MOBILE SECURITY Sample Clauses

MOBILE SECURITY. 7.1. Do not download, open, and/or keep any SMS, MMS, or Program from unknown sources, 7.2. Always check the programs running on your mobile phone. If any unknown programs are found, immediately switch it off to avoid any virus spreading and then take it to your phone's service center to have it inspected and cleaned. 7.3. Do not leave your mobile phone unattended and/or unlocked; 7.4. Log off/exit mobile banking program after using ACLEDA Unity.
AutoNDA by SimpleDocs
MOBILE SECURITY. As a customer engaging in the mobile services, you have chosen a personal passcode which allows you to access the mobile services. Information you provide in connection with the mobile services will be stored on secure servers and protected by advanced encryption techniques. These commercially reasonable security measures are intended to keep your important information secure and to prevent unauthorized access. Effective security; however, is partly contingent upon your responsible behavior in protecting your personal passcode for the mobile services. Please use maximum caution in protecting your personal passcode. Information you provide in connection with the App will be stored on secure servers and protected by advanced encryption techniques. These commercially reasonable security measures are intended to keep your important information secure and to prevent unauthorized access. Effective security; however, is dependent on your responsible behavior in protecting your Log-in Credentials and controlling access to the devices that you use to access the App. For the purposes of this Agreement, "Log-in Credentials" means your personal ID, password, and any other unique biometric attribute (such as voice print or fingerprint) used to access the App.
MOBILE SECURITY. Social security, including accident insurance and medical provision (including Medevac etc beyond the primary/trauma care provided by the Authority), as necessary to comply with local and UK legislation.
MOBILE SECURITY. As a customer engaging in the mobile services, you have chosen a personal passcode which allows you to access the mobile services. Information you provide in connection with the mobile services will be stored on secure servers and protected by advanced encryption techniques. These commercially reasonable security measures are intended to keep your important information secure and to prevent unauthorized access. Effective security; however, is partly contingent upon your responsible behavior in protecting your personal passcode for the mobile services. Please use maximum caution in protecting your personal passcode.
MOBILE SECURITY. As a customer engaging in the Mobile Service, you have chosen a personal passcode which allows you to access the Mobile Service. Information you provide in connection with the Mobile Service will be stored on secure servers and protected by advanced encryption techniques. These commercially reasonable security measures are intended to keep your important information secure and to prevent unauthorized access. Effective security; however, is partly contingent upon your responsible behavior in protecting your personal passcode for the Mobile Service. Please use maximum caution in protecting your personal passcode. Information you provide in connection with the App will be stored on secure servers and protected by advanced encryption techniques. These commercially reasonable security measures are intended to keep your important information secure and to prevent unauthorized access. Effective security; however, is dependent on your responsible behavior in protecting your Log-in Credentials and controlling access to the devices that you use to access the App.

Related to MOBILE SECURITY

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Multiple Security If (a) the Premises shall consist of one or more parcels, whether or not contiguous and whether or not located in the same county, or (b) in addition to this Mortgage, Mortgagee shall now or hereafter hold one or more additional mortgages, liens, deeds of trust or other security (directly or indirectly) for the Indebtedness upon other property in the State in which the Premises are located (whether or not such property is owned by Mortgagor or by others) or (c) both the circumstances described in clauses (a) and (b) shall be true, then to the fullest extent permitted by law, Mortgagee may, at its election, commence or consolidate in a single foreclosure action all foreclosure proceedings against all such collateral securing the Indebtedness (including the Mortgaged Property), which action may be brought or consolidated in the courts of any county in which any of such collateral is located. Mortgagor acknowledges that the right to maintain a consolidated foreclosure action is a specific inducement to Mortgagee to extend the Indebtedness, and Mortgagor expressly and irrevocably waives any objections to the commencement or consolidation of the foreclosure proceedings in a single action and any objections to the laying of venue or based on the grounds of forum non conveniens which it may now or hereafter have. Mortgagor further agrees that if Mortgagee shall be prosecuting one or more foreclosure or other proceedings against a portion of the Mortgaged Property or against any collateral other than the Mortgaged Property, which collateral directly or indirectly secures the Indebtedness, or if Mortgagee shall have obtained a judgment of foreclosure and sale or similar judgment against such collateral, then, whether or not such proceedings are being maintained or judgments were obtained in or outside the State in which the Premises are located, Mortgagee may commence or continue foreclosure proceedings and exercise its other remedies granted in this Mortgage against all or any part of the Mortgaged Property and Mortgagor waives any objections to the commencement or continuation of a foreclosure of this Mortgage or exercise of any other remedies hereunder based on such other proceedings or judgments, and waives any right to seek to dismiss, stay, remove, transfer or consolidate either any action under this Mortgage or such other proceedings on such basis. Neither the commencement nor continuation of proceedings to foreclose this Mortgage nor the exercise of any other rights hereunder nor the recovery of any judgment by Mortgagee in any such proceedings shall prejudice, limit or preclude Mortgagee's right to commence or continue one or more foreclosure or other proceedings or obtain a judgment against any other collateral (either in or outside the State in which the Premises are located) which directly or indirectly secures the Indebtedness, and Mortgagor expressly waives any objections to the commencement of, continuation of, or entry of a judgment in such other proceedings or exercise of any remedies in such proceedings based upon any action or judgment connected to this Mortgage, and Mortgagor also waives any right to seek to dismiss, stay, remove, transfer or consolidate either such other proceedings or any action under this Mortgage on such basis. It is expressly understood and agreed that to the fullest extent permitted by law, Mortgagee may, at its election, cause the sale of all collateral which is the subject of a single foreclosure action at either a single sale or at multiple sales conducted simultaneously and take such other measures as are appropriate in order to effect the agreement of the parties to dispose of and administer all collateral securing the Indebtedness (directly or indirectly) in the most economical and least time-consuming manner.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Not a Security None of the Notes shall be deemed to be a security within the meaning of the Securities Act of 1933 or the Securities Exchange Act of 1934.

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!