Password change) Sample Clauses

Password change). The Principal should use the automated service equipment to make password changes. There are no restrictions to the maximum number of changes.
AutoNDA by SimpleDocs
Password change). 一、立約人如欲變更密碼者,得利用自動化服務設備自行更改密碼,其次數不受限制。 The Principal should use the automated service equipment to make password changes. There are no restrictions to the maximum number of changes. 二、立約人除妥善保管金融卡外,應自行牢記密碼並絕對保密,貴行亦不得以任何方式洩露立約人自行設定之密碼,否則應由有疏失之一方各負其責。立約人領卡後未予變更密碼,貴行認為安全有慮時,得逕為終止金融卡之啟用,但立約人得再為啟用之申請。 In addition to keeping proper custody of the ATM card, the Principal is also responsible for memorizing and maintaining secrecy of the password. The Bank can not reveal the Principal's passwords in any way. The two parties shall be responsible for the consequences of their own faults. If the Principal does not make a password change after collecting the ATM card, the Bank may de-activate the card on the grounds of security concerns. However, the Principal is still allowed to re-activate the card on a later date.
Password change). Any System Administrator(s) will be required to change the initial passwords the first time they use their IDs to login into the System. It is the System Administrator’s responsibility to understand the security capabilities built into the Service and to assign and, as appropriate to your business and security needs, to restrict access to the various applications only to those employees who have a need to know, keeping in mind the importance of separation of duties as an important way of protecting You. The System Administrator also maintains the responsibility of setting certain limits related to dollar or volume thresholds for authorized users.
Password change). A Participant shall require that Registrants’ passwords be reconfirmed or changed every 180 days.
Password change). Receiving Party shall require Registrants to change the password that allows Registrant to access the VOW Data every 90 days.
Password change). All system-level passwords (for example, root, enable, admin, application administration accounts, and so on) must be changed on at least a quarterly basis.
Password change). Whenever the Ui wants to change password, she/he executes password change process shown in Figure 6. The sequence of steps followed by Xx is described as: Step 1: initially, Ui forwards IDi and pwi onto OBUi Step 2: OBUi , calculates ai=h(pwi) ⨁ bi and check di equals to h(IDi||ai||pwi), if so, Ui is requested to provide the new password(pw∗). Afterwards OBUi recalculates bi as h( pwi ) ⨁ bi ⨁ h(pw∗) and di ==h( IDi||ai||pw∗ ).otherwise, the request will be rejected. (1) IDi, pwi (2). 𝑎𝑖=h(𝑝𝑤𝑖) ⨁ 𝑏𝑖 if di==h(IDi||ai||pwi) Get pw∗ from Ui i Update bi=h(pwi) ⨁ bi ⨁ h(pw∗) else reject Ui OBUi
AutoNDA by SimpleDocs
Password change). When a user attempts to update his password into a new one, he needs to execute the following steps: Step 1: The user initially inserts the smart card into the card reader and inputs his identity IDi and old password PWi. Next, the card reader computes h(h(IDi), h(PWi, r)) and checks whether it is equal to Ai. If it holds, the user is considered as a legal one. And thus, the card reader asks the user to key a new password. Step 2: After keying the new password, the card reader computes Ai∗ = h(h(IDi), h(PWi, r)), Bi∗ = Bi ⊕ h(PWi, r) ⊕ h(PWi∗, r) and Ci∗ = Ci ⊕ h(h(IDi) ⊕ h(PWi, r)) ⊕ h(h(IDi) ⊕ h(PWi∗, r)). The card reader replaces {Ai, Bi, Ci} with {Ai∗, Bi∗, Ci∗ }.

Related to Password change)

  • Password To enable you, and only you, to use the Service, you will be asked to choose a password when you register and are accepted as a customer of the Service. This password is stored in encrypted form by us. You are responsible for maintaining the confidentiality of your Funds Transfer customer number and password. No one at OneUnited Bank has access to your Accounts passwords or user ID's. You are responsible for uses of the Service whether or not actually or expressly authorized by you. Therefore, it is important that you DO NOT SHARE YOUR ACCOUNT NUMBER OR PASSWORD WITH ANYONE FOR ANY REASON. No one at OneUnited Bank will know or need to know your password, and OneUnited Bank employees will never ask for your password. If you believe your password has been lost or stolen, or that someone has transferred or may transfer money from your Account without your permission, call: (877) ONE-UNITED or fax: (000) 000-0000, or e-mail: xxxxxxxxxxxxxxx@xxxxxxxxx.xxx, or write: Funds Transfer Administrator, OneUnited Bank 0000 Xxxxxxxx Xxxx, Los Angeles, CA, 90016. You agree to notify us AT ONCE if you believe your password has been lost or stolen. Telephoning us promptly is the best way to protect yourself from possible losses. If you never tell us, you could lose all of the money in your account (plus your maximum overdraft line of credit). However, if you tell us within 2 business days, you can lose no more than $50 if someone used your password without your permission. If you do NOT tell us within 2 business days after you learn of the loss or theft of your password, and we can prove we could have stopped someone from using your password without your permission if you had told us, you could lose as much as $500. You can see a complete statement of all your funds transfers effected or pending at any time by clicking on the History tab. If your statement shows transfers that you did not make, notify us AT ONCE. If you do not tell us within 60 days after the transfer was posted to your statement, you may not get back any money you lost after the 60 days, if we can prove that we could have stopped someone from taking the money if you had told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!