MERCHANT’S SYSTEM Sample Clauses

MERCHANT’S SYSTEM a) The Parties acknowledge that the setting-up, maintenance, upgrading, security and integrity of the Merchant’s computer system software and all costs thereof, and any other matters related thereto, shall be done by the Merchant and are the Merchant’s sole responsibility. b) Notwithstanding Clause 2.8.1(a), the Merchant and its agents shall at all times keep all systems and media containing any information or data (whether physical or electronics) relating to Cardholders, their Card Accounts and transactions in a secure manner in no less than the standards prescribed by PCI DSS, such as without limitation encrypting transmission of Cardholders’ data and sensitive information across public network, to prevent access by or disclosure to anyone other than the authorized personnel of the Merchant or FCSB. However, in the event that any of the aforesaid information or transaction data stored in any part of the Merchant’s system is lost, damaged, stolen, tampered or otherwise compromised, the Merchant shall report and give written notice of such loss, damage, theft, tampering or compromise to FCSB immediately upon the Merchant having notice thereof. c) Notwithstanding Clause 2.8.1(a), if the Merchant upgrades or changes the version or type of its software and/or hardware or any other part of its system relating to Card Transaction, the Merchant is to inform FCSB of such changes prior to its implementation and conduct testing with FCSB’s system as soon as possible. FCSB shall not be liable for any loss or damage suffered by any party of for any incompatibility between the Merchant’s system and FCSB system’s due to such changes made by the Merchant. d) The Merchant shall accept full responsibility, and FCSB shall not be liable in any way, for claims, liabilities, fees, fines, penalties, expenses, costs, losses or damages of whatever nature brought against, suffered or incurred by or caused to FCSB or any party whatsoever due to arising out of or in connection with this Agreement or any breach or compromise of the security or integrity (including but not limited to any breach or compromise of the standards prescribed by PCI DSS and Visa GBPP), or malfunction, of any encryption and identification software, any electronic code keys, any equipment provided to any party or the Merchant’s system or due to any error, negligence or fraud relating to a Card Transaction by the Merchant and/or the Merchant’s agents, servants, employees or contractors. e) Notwithstanding Cla...
AutoNDA by SimpleDocs

Related to MERCHANT’S SYSTEM

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.04, the parties acknowledge that the Direct Registration System (“DRS”) and Profile Modification System (“Profile”) shall apply to uncertificated American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC pursuant to which the Depositary may register the ownership of uncertificated American Depositary Shares, which ownership shall be evidenced by periodic statements issued by the Depositary to the Owners entitled thereto. Profile is a required feature of DRS which allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register such transfer. (b) In connection with and in accordance with the arrangements and procedures relating to DRS/Profile, the parties understand that the Depositary will not verify, determine or otherwise ascertain that the DTC participant which is claiming to be acting on behalf of an Owner in requesting a registration of transfer and delivery as described in subsection (a) has the actual authority to act on behalf of the Owner (notwithstanding any requirements under the Uniform Commercial Code). For the avoidance of doubt, the provisions of Sections 5.03 and 5.08 shall apply to the matters arising from the use of the DRS. The parties agree that the Depositary’s reliance on and compliance with instructions received by the Depositary through the DRS/Profile System and in accordance with this Deposit Agreement shall not constitute negligence or bad faith on the part of the Depositary.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • PFPC System PFPC shall retain title to and ownership of any and all data bases, computer programs, screen formats, report formats, interactive design techniques, derivative works, inventions, discoveries, patentable or copyrightable matters, concepts, expertise, patents, copyrights, trade secrets, and other related legal rights utilized by PFPC in connection with the services provided by PFPC to the Fund.

  • Customer Equipment Customer represents and warrants that it owns or has the legal right and authority, and will continue to own or maintain the legal right and authority during the term of this Agreement, to place and use the Customer Equipment as contemplated by this Agreement. Customer further represents and warrants that its placement, arrangement, and use of the Customer Equipment in the Internet Data Centers complies with the Customer Equipment Manufacturer's environmental and other specifications.

  • Equipment and Software To use the Mobile Remote Deposit Services, you must obtain and maintain at your expense, compatible equipment and software that we may specify from time to time.

  • Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!