E-mail Security Sample Clauses

E-mail Security. The use of encrypted and unencrypted e-mail carries a risk of possible interception and revelation to unintended parties. You should not use encrypted or unencrypted e-mail to send confidential information, such as social security numbers or account numbers.
AutoNDA by SimpleDocs
E-mail Security. Customers should not use unencrypted e-mail to send confidential information, such as social security numbers, account numbers, etc., to the Bank as these are not secure.
E-mail Security a. Vendor will: (1) for anti-spam: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; Confidential Exhibit A-8 — Enterprise Security Management Services (b) scan ACI’s inbound e-mail for spam; (c) provide ACI with the capability to create filters to prevent spam and allow e-mail (i.e., black list, white list); (d) using ACI provided black list and white list, identify spam and take action in accordance with the e-mail security policy (i.e., tag, redirect, delete); (e) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and (f) provide weekly and monthly security reports via e-mail. (2) for porn filtering: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; (b) scan ACI’s inbound and outbound e-mail to detect potentially suspected pornographic images; (c) implement sensitivity settings and routing options in accordance with the e-mail security policy (for example, e-mail containing suspect images can be logged only, tagged, sent or copied to a designated system administrator or deleted); (d) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics and offers a number of configuration and management facilities; and (e) provide weekly and monthly security reports via e-mail. (3) for e-mail Antivirus: (a) with ACI’s assistance, develop, implement and maintain the e-mail security policy, including violation reporting procedures; (b) scan ACI’s Internet level e-mail to detect viruses (i.e., known and unknown); (c) notify appropriate contact (for example, e-mail sender, intended recipient, e-mail administrator), in accordance with the established procedures, if an e-mail or attachment contains a virus; (d) handle infected e-mail in accordance with the established procedures; (e) notify ACI of any virus infected e-mail that Vendor was unable to intercept; Confidential Exhibit A-8 — Enterprise Security Management Services (f) provide secure password access to a proprietary Internet-based reporting and management tool which allows ACI to view data and statistics as well as offers a number of configuration and management facilities; and (g) provide weekly and monthly security reports via ...
E-mail Security. IBM will:
E-mail Security 

Related to E-mail Security

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Class Mail When mailed first class to the last address of the recipient known to the party giving notice, notice is effective three mail delivery days after deposit in a United States Postal Service office or mailbox.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • E-mail The Employee acknowledges that the Employer retains the right to review any and all electronic mail communications made with employer provided email accounts, hardware, software, or networks, with or without notice, at any time.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • National Security 28.01 The Canadian government, either directly or through its agencies, may instruct the Employer with respect to the security of information and materials and the personnel permitted to do certain work. The Union recognizes that the Employer is obliged to meet such instructions and that for such reason the Employer may refuse certain Employees access to the work or may transfer Employees covered by such instructions.

  • Portfolio Security Portfolio Security will mean any security owned by the Fund.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Print Mail The Fund hereby engages PFPC as its exclusive print/mail service provider with respect to those items and for such fees as may be agreed to from time to time in writing by the Fund and PFPC.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!