Internet Security Information Sample Clauses

Internet Security Information. PBG Online Banking is part of a network that utilizes a comprehensive security strategy to protect your accounts and transactions concluded over the Internet. In-depth information on many of the techniques and features employed by the system can be viewed and are explained in our PBG Online Security Statement. In addition to our login security, we use the TLS (Transport Layer Security) encryption technology for everything you do in the PBG Online Banking system. TLS is considered the most secure technology. TLS 1.20, or higher, is required to connect to our server. Whenever TLS is securing your communications, the browser will typically indicate the “secure session” by changing the appearance of a small icon of a padlock at the top of the screen from open to locked. What this means to you is that your communications are scrambled from your browser to our servers at all times so no unauthorized party can read the information as it is carried over the internet.
AutoNDA by SimpleDocs
Internet Security Information. Our Online Banking service utilizes a comprehensive industry standard security strategy to protect accounts and transactions conducted over the Internet. In-depth information on many of the techniques and features employed by the system can be viewed or printed from our website where the system's consumer or commercial features are explained. In addition to our login security, we use SSL (secure socket layer) encryption technology for everything done in the system. Your browser automatically activates this technology when it attempts to connect to our system and it will support only the highest 128-bit encryption technology available to ensure your protection. Whenever SSL is securing your communications, the browser will typically indicate the "secure session" by changing the appearance of a small padlock icon at the bottom of the screen from open to locked. What this means to you is that your communications are scrambled from your browser to our servers at all times so no unauthorized party can read the information as it is carried over the Internet. Additionally, our servers have been certified by a "Certificate Authority" to assure you that you are actually talking to our servers instead of someone pretending to be us. During your use of the Internet Banking system, we will pass a "cookie" to your browser to identify you. We do not (and cannot) use our cookies to obtain new information about you. A "cookie" is security data given to a browser by a web server and returned by the browser on subsequent transmissions to identify the user and encryption information. When you log onto the system, this cookie enables us to process multiple transactions during the session without having to provide your Login ID and password for each individual transaction. After a predetermined amount of time set by our security system or when you log off, the session cookie is no longer accepted and a new cookie must be created by entering your Login ID and Password information. A new cookie is used for each session so that no one can use the cookie to access your account. You agree that the security strategy described above is acceptable to you.
Internet Security Information. Our System service utilizes a comprehensive security strategy to protect Accounts and transactions conducted over the Internet. In-depth information on many of the techniques and features employed by the system can be viewed or printed from our website where the system's consumer or commercial features are explained. In addition to our login security, SSL (secure socket layer) encryption technology secures System. Your browser automatically activates this technology when it connects to our system and it will support 128-bit key certificates and 128 bit encryption. We recommend you set your minimum browser requirements to a "Medium" level status. Whenever SSL is securing your communications, the browser will typically indicate the "secure session" by changing the appearance of a small padlock icon at the bottom of the screen from open to locked. What this means to you is that your communications are encrypted from your browser to our servers at all times, so no unauthorized party can read the information as it is carried over the Internet. Additionally, our servers have been certified by a Certificate of Authority to assure you that you are actually connecting to our servers instead of someone masquerading as us.
Internet Security Information. The SERVICES utilize a comprehensive security strategy to protect accounts and transactions conducted over the Internet. In addition to login security, we use a secure socket layer (SSL) encryption technology for the Online Banking system. Your browser automatically activates this technology when it attempts to connect to our system and it will support only the highest 128-bit encryption technology available to ensure your protection. Whenever SSL is securing your communications, the browser will typically indicate the ‘secure session’ by changing the appearance of a small padlock icon on one edge of the screen from open to locked. This means that your communications are encrypted from your browser to our servers at all times, so that no unauthorized party can read the information as it is carried over the Internet. During your use of the SERVICES, we use multi-factor authentication (MFA) methodology which registers each PC that you use to access the SERVICES. In addition, we will pass a “cookie” to your browser to identify you. We do not (and cannot) use our cookies to obtain new information about you. A “cookie” is security data given to a browser by a web server and returned by the browser on subsequent transmissions to identify the User and encryption information. When you log onto the SERVICES, this cookie enables us to process multiple transactions during the session without you having to provide your login ID and password for each individual transaction. After a predetermined amount of time set by our security system or when you log off, the session cookie is no longer accepted and a new cookie must be created by entering your Login ID and PIN information. A new cookie is used for each session so that no one can use the cookie to access your account.
Internet Security Information. Our Online Banking Service utilizes a comprehensive security strategy to protect accounts and transactions conducted over the Internet. In-depth information on many of the techniques and features employed by the system can be viewed or printed from our website in our Customer Awareness Program. In addition to our login security, we use SSL (secure sockets layer) encryption technology for everything done in the system. Your browser automatically activates this technology when it attempts to connect to our system and it will support only 128- bit key lengths. Whenever SSL is securing your communications, the browser will typically indicate the “secure session” by changing the appearance of a small padlock icon at the bottom of the screen from open to locked. What this means to you is that your communications are scrambled from browser to our servers at all times, so no unauthorized party can read the information as it is carried over the Internet. Additionally, our servers have been certified by a “Certificate Authority” to assure you that you are actually talking to our servers instead of someone pretending to be us. Enrollment ProcessThe service requires the customer to complete the initial enrollment process. This involves completing an enrollment form and delivering it to the Bank. The information on the enrollment form will identify everything we will need to enable the service. Once we verify the information you submitted for accuracy and authorization, you will be notified when your account will be activated.
Internet Security Information. Our Online Banking Service uses a comprehensive security strategy to protect accounts and transactions conducted over the Internet. In-depth information on many of the techniques and features employed by the system can be viewed or printed from our web site where the system’s consumer or commercial features are explained. In addition to our login security, we use SSL (secure socket layer) encryption technology for everything done in the system. Your browser automatically activates this technology when it attempts to connect to our system. The BANK server will accept only 128-bit key length encryption. You will be prompted to upgrade your browser if necessary. Whenever SSL is securing your communications, the browser will typically indicate the "secure session" by changing the appearance of a small padlock icon at the bottom of the screen from open to locked. What this means to you is that your communications are scrambled from your browser to our servers at all times, so no unauthorized party can read the information as it is carried over the Internet. Additionally, our servers have been certified by a "Certificate Authority" to assure you that you are actually talking to our servers instead of someone pretending to be us. During your use of the SERVICE, we will pass a "cookie" to your browser to identify you. We do not (and cannot) use our cookies to obtain new information about you. A "cookie" contains security data given to a browser by a web server and returned by the browser on subsequent transmissions to identify the user and encryption information. When you log onto the system, this cookie enables us to process multiple transactions during the session without you having to provide your Login ID and password for each individual transaction. After a predetermined amount of time set by our security system or when you log off, the session cookie is no longer accepted and must be reset by re-entering the password. A new cookie is used for each session, so that no one can use the cookie to access your account.

Related to Internet Security Information

  • Facility Information The Product is: Renewable Energy Facility or Unit Specific; if so, complete the following: Name of Facility Location of Facility EIA number Online Date Renewable Energy Source specific; if so, state: Aggregator area specific. Use the following table for generator aggregation programs: REC Delivery Unit Specific Generating Renewable Energy Unit / Renewable Energy Source Generating Renewable Energy Aggregation Program / Renewable Energy Sources Location of Generator or Area of Aggregation

  • Safety Information Any other bulletins may only be posted by mutual agreement between the Union and designated Management.

  • Company Information Subscriber understands that the Company is subject to all the risks that apply to early-stage companies, whether or not those risks are explicitly set out in the Offering Circular. Subscriber has had such opportunity as it deems necessary (which opportunity may have presented through online chat or commentary functions) to discuss the Company’s business, management and financial affairs with managers, officers and management of the Company and has had the opportunity to review the Company’s operations and facilities. Subscriber has also had the opportunity to ask questions of and receive answers from the Company and its management regarding the terms and conditions of this investment. Subscriber acknowledges that except as set forth herein, no representations or warranties have been made to Subscriber, or to Subscriber’s advisors or representative, by the Company or others with respect to the business or prospects of the Company or its financial condition.

  • Third Party Information I understand, in addition, that the Company has received and in the future will receive from third parties confidential or proprietary information (“Third Party Information”) subject to a duty on the Company’s part to maintain the confidentiality of such information and to use it only for certain limited purposes. During the term of my employment and thereafter, I will hold Third Party Information in the strictest confidence and will not disclose to anyone (other than Company personnel who need to know such information in connection with their work for the Company) or use, except in connection with my work for the Company, Third Party Information unless expressly authorized by an officer of the Company in writing.

  • Covenant Not to Disclose Confidential Information The Employee ------------------------------------------------- acknowledges that during the course of his employment with the Company he has or will have access to and knowledge of certain information and data which the Company or any subsidiary, parent or affiliate of the Company considers confidential and that the release of such information or data to unauthorized persons would be extremely detrimental to the Company. As a consequence, the Employee hereby agrees and acknowledges that he owes a duty to the Company not to disclose, and agrees that, during or after the term of his employment, without the prior written consent of the Company, he will not communicate, publish or disclose, to any person anywhere or use any Confidential Information (as hereinafter defined) for any purpose other than carrying out his duties as contemplated by this Agreement. The Employee will use his best efforts at all times to hold in confidence and to safeguard any Confidential Information from falling into the hands of any unauthorized person and, in particular, will not permit any Confidential Information to be read, duplicated or copied. The Employee will return to the Company all Confidential Information in the Employee's possession or under the Employee's control when the duties of the Employee no longer require the Employee's possession thereof, or whenever the Company shall so request, and in any event will promptly return all such Confidential Information if the Employee's relationship with the Company is terminated for any or no reason and will not retain any copies thereof. For purposes hereof the term "Confidential Information" shall mean any information or data used by or belonging or relating to the Company or any subsidiary, parent or affiliate of the Company that is not known generally to the industry in which the Company or any subsidiary, parent or affiliate of the Company is or may be engaged, including without limitation, any and all trade secrets, proprietary data and information relating to the Company's or any subsidiary, parent or affiliate of the Company's past, present or future business and products, price lists, customer lists, processes, procedures or standards, know- how, manuals, business strategies, records, drawings, specifications, designs, financial information, whether or not reduced to writing, or information or data which the Company or any subsidiary, parent or affiliate of the Company advises the Employee should be treated as confidential information.

  • Confidential Information and Trade Secrets During the period of my employment with the Company, I acknowledge that the Company may disclose to me confidential and proprietary information of the Company which the Company takes great pains to safeguard from unauthorized use and disclosure. I agree at all times during the term of my employment and thereafter, to hold in strictest confidence, and not to use or to disclose to any person, firm or corporation, except as such use or disclosure is required in connection with my work for the Company or unless the Chief Executive Officer of the Company otherwise expressly authorizes in writing, any Confidential Information (defined below) before it has become generally known within the relevant industry through no fault of my own. I understand and agree that “Confidential Information” means any non-public information that does not otherwise qualify as Trade Secrets (defined below) that relates to the actual or demonstrably anticipated business or research or development of the Company or any other information which is marked “confidential” or which might reasonably be anticipated to be confidential in nature. I further agree, at all times during my employment and anytime thereafter, to hold in strictest confidence, and not to use or disclose to any person, firm or corporation, except as such use or disclosure is required in connection with my work for the Company or unless the Chief Executive Officer of the Company expressly authorizes such use or disclosure in writing, any Trade Secret (defined below) before it has become generally known in the public domain through no fault of my own. I understand and agree that “Trade Secrets” are information, regardless of form, belonging to the Company, licensed by it, or disclosed to it on a confidential basis by its customers, suppliers, or other third parties, including, but not limited to technical and non-technical data, formulae, patterns, compilations, programs, devices, methods, techniques, drawings, processes, financial data, financial plans, product plans, and lists of actual or potential customers or suppliers which is not commonly known in the public domain and which (i) derives economic value, economic or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy, or any other information that constitutes a trade secret under common law.

  • Access to Company Information (a) During the period from the date of this Agreement to the Effective Time, the Company shall permit representatives of the Parent to have reasonable access (at all reasonable times, and in a manner so as not to interfere with the normal business operations of the Company) to all premises, properties, financial and accounting records, contracts, other records and documents, and personnel, of or pertaining to the Company. (b) The Parent and each of its Subsidiaries (i) shall treat and hold as confidential any Company Confidential Information (as defined below), (ii) shall not use any of the Company Confidential Information except in connection with this Agreement, and (iii) if this Agreement is terminated for any reason whatsoever, shall return to the Company all tangible embodiments (and all copies) thereof which are in its possession. For purposes of this Agreement, “Company Confidential Information” means any information of the Company that is furnished to the Parent or any of its Subsidiaries by the Company in connection with this Agreement; provided, however, that it shall not include any information (A) which, at the time of disclosure, is available publicly other than as a result of non-permitted disclosure by the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (B) which, after disclosure, becomes available publicly through no fault of the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (C) which the Parent or any of its Subsidiaries knew or to which the Parent or any of its Subsidiaries had access prior to disclosure, as demonstrated by competent evidence, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company, or (D) which the Parent or any of its Subsidiaries rightfully obtains from a source other than the Company, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company.

  • Confidential Information (a) The Executive recognizes that the services to be performed by the Executive hereunder are special, unique, and extraordinary and that, by reason of such employment with the Company, the Executive may acquire Confidential Information concerning the operation of the Company, the use or disclosure of which would cause the Company substantial loss and damages which could not be readily calculated and for which no remedy at law would be adequate. Accordingly, the Executive agrees that the Executive will not (directly or indirectly) at any time, whether during or after the Executive’s employment hereunder, (i) knowingly use for an improper personal benefit any Confidential Information that the Executive may learn or has learned by reason of the Executive’s employment with the Company or (ii) disclose any such Confidential Information to any Person except (A) in the performance of the Executive’s obligations to the Company hereunder, (B) as required by applicable law, (C) in connection with the enforcement of the Executive’s rights under this Agreement, (D) in connection with any disagreement, dispute or litigation (pending or threatened) between the Executive and the Company or (E) with the prior written consent of the Board of Directors. As used herein, “Confidential Information” includes information with respect to the operation and performance of the Company, its investments, portfolio companies, products, services, facilities, product methods, research and development, trade secrets and other intellectual property, systems, patents and patent applications, procedures, manuals, confidential reports, product price lists, customer lists, financial information, business plans, prospects or opportunities (including, as applicable, all of the foregoing information regarding the Company’s past, current and prospective portfolio companies); provided, however, that such term, shall not include any information that (x) is or becomes generally known or available other than as a result of a disclosure by the Executive or (y) is or becomes known or available to the Executive on a nonconfidential basis from a source (other than the Company) that, to the Executive’s knowledge, is not prohibited from disclosing such information to the Executive by a legal, contractual, fiduciary or other obligation to the Company. (b) The Executive confirms that all Confidential Information is the exclusive property of the Company. All business records, papers and documents kept or made by the Executive while employed by the Company relating to the business of the Company shall be and remain the property of the Company at all times. Upon the request of the Company at any time, the Executive shall promptly deliver to the Company, and shall retain no copies of, any written materials, records and documents made by the Executive or coming into the Executive’s possession while employed by the Company concerning the business or affairs of the Company other than personal materials, records and documents (including notes and correspondence) of the Executive not containing proprietary information relating to such business or affairs. Notwithstanding the foregoing, the Executive shall be permitted to retain copies of, or have access to, all such materials, records and documents relating to any disagreement, dispute or litigation (pending or threatened) between the Executive and the Company.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • YOUR PERSONAL INFORMATION 17.1 We collect certain information about the purchaser and the users of the Card in order to operate the Card programme. IDT Financial Services Limited is the data controllers of Your personal data, and will manage and protect Your personal data in accordance with applicable law.IDT Financial Services Limited receives card services from First Data Slovakia s.r.o., which acts as a data processor for IDT Financial Services Limited. 17.2 We may transfer Your personal data outside the EEA to Our commercial partners where necessary to provide Our services to You, such as customer service, account administration, financial reconciliation, or where the transfer is necessary as a result of Your request, such as the processing of any international transaction. When We transfer personal data outside the EEA, We will take steps to ensure that Your personal data is afforded substantially similar protection as personal data processed within the EEA. Please be aware that not all countries have laws to protect personal data in a manner equivalent to that of the EEA. Your use of Our products and services will indicate to Us that You agree to the transfer of Your personal data outside the EEA. If You withdraw Your consent to the processing of Your personal data or its transfer outside the EEA, which You can do by using the contact details in clause 15, We will not be able to provide Our services to You. Therefore, such withdrawal of consent will be deemed to be a termination of the Agreement. 17.3 Unless You have provided Your explicit permission, Your personal data will not be used for marketing purposes by Us or Our commercial partners (unless You have independently provided Your consent to them directly), nor will it be shared with third parties unconnected with the Card scheme. 17.4 You have the right to request details of the personal information that is held about You, and You may receive this by writing to our Customer Service Center. 17.5 Please refer to the Privacy Policy of IDT Financial Services Limited xxxx://xxx.xxxxxxxxxx.xxx/privacypolicy.pdf for full details, which You accept by accepting the Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!