General Security Procedures Sample Clauses

General Security Procedures. You need a username and password, to access your Eligible Accounts and Online Financial Services through the Service. We may set standards for your username and password. We recommend that you change your password regularly, and select a unique username and password combination for use only with the Service. We may also require additional security procedures for certain transactions. These additional security procedures may require special hardware, software or third-party services. To enhance the security of your Eligible Accounts and Online Financial Services, we may also offer you additional, optional security procedures. These could include personal reference questions and answers, random number generators or one-time passwords. We may also require the use or activation of specific applications, Internet browser software features, plug-ins and add-ons, to use the Service. These could include JavaScript support and "cookies." To enable and enhance secure access to the Service, we may also access detailed information about the computers and Mobile Devices you use to access the Service. This could include telephone numbers and unique internal and network identifiers for your computers and Mobile Devices. We also use cookies and other technology for information security and other purposes, as described in our Privacy Policy, available at xxxxxxxxxx.xxx.
AutoNDA by SimpleDocs
General Security Procedures. 1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Processor, if any, comply with all of the foregoing. Processor shall designate an individual to be responsible for the information security program. Such individual shall respond to Controller inquiries regarding computer security and to be responsible for notifying Controller-designated contact(s) if a breach or an incident occurs, as further described herein.
General Security Procedures. Company agrees to abide by the security procedures set forth in this Agreement ("Security Procedures"). Both parties agree that the services described and provided by Bank will be subject to the terms and conditions set forth below:
General Security Procedures. Each individual who has access to Bank’s Online Banking system, including each individual named on joint accounts, must designate an online password and an Online ID. Your password must be a minimum of eight characters, which must consist of at least one numeric characters, plus alpha characters. For example, your password may be: 123signup. You may be required to change your password periodically to enhance security. All accounts you maintain with Bank will be displayed through online with account numbers, except for the last four digits, masked (your account numbers will still appear in your online statements). This provides additional level of security by ensuring that your actual account numbers will never be displayed.
General Security Procedures. 1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Processor, if any, comply with all of the foregoing.
General Security Procedures. You agree to the following Security Procedures which are applicable to all Cash Management Service(s) (collectively and individually, “User Information”). The Bank recommends each Authorized Person have his/her own User Information, and You agree that You will not have a single set of Authorized Persons and User Information for Your Accounts unless You executed an Addendum for Shared Services to this Cash Management Services Agreement.
General Security Procedures. 1.1 SunGard shall be responsible for establishing and maintaining an information security program based on the Industry Standards Organization ISO 27001:2 that contains appropriate administrative, technical and physical safeguards designed to: (i) ensure the security and confidentiality of Customer Sensitive Information; (ii) protect against any anticipated threats or hazards to the security, integrity or availability of the Customer Sensitive Information; (iii) protect against unauthorized access to, or use of, the Customer Sensitive Information that could result in substantial harm or inconvenience to Customer’s customers; (iv) ensure the proper disposal of Customer Sensitive Information, as further defined herein;
AutoNDA by SimpleDocs
General Security Procedures. (a) Customer agrees to comply with the security procedures described in this agreement, including the following security procedures and safeguards.
General Security Procedures. We will make commercially reasonable efforts to control access to Online Banking Services through the use of Security Procedures we establish and amend from time to time. You are required to comply with all Security Procedures required by us or this Agreement. We reserve the right to reject any transaction or service request that is not made in accordance with our required Security Procedures. You acknowledge receiving an electronic copy of our current Security Procedures. You acknowledge that our required Security Procedures shall be deemed commercially reasonable in all respects. You are required at all times to use a web browser that supports 128-bit SSL and 128-bit RC4 minimum encryptions. You are also required to change passwords for the Master User and each Sub-User on a regular basis no less frequent than every one hundred eighty (180) days. You acknowledge that using your computer, browser, Compatible Device, or other Required Technology to store login information, passwords, or passcodes, or authenticated fingerprints, facial image data, or other biometric information or other Security Procedures used to authorize or authenticate your use of Online Banking Services increases the risk of Unauthorized Use. You assume any and all risk associated with such storage. In the event you fail to change passwords in accordance with this Agreement, our liability to you or any third party for any loss or damage resulting from, or arising out of, your failure to change passwords may be limited or discharged pursuant to this Agreement or Applicable Law. You understand that our required Security Procedures are not for the purpose of detecting errors in transmission or content of a payment order or other request not initiated by us. You acknowledge that anyone with knowledge of the Security Procedures will be able to use Online Banking Services and act on your behalf. You are required to inform all Sub- Users that Security Procedures should not be shared with any Person and maintain a secure environment to ensure against Unauthorized Use, including but not limited to securing physical access to the Compatible Device used for services when the Master User or a Sub-User has logged on to use Online Banking Services or otherwise. Due to emerging technologies and ensuing changes in Security Procedures, we reserve the right to supplement or amend our Security Procedures from time to time upon reasonable notice to you as published on the Web Site or otherwise. If we shal...
General Security Procedures. (a)(i) Introduction - The following general security procedure requirements apply to any Services provided. Certain Services require special security procedure requirements. The User Materials outline in detail the security safeguards that allow you to determine the holder of the security system for your company, authorized users, authorized transaction types and dollar limits on all transactions. For certain Services, you will be responsible for the administration, including the deletion of authorized users.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!