Password and Security Procedures Sample Clauses

Password and Security Procedures. When you begin to use the service, you will receive a Company ID, a User ID and a temporary password which will allow you access to your Account information. This Password should be changed upon the first use of the service. Passwords must be eight to twelve characters and may contain special characters. The representative to whom we send the initial temporary password shall be the Administrator with the authority to administer your use of the services. You may designate one or more additional persons to serve as Administrators. The Administrator shall be responsible for managing access to and use of the Service by other persons and for limiting, where you deem appropriate, the level and extent of such access. The Administrator will assign unique user identification to such authorized persons and will set and, as needed, reset passwords for all users of the Service. You agree that Bank may rely on any instructions given by the Administrator in relation to the service and your accounts. Any Service transactions, including but not limited to accessing account information, making transfers, giving transfer-related instructions or utilizing the electronic bill payment service, initiated on behalf of a commercial client by entering the correct password is deemed to have been effected with the full authority of the Board of Directors, members, general partners or other governing body, as applicable, of the client. Each time you access the Service to view account information or to perform any other service transaction, you will be required to enter your password. Bank has no obligation to verify, by telephone or by any other means, any transaction request it receives from you through the service. If any person’s password is lost or stolen, or is known by an individual other than the Administrator, you must notify Bank immediately. Failure to notify Bank promptly could result in loss of funds. You may contact bank at 000-000-0000 to report any security breach. Bank reserves the right to prevent access to service should we have reason to believe the confidentiality of your passwords has been compromised. Seaside National Bank & Trust has partnered with Trusteer (an IBM Company) to permit you to download and install Rapport Security Software. You agree to download and install Rapport on all desktop & laptop computers used to access Business Internet Banking. You agree to have Rapport software actively running at all times while attempting to login and throughout the...
AutoNDA by SimpleDocs

Related to Password and Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Time is Money Join Law Insider Premium to draft better contracts faster.