Personalised security features Sample Clauses

Personalised security features. For the execution of banking transactions, the User needs the personalised security features and authentication instruments agreed with the Bank in order to prove his/her identity and to authorise orders. Each User may agree with the Bank which personalised security feature and authentication instrument he/she is to use. The personalised security features, which may also be alphanumeric, are: (i) the personal user number (“Personalized User Number”) and the Personal Identification Number (“PIN”) – collectively the “Individual Authorization Data” to have access to the Portal; and (ii) the transaction authorisation numbers (photoTAN), usable only once, or (iii) a the signature PIN/code word and the data of the personal electronic key for the electronic signature and an electronic signature authorized by the Bank (“Electronic Signature”; the Personalized User Number and the transaction authorisation numbers (PhotoTAN) or the PINs plus the Electronic Signature hereinafter referred to as “Identification Means”).
AutoNDA by SimpleDocs
Personalised security features. For the execution of banking transactions, the User must use the personalised security credentials and authentication instruments established with the Bank in order to prove his/her identity and to authorise orders. Each User can arrange which type of personalised security credentials and authentication instruments he/she is to use with the Bank. Personalised security credentials are those personalised elements that the Bank provides to the User for authentication purposes. The personalised security credentials, which may also be alphanumeric, are (hereinafter referred to as the “Security Credentials” and, individually, the “Security Credential”): (i) the number for personal use (“Number for personal use”) and the Personal Identification Number (“PIN”) – collectively the “Individual Authorisation Data” to have access to the Portal; and (ii) the transaction authorisation numbers (photoTAN), usable only once, or (iii) a signature PIN/password and the personal electronic key data and an electronic signature authorised by the Bank (“Electronic Signature”; the Personalised User Number and the transaction authorisation numbers (photoTAN) or the PINs plus the Electronic Signature will hereinafter be referred to as “Knowledge-Based Authentication Factors”). In those cases established by the applicable regulations, to correctly identify the Customer the Bank shall require the User to provide strong customer authentication, which requires the use of two or more knowledge-based (something only the user knows), possession- based (something only the user has) and inherence-based (something only the user is) authentication factors, which are independent –that is, the violation of one does not compromise the reliability of the others– and designed to protect the confidentiality of personal information. Specifically, this type of authentication shall be required when the Customer: a) accesses his/her online payment account; b) initiates an electronic payment transaction; c) performs via a remote channel any action that may involve a risk of payment fraud or other fraudulent use.

Related to Personalised security features

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.

  • Safety; Security Contractor’s failure to comply with any of the requirements in this Section shall be cause for termination.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • NIST Cybersecurity Framework The U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity Version 1.1.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Placement of RDDS probes Probes for measuring RDDS parameters shall be placed inside the networks with the most users across the different geographic regions; care shall be taken not to deploy probes behind high propagation-­‐delay links, such as satellite links.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Placement of EPP probes Probes for measuring EPP parameters shall be placed inside or close to Registrars points of access to the Internet across the different geographic regions; care shall be taken not to deploy probes behind high propagation-­‐delay links, such as satellite links.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!