D Secure Sample Clauses

D Secure. If you process eCommerce Transactions and your Merchant Risk assessment based on the Bank’s policy is designated as “High”, you are required to implement the EMV 3-D Secure protocol. 3-D Secure is an eCommerce protocol that authenticates Cardholders to increase approvals and shift Chargeback liability. 3-D Secure enables the exchange of data between you, the Merchant, the Card Issuer and when necessary, the Cardholder, to validate that the eCommerce Transaction is being initiated by the rightful owner of the Card account. The Bank will advise you of which of its Payment Gateway (MPI) Service Providers you will require to use for 3DS. (MPI is the Merchant Plug In software required for processing 3D Secure transactions). See Section 5Technical Services.
AutoNDA by SimpleDocs
D Secure. A method for verifying that the Cardholder is the person making the online Card Payment in question.

Related to D Secure

  • Credit Union Lien and Security Interest To the extent you owe the Credit Union money as a borrower, guarantor, indorser or otherwise, the Credit Union has a lien on any or all of the funds in any account in which you have an ownership interest at the Credit Union, regardless of the source of the funds. The Credit Union may apply these funds in any order to pay off your indebtedness without further notice to you. If the Credit Union chooses not to enforce its lien, the Credit Union does not waive its right to enforce the lien at a later time. In addition, you grant the Credit Union a consensual security interest in your accounts and agree the Credit Union may use the funds from your accounts to pay any debt or amount owed the Credit Union, except obligations secured by your dwelling, unless prohibited by applicable law. All accounts are nonassignable and nontransferable to third parties.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Card Security This Card may be used without a personal identification number (PIN) to make purchases. Therefore, if you lose your Card, someone will be able to use it. Protect your Card and PIN at all times.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!