Internet Security Information Sample Clauses

Internet Security Information. PBG Online Banking is part of a network that utilizes a comprehensive security strategy to protect your accounts and transactions concluded over the Internet. In-depth information on many of the techniques and features employed by the system can be viewed and are explained in our PBG Online Security Statement. In addition to our login security, we use the TLS (Transport Layer Security) encryption technology for everything you do in the PBG Online Banking system. TLS is considered the most secure technology. TLS 1.20, or higher, is required to connect to our server. Whenever TLS is securing your communications, the browser will typically indicate the “secure session” by changing the appearance of a small icon of a padlock at the top of the screen from open to locked. What this means to you is that your communications are scrambled from your browser to our servers at all times so no unauthorized party can read the information as it is carried over the internet.
AutoNDA by SimpleDocs
Internet Security Information. Our Online Banking Service uses a comprehensive security strategy to protect accounts and transactions conducted over the Internet. In-depth information on many of the techniques and features employed by the system can be viewed or printed from our web site where the system’s consumer or commercial features are explained. In addition to our login security, we use SSL (secure socket layer) encryption technology for everything done in the system. Your browser automatically activates this technology when it attempts to connect to our system. The BANK server will accept only 128-bit key length encryption. You will be prompted to upgrade your browser if necessary. Whenever SSL is securing your communications, the browser will typically indicate the "secure session" by changing the appearance of a small padlock icon at the bottom of the screen from open to locked. What this means to you is that your communications are scrambled from your browser to our servers at all times, so no unauthorized party can read the information as it is carried over the Internet. Additionally, our servers have been certified by a "Certificate Authority" to assure you that you are actually talking to our servers instead of someone pretending to be us. During your use of the SERVICE, we will pass a "cookie" to your browser to identify you. We do not (and cannot) use our cookies to obtain new information about you. A "cookie" contains security data given to a browser by a web server and returned by the browser on subsequent transmissions to identify the user and encryption information. When you log onto the system, this cookie enables us to process multiple transactions during the session without you having to provide your Login ID and password for each individual transaction. After a predetermined amount of time set by our security system or when you log off, the session cookie is no longer accepted and must be reset by re-entering the password. A new cookie is used for each session, so that no one can use the cookie to access your account.
Internet Security Information. Our System service utilizes a comprehensive security strategy to protect Accounts and transactions conducted over the Internet. In-depth information on many of the techniques and features employed by the system can be viewed or printed from our website where the system's consumer or commercial features are explained. In addition to our login security, SSL (secure socket layer) encryption technology secures System. Your browser automatically activates this technology when it connects to our system and it will support 128-bit key certificates and 128 bit encryption. We recommend you set your minimum browser requirements to a "Medium" level status. Whenever SSL is securing your communications, the browser will typically indicate the "secure session" by changing the appearance of a small padlock icon at the bottom of the screen from open to locked. What this means to you is that your communications are encrypted from your browser to our servers at all times, so no unauthorized party can read the information as it is carried over the Internet. Additionally, our servers have been certified by a Certificate of Authority to assure you that you are actually connecting to our servers instead of someone masquerading as us.
Internet Security Information. The SERVICES utilize a comprehensive security strategy to protect accounts and transactions conducted over the Internet. In addition to login security, we use a secure socket layer (SSL) encryption technology for the Online Banking system. Your browser automatically activates this technology when it attempts to connect to our system and it will support only the highest 128-bit encryption technology available to ensure your protection. Whenever SSL is securing your communications, the browser will typically indicate the ‘secure session’ by changing the appearance of a small padlock icon on one edge of the screen from open to locked. This means that your communications are encrypted from your browser to our servers at all times, so that no unauthorized party can read the information as it is carried over the Internet. During your use of the SERVICES, we use multi-factor authentication (MFA) methodology which registers each PC that you use to access the SERVICES. In addition, we will pass a “cookie” to your browser to identify you. We do not (and cannot) use our cookies to obtain new information about you. A “cookie” is security data given to a browser by a web server and returned by the browser on subsequent transmissions to identify the User and encryption information. When you log onto the SERVICES, this cookie enables us to process multiple transactions during the session without you having to provide your login ID and password for each individual transaction. After a predetermined amount of time set by our security system or when you log off, the session cookie is no longer accepted and a new cookie must be created by entering your Login ID and PIN information. A new cookie is used for each session so that no one can use the cookie to access your account.
Internet Security Information. The Resource Bank Online Banking Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. In addition to log-on security, Resource Bank uses the SSL (secure socket layer) encryption technology for everything you do in the Online Banking Service. Your browser automatically activates this technology when it attempts to connect to our system and it will support 128 bit key lengths. Whenever SSL is securing your communications, the browser will typically indicate the "secure session" by changing the appearance of a small icon of a padlock at the bottom of the screen from open to locked. What this means to you is that your communications are scrambled from your browser to our servers at all times so no unauthorized party can read the information as it is carried over the Internet. In addition, our servers have been certified by a "Certificate Authority" that will assure you that you are actually talking to our servers instead of someone pretending to be us. If you are using an older browser the "Certificate Authorities" key may be expired and you may need to update your browser. During your use of the Online Banking Service, Resource Bank will pass a "cookie" to your browser for purposes of identifying you during the session. This cookie only identifies your computer. Resource Bank does not (and cannot) use cookies to collect or obtain new personal information about you. This cookie allows Resource Bank to process multiple transactions during your session without requiring you to reenter your Password for each individual transaction. The cookies for online banking simply provide another level of security for our Internet banking product. The Resource Bank online banking system uses encrypted cookies that do not pass to your hard drive. Instead, the cookie is stored in the memory of your browser, identifying your computer while you are logged on. Only Resource Bank can read the information in these cookies. When you log off, close your browser, or turn off your machine, the cookie is destroyed. A new cookie is used for each session. That way, no one can use the prior cookie to access your account. One of the main security features guarding the use of the Online Banking Service is the unique combination of your Access ID and Password. It is important that you keep your Password secret. We will not be liable for any losses resulting from you permitting other persons to use your Access ID and Password...
Internet Security Information. Our Online Banking Service utilizes a comprehensive security strategy to protect accounts and transactions conducted over the Internet. In-depth information on many of the techniques and features employed by the system can be viewed or printed from our website in our Customer Awareness Program. In addition to our login security, we use SSL (secure sockets layer) encryption technology for everything done in the system. Your browser automatically activates this technology when it attempts to connect to our system and it will support only 128- bit key lengths. Whenever SSL is securing your communications, the browser will typically indicate the “secure session” by changing the appearance of a small padlock icon at the bottom of the screen from open to locked. What this means to you is that your communications are scrambled from browser to our servers at all times, so no unauthorized party can read the information as it is carried over the Internet. Additionally, our servers have been certified by a “Certificate Authority” to assure you that you are actually talking to our servers instead of someone pretending to be us. Enrollment ProcessThe service requires the customer to complete the initial enrollment process. This involves completing an enrollment form and delivering it to the Bank. The information on the enrollment form will identify everything we will need to enable the service. Once we verify the information you submitted for accuracy and authorization, you will be notified when your account will be activated.

Related to Internet Security Information

  • Facility Information The Product is: Renewable Energy Facility or Unit Specific; if so, complete the following: Name of Facility Location of Facility EIA number Online Date Renewable Energy Source specific; if so, state: Aggregator area specific. Use the following table for generator aggregation programs: REC Delivery Unit Specific Generating Renewable Energy Unit / Renewable Energy Source Generating Renewable Energy Aggregation Program / Renewable Energy Sources Location of Generator or Area of Aggregation Delivery 3

  • PRIVACY INFORMATION Through Your Use of the Website and Services, You may provide Us with certain information. By using the Website or the Services, You authorize the Company to use Your information in the United States and any other country where We may operate.

  • Directory Information Within one week of completion, the Board shall provide the Association with a list of the names, addresses, telephone numbers and building assignments for all bargaining unit members. In addition, the contractual status of all bargaining unit members and the date of expiration of limited contracts shall be provided.

  • Safety Information Any other bulletins may only be posted by mutual agreement between the Union and designated Management.

  • Company Information Subscriber understands that the Company is subject to all the risks that apply to early-stage companies, whether or not those risks are explicitly set out in the Offering Circular. Subscriber has had such opportunity as it deems necessary (which opportunity may have presented through online chat or commentary functions) to discuss the Company’s business, management and financial affairs with managers, officers and management of the Company and has had the opportunity to review the Company’s operations and facilities. Subscriber has also had the opportunity to ask questions of and receive answers from the Company and its management regarding the terms and conditions of this investment. Subscriber acknowledges that except as set forth herein, no representations or warranties have been made to Subscriber, or to Subscriber’s advisors or representative, by the Company or others with respect to the business or prospects of the Company or its financial condition.

  • Third Party Information I understand, in addition, that the Company has received and in the future will receive from third parties confidential or proprietary information (“Third Party Information”) subject to a duty on the Company’s part to maintain the confidentiality of such information and to use it only for certain limited purposes. During the term of my employment and thereafter, I will hold Third Party Information in the strictest confidence and will not disclose to anyone (other than Company personnel who need to know such information in connection with their work for the Company) or use, except in connection with my work for the Company, Third Party Information unless expressly authorized by an officer of the Company in writing.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Confidential Information The Executive shall hold in a fiduciary capacity for the benefit of the Company all secret or confidential information, knowledge or data relating to the Company or any of its affiliated companies, and their respective businesses, which shall have been obtained by the Executive during the Executive's employment by the Company or any of its affiliated companies and which shall not be or become public knowledge (other than by acts by the Executive or representatives of the Executive in violation of this Agreement). After termination of the Executive's employment with the Company, the Executive shall not, without the prior written consent of the Company or as may otherwise be required by law or legal process, communicate or divulge any such information, knowledge or data to anyone other than the Company and those designated by it. In no event shall an asserted violation of the provisions of this Section 10 constitute a basis for deferring or withholding any amounts otherwise payable to the Executive under this Agreement.

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!