Passwords/PINs Sample Clauses

Passwords/PINs. It is your responsibility to protect for your password and/or PIN. You understand that anyone who has your password or PIN may be able to access any of the Services that require a password/PIN and/or your account. Neither we nor any Service Provider has any obligation to inquire about the authority of anyone using your password/PIN or other information that can be used to identify your account to request services for your Vehicle.
AutoNDA by SimpleDocs
Passwords/PINs. You promise to be fully responsible for the protection of your password/PINs. Anyone who has your password or PINs may be able to access the AcuraLink services and neither we nor any Service Provider has any obligation to inquire about the authority of anyone using your password/PINs or other information that can be used to identify your account to request services for your Vehicle.
Passwords/PINs. You promise to be fully responsible for the protection of your password/PINs. Anyone who has access to your password or PINs may be able to access the Hyundai BlueLink Service Features and account, web site, mobile app, in-vehicle apps, and we have no responsibility nor obligation to inquire about the authority of anyone using your password/PINs or other information that can be used to identify your account to request Hyundai BlueLink Service for your Vehicle.
Passwords/PINs. You promise to be fully responsible for the protection of your password/PINs. Anyone who has access to your password or PINs may be able to access the SUBARU STARLINK Features and Account, SUBARU STARLINK customer web portal, and SUBARU STARLINK Mobile App, and we have no responsibility for nor obligation to inquire about the authority of anyone using your password/PINs or other information that can be used to identify your account to request SUBARU STARLINK Services for your Vehicle. YOU HAVE THE OBLIGATION TO PROTECT YOUR USERNAME, PASSWORD AND PIN FROM UNAUTHORIZED USE.
Passwords/PINs. You promise to be fully responsible for the protection of your password/PINs. Anyone who has access to your password or PINs may be able to access your NissanConnect Services and Account, the NissanConnect Services Web Site, and NissanConnect Services Mobile App. Neither we nor any Service Provider has any obligation to inquire about the authority of anyone using your password/PINs or other information that can be used to identify your account to request NissanConnect Services for your Vehicle. YOU HAVE THE OBLIGATION TO PROTECT YOUR USERNAME, PASSWORD AND PIN FROM UNAUTHORIZED USE.

Related to Passwords/PINs

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT.

  • Password To enable you, and only you, to use the Service, you will be asked to choose a password when you register and are accepted as a customer of the Service. This password is stored in encrypted form by us. You are responsible for maintaining the confidentiality of your Funds Transfer with Customer Assumed Risk customer number and password. No one at JetStream Federal Credit Union has access to your Accounts passwords or user ID's. You are responsible for uses of the Service whether or not actually or expressly authorized by you. Therefore, it is important that you DO NOT SHARE YOUR ACCOUNT NUMBER OR PASSWORD WITH ANYONE FOR ANY REASON. No one at JetStream Federal Credit Union will know or need to know your password, and JetStream Federal Credit Union employees will never ask for your password. If you wish to make a transfer to an Account of another person, you will be asked to provide a separate code word or phrase (the "Shared Secret") that is known only to you and to the person to whom you are transferring the funds (the "Recipient"). We recommend that you do not use commonly used words, phrases or dates. In order to complete the transfer, the Recipient must provide the Shared Secret and certain other identifying information. YOU AGREE THAT YOU WILL NOT GIVE THE SHARED SECRET TO ANYONE EXCEPT THE RECIPIENT FOR ANY REASON. YOU FURTHER AGREE THAT YOU WILL INSTRUCT THE RECIPIENT NOT TO GIVE THE SHARED SECRET TO ANYONE ELSE FOR ANY REASON. Contact in the Event of Unauthorized Transfer If you believe your password or Shared Secret has been lost or stolen, or that someone has transferred or may transfer money from your Account without your permission, call: or fax: +0 (000) 000-0000, or e- mail: xxxxxxxxx@xxxxxxxxxxxx.xxx, or write: Funds Transfer with Customer Assumed Risk Administrator, JetStream Federal Credit Union , X.X. Xxx 0000, Xxxxx Xxxxx, XX 00000 Consumer Liability You agree to notify us AT ONCE if you believe your password has been lost or stolen. Telephoning us promptly is the best way to protect yourself from possible losses. If you never tell us, you could lose all of the money in your account (plus your maximum overdraft line of credit). However, if you tell us within 2 business days, you can lose no more than $50 if someone used your password without your permission. If you do NOT tell us within 2 business days after you learn of the loss or theft of your password, and we can prove we could have stopped someone from using your password without your permission if you had told us, you could lose as much as $500. You can see a complete statement of all your funds transfers effected or pending at any time by clicking on the History tab. If your statement shows transfers that you did not make, notify us AT ONCE. If you do not tell us within 60 days after the transfer was posted to your statement, you may not get back any money you lost after the 60 days, if we can prove that we could have stopped someone from taking the money if you had told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Use of information, data and software In the event that you receive any data, information or software via the Trading Platform other than that which you are entitled to receive pursuant to this Client Agreement, you will immediately notify us and will not use, in any way whatsoever, such data, information or software.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit B.

  • Passwords and Security You acknowledge that you will be the only authorized user of Firstrade Securities Inc.'s Electronic Services for your account(s). You will be fully responsible for the confidentiality and use of your user name(s) and password (s) and you agree that you will be fully and solely responsible for all activities, including brokerage transactions, which arise from the use of your user name (s) or password(s) (except as provided for in paragraph 5 below). You also agree that you will be fully and solely responsible for all activities, including brokerage transactions, which arise from your authorization to link your brokerage account(s) to any other Firstrade Securities Inc. account(s). You acknowledge that we may tape record conversations with you, whether in person or by telephone, for purposes of verification and you consent to such recording.

  • Usernames and Passwords 1. Staff will not share usernames and passwords with anyone, including supervisors and technical support staff.

  • HOW WE MAY USE YOUR PERSONAL INFORMATION 8.1 We will use the personal information You provide to Us to:

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Line Information Database 9.1 LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, e-Tel must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!