Enhanced Security Sample Clauses

Enhanced Security. In addition to the requirement of 3.4(a) above, confidentiality of Device Keys shall be protected via (a) implementation of Proactive Renewal or (b) a method that is clearly designed to prevent attempts to discover or reveal such values solely using electronically distributable means.
AutoNDA by SimpleDocs
Enhanced Security. Requests transmitted via Bank’s Business Online Banking Service must comply with the Security Protocol described, and agreed to, in the Agreement and the Business Online Banking Service Terms with respect to Entries transmitted by Company to Bank, including the use of Tokens. Company acknowledge that the purpose of such Security protocol is for verification of authenticity and not to detect an error in the transmission or content of a request. No Security Protocol for the detection of any such error has been agreed upon by Bank and Company. Company is solely responsible for the security of login credentials and tokens. Bank will have no duty to further verify the identity of any electronic user with login credentials and tokens. Confirmation of Outgoing Wire Transfers shall be verified and approved by Company prior to their transmission to Bank. Bank recommends a minimum of two Users to confirm Wire Transfer Payment Orders and that Users serve as an initiator or confirmer, but not both. Notwithstanding Bank’s recommendations, if Company permit a User to act as both initiator and confirmer, Company hereby authorize Bank to process a wire initiated and confirmed by such User and accepts the risk of an unauthorized Wire Transfer Payment Order. If a Request (or a Request for cancellation or amendment of a Wire Transfer) received by Bank purports to have been transmitted or authorized by Company, it will be deemed effective as Company’ request and Company shall be obligated to pay Bank the amount of such Wire Transfer even though the Request was not authorized by Company, provided Bank accepted the request in good faith and acted in compliance with the Security protocol with respect to such request. If a request (or request for cancellation or amendment of a Wire Transfer) received by Bank was transmitted by Company or a designated User, Company shall pay Bank the amount of the Wire Transfer, whether or not that request was erroneous in any respect or that error would have been detected if Bank had complied with such procedures.
Enhanced Security. Enhanced Security leverages a foundational component of the Internet called Domain Name System (“DNS”). DNS is a system that automatically translates Internet addresses to the numeric addresses used by computers, smartphones, and tablet devices. Enhanced Security manages a dynamic list of known Internet addresses that have security threats, updated in near real time. When an attempt is made to connect to a compromised website, the connection is not completed, and the “blocked” page notice is shown. The Services also include a network level, cloud-based malware defence. The malware defence is not a firewall and you are responsible for all device-level security.
Enhanced Security. BITEEU may offer optional enhanced security features for User’s BITEEU Account (including, for example, two-factor authentication). BITEEU encourages, but may not require, User to use any such enhanced security features. If User does enable enhanced security features, it is User’s responsibility to ensure the security of, and User’s continuous control over, any device or account that may be associated with the enhanced security features. User hereby agrees that: (a) User will notify BITEEU immediately if User is aware of any unauthorized use of User’s BITEEU Account and password by any person or any other violations to the security rules;
Enhanced Security. Requests transmitted via Bank’s Business Online Banking Service must comply with the Security Protocol described, and agreed to, in the Business Online Banking Service Terms with respect to Entries transmitted by Customer to Bank, including the use of Tokens. Customer acknowledges that the purpose of such Security Protocol is for verification of authenticity and not to detect an error in the transmission or content of a Request. No Security Protocol for the detection of any such error has been agreed upon by Bank and Customer. Customer is solely responsible for the security of Login Credentials and Tokens. Bank will have no duty to further verify the identity of any electronic user with Login Credentials and Tokens.
Enhanced Security. LTE Fixed Wireless Access Services include Enhanced Security, which leverages a foundational component of the Internet called Domain Name Server (DNS). DNS is a system that automatically translates Internet addresses to the numeric addresses used by computers, smartphones, and tablet devices. Enhanced Security manages a dynamic list of known Internet addresses that have security threats, updated in near real time. When an attempt is made to connect to a compromised site, the connection is not completed and the “blocked” page notice is shown.
Enhanced Security a. Due to aging equipment and variable printer models, not all printers support “Pcounter” secure printing hardware and software, a security protocol that requires AHS staff use their ID badges to process print jobs thereby ensuring the privacy of sensitive documents. b. To address this security risk, AHS will upgrade the printer fleet to ensure all printers meet security requirements including ID badge- based printing.
AutoNDA by SimpleDocs
Enhanced Security. 4.4.1 The Supplier shall ensure that all employees will have appropriate security clearance and that they shall ensure that all employees carry photograph identification with them at all times, including but not limited to driving licence, photo identity cards and their own organisation identity cards. 4.4.2 The Supplier shall where requested by a Contracting Authority, provide security clearance details of drivers making regular deliveries to secure establishments e.g. including but not limited to prisons, high security hospitals or maximum security facilities. The Supplier shall be aware that a higher level of security clearance will be required for certain Contracting Authority customers due to the specific nature of the requirement. 4.4.3 The Supplier shall comply with any additional security requirements required by the Contracting Authority and agreed Call off Contract stage, this may include but not be limited to: i. A caged area within a vehicle which shall be used for the sole purpose of the Contracting Authority consignment(s); ii. An armoured/bullet proof vehicle for the transportation of high value goods; iii. Tamper resistant seals for vehicles that can only be released by the Contracting Authority on arrival at the delivery destination; iv. Duel manned vehicles.
Enhanced Security. 8.7.1 A number of the Contracting Body(s) vehicles are involved in law enforcement and covert operations that require a higher level of security in addition to the security requirements detailed in Clause 34 (Security and Protection of Information) and Schedule 8 (Security) of the Model Call- Off terms and conditions. In order to ensure that the Contracting Body(s) personal safety and the operation the vehicle is involved in are not put at risk it is essential that the Supplier and their Sub-Contractors safeguard all information relating to the Contracting Body(s) vehicle fleet. 8.7.2 The Supplier and their Sub-Contractors shall be required to provide a higher level of security, as agreed with the Contracting Body(s), throughout the processes they perform directly and those that they sub-contract so as not to compromise the identity of the vehicles, the identity of the drivers and the operational effectiveness. This may include the requirement to keep the Contracting Body(s) details anonymous and in some cases adopting a pseudonym name for use by the Supplier and their Sub-Contractors. 8.7.3 The Supplier shall comply with the Contracting Body(s) personnel vetting policy and standard operating procedures. 8.7.4 The Supplier shall be expected to provide a list of personnel who will access the Contracting Body(s) data and communicate via all available means with the Contracting Body(s) personnel and third party repairers as part of the fleet management function. 8.7.5 The Supplier shall notify the Contracting Body(s) in writing of any changes to the allocated personnel within 5 working days and the new personnel will only be granted access to customer data and/or vehicles upon satisfactory vetting clearance from the Contracting Body(s). 8.7.6 The Supplier shall ensure that they and all third party repairers, service providers and suppliers apply adequate and proper security controls and conform to the Contracting Body(s) enhanced security requirements when in temporary possession of the Contracting Body(s) vehicles and any other asset requiring this level of security.
Enhanced Security. This security feature is designed to protect the privacy and security of your personal information. You will be required to establish security questions during your initial login. The challenge questions/answers are used to identify you and prevent unauthorized access to your information. Registering the computer(s) you normally use to access your information provides additional security to verify your identity. You may register more than one computer. Do not register the computer when you are accessing your accounts from a computer used for a one-time access, such as from an Internet café or library.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!