of such Payment Order as provided herein even though the Payment Order (or request) was not authorized by Client, provided Bank acted in compliance with the security procedure referred to in Appendix A with respect to such Payment Order.
Compliance with Security Procedures. Subject to applicable law and regulations, if an Entry (or a request for cancellation or amendment of an Entry) received by us purports to have been transmitted or authorized by you, it will be deemed effective as your Entry (or request) and you shall be obligated to pay us or the other applicable financial institution the amount of such Entry even though the Entry (or request) was not authorized by you, provided we accepted the Entry in good faith and acted in compliance with the security procedures previously described with respect to such Entry. If an Entry (or request for cancellation or amendment of an Entry) received by us was transmitted or authorized by you, you shall pay us or the other applicable financial institution the amount of the Entry, whether or not we complied with the security procedures previously described with respect to that Entry and whether or not that Entry was erroneous in any respect or that error would have been detected if we had complied with such security procedure.
Compliance with Security Procedures. The authorizations in Exhibit 3 (or Exhibit 5-B in the case of third-party processors) and security procedures in Exhibit 3 (or Exhibit 5-B in the case of third-party processors) shall apply equally to Entries and requests for cancellation or amendment of Entries. Accordingly, in this Section 19, “Entry” shall be construed to include requests for cancellation or amendment of Entries. If an Entry received by the Bank was transmitted or authorized by the Company, or if an Entry received by the Bank purports to have been transmitted or authorized by the Company, and the Bank has complied with the security procedures provided for herein, then, in either case, it will be deemed effective as the Company’s Entry. If signature comparison is to be part of that security procedure, the Bank shall be deemed to have complied with that part of such procedure if the signature accompanying a file or Entries bears any resemblance whatsoever to the signature of the Company’s authorized representative for submission of Entries. The Company is responsible for maintaining the confidentiality of the security procedures hereunder and shall promptly report to the Bank any breach thereof. The Bank shall have no liability for losses occasioned by the Company’s failure to maintain the confidentiality of its security procedures. The Bank may change, add, or delete any procedures established pursuant to this Agreement, from time to time, upon notice to the Company.