Passwords and System Security Sample Clauses

Passwords and System Security. 1. Each individual who is authorized to have access to Customer accounts and information through BBO must do so according to the Customer instructions completed by Customer. The level of access for each user is determined by the Access ID number, which will be assigned by Bank. The password shall consist of at least 6 characters within a specific format subject to a maximum of 17 characters and/or provided a token distributed by bank. Customer will enter their access ID on the log on screen and submit. The system will require each user to select a new password during their initial session. Token users will enable the token and select a 4-digit PIN that will be used in conjunction with the token password, complete an e-mail address and security question/answer. Customer’s 4-digit PIN will be used in conjunction with token password when logging in. To log in Customer will press their token for a unique password. Customer will then enter token password, and their personal 4-digit PIN and submit. Log on screen will display a 4-digit authentication code. Customer will press token one time to view the same authentication code. Matching authentication codes will signal to Customer that they have reached the correct site. Customer’s Access Id and password or token and 4-digit PIN is to be used only by that authorized individual and should be protected from use by others. Once selected by each user, this password is to be used only by that individual and protected from use by others. Bank may require users to change their password every 90 days, which can be completed within the software. Customer must have an Internet browser that supports a minimum 128-bit encryption standard with antimalware software, firewalls and a valid e-mail address. 2. Customer agrees that Bank’s security procedures are commercially reasonable. Customer further agrees that actions taken by the Bank in compliance with its security procedures, whether or not in fact such transaction was initiated by the Customer or Customer agents shall be treated as a duly authorized Customer request. Until notice to the contrary is received and duly processed, the Bank shall be entitled to rely on any the Customer’s written or electronic instructions for all Services under this Agreement. Customer will be responsible for all transactions initiated by persons to whom Customer has given access to passwords or other security procedures. Customer will comply with all security procedures described in this docum...
AutoNDA by SimpleDocs
Passwords and System Security a. ACH includes the ability for Customer to establish passwords and various security levels over ACH, including verification and authorizations levels. The Customer agrees that the password and security levels, if used as provided in the instructions and online help, are consistent with commercially acceptable practices and meet all standards for its security. The Bank strongly advises the Customer to use all verification, passwords, and security level authorizations provided. The Customer is fully liable for all activities and consequential damages arising from any authorized or unauthorized use of such passwords. Customer agrees to monitor its Accounts and notify the Bank immediately of the possibility that unauthorized transaction(s) have occurred. Until written notice or electronic instructions to the contrary is received and duly processed, the Bank shall be entitled to rely on agreed upon procedures for all Services under this agreement. Customer acknowledges and agrees that Customer will be responsible for all transactions initiated by any person utilizing an appropriate access password or other security procedure. b. Customer acknowledges that Service interruptions in the banking, telecommunications and computer industries are frequently caused by circumstances beyond the provider’s control and are difficult to assess as to the cause or resulting damages. The Bank’s goal will be to respond to Service requests within one Business Day notification. The Customer agrees and acknowledges that the Bank is not responsible for any interruptions of utility or telecommunications Services, whether occurring at an individual employee’s residence or place of business or at the Bank’s place of business. Customer also agree that the Bank will not be liable for any actual or direct loss arising out of mistakes, omissions, interruption, delays, errors, or defects in transmissions of data or other uses of ACH. Customer also agrees that it will not use the Service to request any unauthorized or unlawful transaction and that all affected accounts will have a sufficient available balance for any proposed transaction. The Bank shall not be liable for any act or omission of any other entity furnishing equipment, products or Services to Customer, nor shall the Bank be liable for damages or losses due to the fault or negligence of Customer or its agents, affiliates, subscribers or customers. In no event will the Bank be liable to Customer for any damages, including any los...

Related to Passwords and System Security

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the ISO OATT.

  • Records and Documentation The Sub-Recipient agrees to make available to AAAPP staff and/or any party designated by the AAAPP any and all contract related records and documentation. The Sub-Recipient shall ensure the collection and maintenance of all program related information and documentation on any such system designated by the AAAPP. Maintenance includes valid exports and backups of all data and systems according to AAAPP standards.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.04, the parties acknowledge that the Direct Registration System (“DRS”) and Profile Modification System (“Profile”) shall apply to uncertificated American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC pursuant to which the Depositary may register the ownership of uncertificated American Depositary Shares, which ownership shall be evidenced by periodic statements issued by the Depositary to the Owners entitled thereto. Profile is a required feature of DRS which allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register such transfer. (b) In connection with and in accordance with the arrangements and procedures relating to DRS/Profile, the parties understand that the Depositary will not verify, determine or otherwise ascertain that the DTC participant which is claiming to be acting on behalf of an Owner in requesting a registration of transfer and delivery as described in subsection (a) has the actual authority to act on behalf of the Owner (notwithstanding any requirements under the Uniform Commercial Code). For the avoidance of doubt, the provisions of Sections 5.03 and 5.08 shall apply to the matters arising from the use of the DRS. The parties agree that the Depositary’s reliance on and compliance with instructions received by the Depositary through the DRS/Profile System and in accordance with this Deposit Agreement shall not constitute negligence or bad faith on the part of the Depositary.

  • Developer Attachment Facilities Developer shall design, procure, construct, install, own and/or control the Developer Attachment Facilities described in Appendix A hereto, at its sole expense.

  • Use of Facilities and Equipment The Association shall have the right to use school facilities and equipment not otherwise in use. Such equipment shall not be removed from the building without permission of the building principal. The individual using the equipment shall be responsible for repair or replacement costs beyond normal wear and tear if the equipment is damaged, stolen, or lost. The Association shall pay for the reasonable cost of all materials and supplies incident to such use. The Association may use school buildings for meetings by arranging such use with the building principals.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Construction materials (1) The restrictions of section 1605 of the American Recovery and Reinvestment Act of 2009 (Pub. L. 111-5) (Recovery Act) do not apply to Recovery Act designated country manufactured construction material. The restrictions of the Buy American statute do not apply to designated country unmanufactured construction material. Consistent with U.S. obligations under international agreements, this clause implements--

  • RECORDS; ACCESS The Advisor shall maintain appropriate records of all its activities hereunder and make such records available for inspection by the Directors and by counsel, auditors and authorized agents of the Company, at any time or from time to time during normal business hours. The Advisor shall at all reasonable times have access to the books and records of the Company.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!