Mobile Device Security. You are prohibited from using Mobile Payment Services for Small Business on a Mobile Device that You know or suspect has had its security or integrity compromised (e.g., where the Mobile Device has been “rooted” or had its security mechanisms bypassed). You will be solely liable for any losses, damages and expenses incurred as a result of Your use of Mobile Payment Services for Small Business on a compromised Mobile Device. You further acknowledge that You will properly maintain the security of Your Mobile Device used in conjunction with Mobile Payment Services for Small Business by protecting it with a secure access code or biometric, by knowing its location at all times, and by keeping it up to date with the latest operating system software, security patches and anti-virus and anti- spyware programs. You will not allow other persons to store their biometrics on Your Mobile Device. If You lose Your Mobile Device, You will act promptly to prevent unauthorized use.
Mobile Device Security. I further acknowledge that I will properly maintain the security of my Mobile Device used in conjunction with the Mobile Payment Service by protecting it with a secure access code or biometric, by knowing its location at all times, and by keeping it up to date with the latest operating system software, security patches and anti-virus and anti- spyware programs.
Mobile Device Security. I am prohibited from using the Mobile Payment Service on a Mobile Device that I know or suspect has had its security or integrity compromised (e.g. where the device has been "rooted" or had its security mechanisms bypassed). I will be solely liable for any losses, damages and expenses incurred as a result of my use of the Mobile Payment Service on a compromised device. I further acknowledge that I will properly maintain the security of my Mobile Device used in conjunction with the Mobile Payment Service by protecting it with a secure access code or biometric, by knowing its location at all times, and by keeping it up to date with the latest operating system software, security patches and anti-virus and anti-spyware programs.
Mobile Device Security. I am prohibited from using the Mobile Payment Service on a Mobile Device that I know or suspect has had its security or integrity compromised (e.
Mobile Device Security. A. The individual in possession of a mobile device that contains SVHC data is responsible for ensuring the physical security of that device.
B. Individuals must take appropriate measures to prevent unauthorized access to mobile devices that contain SVHC data.
C. All mobile devices must utilize access management procedures as defined in the SVHC Information Services Remote Access policy.
D. When exchanging data between mobile devices, precautions must be taken to ensure the integrity and confidentiality of the information being exchanged.
Mobile Device Security. Balanced Approach
Mobile Device Security. Security settings are in place on the mobile device to prevent certain activities. These may include downloading or installing apps on the mobile devices, removing software, changing system settings, etc. These permissions may vary by level. Academy District maintains an on-site internet filtering software package. This program automatically filters all student access to the internet, whether at school, at home, or in any location at where internet access is available. While mobile devices provided by ASD20 are filtered remotely, no filter provides an absolute guarantee that students will not inadvertently or purposefully access inappropriate content. While Academy School District 20 makes every attempt to protect students from inappropriate material and risks to their safety, no technology measure is 100% effective, and no technology measure is a substitute for open communication and involved parents/guardians. Damaged Equipment
Mobile Device Security i) Vendor shall ensure that appropriate measures for securing portable devices are explained and followed by all employees, this includes, but is not limitedto, any time the device is not in a securedoffice location (e.g., in automobiles, on aircraft, at home, etc.).
ii) Vendor shall create and maintain policies and standards which provide guidance on transporting and securing devices which may contain Customer Confidential Information when outside the office.
iii) Vendor shall ensure that all Vendor owned and Vendor Representative owned mobile devices used to store, process, or transmit Customer Confidential Information are encrypted.
Mobile Device Security i) Vendor shall not permit Vendor Representatives to access PHI via any unencrypted mobile device including, but not limited to, unencrypted smartphones, unencrypted tablet computing devices, or any other unencrypted mobile device.
ii) Vendor shall install a Mobile Device Management (“MDM”) solution on all devices which may allow email which may contain PHI. Such solution shall be configured to encrypt and segregate such data from all other data. It shall furthermore be configured to allow remote wiping of the data in the event of theft or loss.
Mobile Device Security. You are responsible for maintaining the security of your Mobile Device. Your Mobile Device is subject to the same security risks as a computer, and it is your responsibility to maintain anti- virus and anti-spyware programs on your Mobile Device. Except as otherwise provided herein, you are responsible for all transactions made using your Mobile Device, and all transactions performed using your Mobile Device, even if not intended by you, are considered transactions authorized by you. Mobile Banking will display sensitive information about your mobile Accounts, including balances and transfer amounts. Anyone with access to your Mobile Device may be able to view this information.