Equipment and security requirements Sample Clauses

Equipment and security requirements. All service equipment used by the Merchant for card present transactions shall be approved and certified by PAYSTRAX. The Merchant executing transactions in connection with E-commerce and/or MO/TO orders shall use equipment or payment solutions approved by PAYSTRAX. It is the Merchant's responsibility to ensure that the service equipment and payment solutions it uses for transactions each time fulfil PAYSTRAX's technical and security requirements, including those in connection with obtaining authorisation and submitting transactions. Information on approved service equipment and payment solutions can be obtained from PAYSTRAX. The Merchant shall ensure that unauthorised individuals do not have access to either service equipment or payment solutions. The Merchant shall always use Strong Customer Authentication (SCA). In cases where the Merchant does not use SCA, the Merchant bears full liability of the transaction, if it is challenged by the cardholder, the card schemes or PAYSTRAX. It is important that the Merchant has relevant documents to confirm the validity of the payment transaction (e.g. invoice etc.).
AutoNDA by SimpleDocs
Equipment and security requirements. All service equipment used by the merchant shall be EMV/PA-DSS-certified and approved by KORTA. The service equipment shall be capable of reading the card's chip/magnetic stripe and be equipped with a keyboard to enter PIN-numbers. If the merchant wishes to use self-service stations without a keyboard for inputting PIN-numbers, KORTA's specific consent for this shall be on file. The merchant executing transactions in connection with E-commerce and/or mail and telephone orders shall use equipment or payment solutions approved by KORTA. It is the merchant's responsibility to ensure that the service equipment and payment solutions it uses for transactions each time fulfil KORTA's technical and security requirements, including those in connection with obtaining authorisation and submitting transactions. Information on approved service equipment and payment solutions can be found at xxx.XXXXX.xx or at KORTA. The merchant shall ensure that unauthorised individuals do not have access to either service equipment or payment solutions. KORTA reserves the right to collect from the merchant, not using EMV-certified equipment approved by KORTA, fees charged by the card companies because of this.

Related to Equipment and security requirements

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53). Contractor also shall provide technical and organizational safeguards against accidental, unlawful, or unauthorized access or use, destruction, loss, alteration, disclosure, transfer, commingling, or processing of such information that ensure a level of security appropriate to the risks presented by the processing of County Data, Contractor personnel and/or subcontractor personnel and affiliates approved by County to perform work under this Contract may use or disclose County personal and confidential information only as permitted in this Contract. Any other use or disclosure requires express approval in writing by the County of Orange. No Contractor personnel and/or subcontractor personnel or affiliate shall duplicate, disseminate, market, sell, or disclose County personal and confidential information except as allowed in this Contract. Contractor personnel and/or subcontractor personnel or affiliate who access, disclose, market, sell, or use County personal and confidential information in a manner or for a purpose not authorized by this Contract may be subject to civil and criminal sanctions contained in applicable federal and state statutes. Contractor shall take all reasonable measures to secure and defend all locations, equipment, systems, and other materials and facilities employed in connection with the Services against hackers and others who may seek, without authorization, to disrupt, damage, modify, access, or otherwise use Contractor systems or the information found therein; and prevent County data from being commingled with or contaminated by the data of other customers or their users of the Services and unauthorized access to any of County data. Contractor shall also continuously monitor its systems for potential areas where security could be breached. In no case shall the safeguards of Contractor’s data privacy and information and cyber security program be less stringent than the safeguards used by County. Without limiting any other audit rights of County, County shall have the right to review Contractor’s data privacy and information and cyber security program prior to commencement of Services and from time to time during the term of this Contract. All data belongs to the County and shall be destroyed or returned at the end of the contract via digital wiping, degaussing, or physical shredding as directed by County.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

Time is Money Join Law Insider Premium to draft better contracts faster.