OUR SECURITY PROCEDURES Sample Clauses

OUR SECURITY PROCEDURES. We keep your information secure by: • Maintaining physical, electronic and procedural safeguards that comply with or exceed federal standards to guard your nonpublic personal information, including the prompt disposal of all unnecessary customer information. • Limiting access to information about you to those associates who need to know that information to provide you products or services. • Training our associates about the importance of maintaining the confidentiality of customer information. We take appropriate disciplinary action to enforce our associates’ privacy responsibilities. • Requiring companies that do work for us on your behalf to protect information, and only provide them with information that we believe is necessary to fulfill their responsibilities. INFORMATION WE COLLECT. We collect and use different types of information about you to assist in servicing your accounts and managing our relationship with you. For example, we will use information we gather to identify you during a transaction in order to protect your identity and your account. Information you provide will also help us understand your financial needs as we design or improve our products and services. The information we gather comes from a variety of sources, including: • Information you provide to us (such as name, address and telephone number). • Information about your transactions with UMB (such as account balance and payment history). • Information we receive from credit reporting agencies and other companies and agencies (such as your credit history).
AutoNDA by SimpleDocs
OUR SECURITY PROCEDURES. SAMPLE We restrict access to nonpublic personal information about you to those employees whom we determine have a legitimate business purpose to access such information in connection with the provision of products or services to you. We employ security techniques designed to protect our customer data. We provide training and communications programs designed to educate employees about the meaning and requirements of our strict standards for data security and confidentiality.
OUR SECURITY PROCEDURES. We also take steps to safeguard customer information. We restrict access to your personal and account information to those employees who need to know that information to provide products or services to you. Employees who violate these standards will be subject to disciplinary measures. Our physical, electronic, and procedural safeguards meet or exceed federal standards regarding the protection of your nonpublic personal information. We use technological means such as backup files, virus detection, eradication software and firewalls to protect against unauthorized access or alterations to customer data and we maintain policies and procedures covering the proper physical security of workplaces and records. We continually strive to maintain complete, accurate and up to date information. If ever you believe that our records contain inaccurate or incomplete information, please contact us at Tel: 0-000-000-0000. We will investigate your concerns and correct any inaccuracies in a timely manner. We reserve the right to change this policy at anytime but would communicate any significant changes to you as required by applicable law. The policies and practices described in this disclosure replace all previous notices or statements regarding our privacy policy.
OUR SECURITY PROCEDURES. You acknowledge that you have reviewed our current online security procedures as reflected in this Agreement, and you acknowledge that these procedures are commercially reasonable in the context of your business operations. You further acknowledge that we may update these security procedures from time to time and make them available to you. You agree to keep any security information we provide to you, including but not limited to, User IDs, Passwords, and security procedures, confidential.
OUR SECURITY PROCEDURES. We keep your information secure by: • Maintaining physical, electronic and procedural safeguards that comply with or exceed federal standards to guard your nonpublic personal information, including the prompt disposal of all unnecessary customer information. • Limiting access to information about you to those associates who need to know that information to provide you products or services. • Training our associates about the importance of maintaining the confidentiality of customer information. We take appropriate disciplinary action to enforce our associates’ privacy responsibilities. • Requiring companies that do work for us on your behalf to protect information, and only provide them with information that we believe is necessary to fulfill their responsibilities.

Related to OUR SECURITY PROCEDURES

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Safeguards Even if you enroll in on-line banking or bill pay or our electronic document delivery service, we may from time to time require certain transactions to be made in-person or we may require verification or authentication of your identity for security purposes before a transaction or other business with us may be initiated, processed, or completed. You agree and understand that this is for the protection of us and you and is intended to safeguard your personal information and all funds held in or by the Credit Union, and to help prevent Identity Theft and bank fraud. You agree that we will not be liable for any delay in, or prevention of, any transaction or business conducted by you due to these security measures. Legal Process Against Your Account. If any legal action is brought against your account such as tax levy, garnishment, attachment, etc., we may pay out funds according to the terms of the action or refuse any payout until the dispute is resolved. We will not be liable to you for any such payout, even if it causes overdrafts or returned items as determined under our Overdraft Governance Documents. Any expenses or attorney fees we incur responding to legal process may be charged against your account without notice, unless prohibited by law. Any legal process against your account is subject to our lien and security interest in your account and our right to set-off.

Time is Money Join Law Insider Premium to draft better contracts faster.