Responsibility for Authorized and Unauthorized Access Sample Clauses

Responsibility for Authorized and Unauthorized Access a. The Customer will manage and control access to Custom House Online and the ability to conduct trades and receive other services, by strictly managing and controlling access to the Customer’s password. b. It is the Customer’s responsibility to ensure that an Authorized User is properly authorized to trade and otherwise use Custom House Online Services on the Customer’s behalf. c. It is the Customer’s responsibility to ensure that the Authorized User’s Sign-on Credentials do not become known to third parties. d. All Trades and other uses of Custom House Online conducted through an Authorized User’s Sign-On Credentials, whether they are by Authorized Users or Unauthorized Users, are the Customer’s responsibility and will be legally binding on the Customer. The Customer shall indemnify and hold harmless Custom House from and against any claims for damages, losses, costs, fees and expenses incurred by Custom House arising out of or in respect of any unauthorized use of the Customer’s password and this indemnity will survive the completion of any Trade or the termination of this Agreement. e. The Customer will not be responsible for any unauthorized use or trade that occurs after Custom House has acknowledged to the Customer in writing receipt from the Customer of a direction to terminate use of the Password used. f. The Customer must immediately notify Custom House when any new person becomes an Authorized User or when any existing Authorized User is no longer entitled to be an Authorized User.
AutoNDA by SimpleDocs
Responsibility for Authorized and Unauthorized Access. Indemnification

Related to Responsibility for Authorized and Unauthorized Access

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release. (b) Vendor will provide such notification to the District by contacting Xxxxxx Xxx, Data Protection Officer, directly by email at xxxxxx.xxx@xxxxx.xxx or by calling 000-000-0000. (c) Vendor will cooperate with the District and provide as much information as possible directly to Xxxxxx Xxx, Data Protection Officer or his/her designee about the incident, including but not limited to: a description of the incident, the date of the incident, the date Vendor discovered or was informed of the incident, a description of the types of Protected Data involved, an estimate of the number of records affected, the schools within the District affected, what the Vendor has done or plans to do to investigate the incident, stop the breach and mitigate any further unauthorized access or release of Protected Data, and contact information for Vendor representatives who can assist affected individuals that may have additional questions. (d) Vendor acknowledges that upon initial notification from Vendor, the District, as the educational agency with which Vendor contracts, has an obligation under Section 2-d to in turn notify the Chief Privacy Officer in the New York State Education Department (“CPO”). Vendor agrees not to provide this notification to the CPO directly unless requested by the District or otherwise required by law. In the event the CPO contacts Vendor directly or requests more information from Vendor regarding the incident after having been initially informed of the incident by the District, Vendor will promptly inform Xxxxxx Xxx, Data Protection Officer or his/her designee.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • LIABILITY FOR UNAUTHORIZED USE-LOST/STOLEN CARD NOTIFICATION You agree to notify Credit Union immediately, orally or in writing at Florida Credit Union, X.X. Xxx 0000, Xxxxxxxxxxx, XX 00000 or telephone (000) 000-0000 twenty four

  • AUTHORIZED AGENTS On the Closing Date and from time to time thereafter, the Borrower shall deliver to the Administrative Agent an Officer’s Certificate setting forth the names of the employees and agents authorized to request Loans and Letters of Credit and to request a conversion/continuation of any Loan and containing a specimen signature of each such employee or agent. The employees and agents so authorized shall also be authorized to act for the Borrower in respect of all other matters relating to the Loan Documents. The Administrative Agent, the Arrangers, the Co-Agents, the Lenders and any Issuing Bank shall be entitled to rely conclusively on such employee’s or agent’s authority to request such Loan or Letter of Credit or such conversion/continuation until the Administrative Agent and the Arrangers receive written notice to the contrary. None of the Administrative Agent or the Arrangers shall have any duty to verify the authenticity of the signature appearing on any written Notice of Borrowing or Notice of Conversion/Continuation or any other document, and, with respect to an oral request for such a Loan or Letter of Credit or such conversion/continuation, the Administrative Agent and the Arrangers shall have no duty to verify the identity of any person representing himself or herself as one of the employees or agents authorized to make such request or otherwise to act on behalf of the Borrower. None of the Administrative Agent, the Arrangers or the Lenders shall incur any liability to the Borrower or any other Person in acting upon any telephonic or facsimile notice referred to above which the Administrative Agent or the Arrangers believes to have been given by a person duly authorized to act on behalf of the Borrower and the Borrower hereby indemnifies and holds harmless the Administrative Agent, each Arranger and each other Lender from any loss or expense the Administrative Agent, the Arrangers or the Lenders might incur in acting in good faith as provided in this Section 2.7.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

  • Customer Responsibility You agree that you are responsible for all access to and use of the Service through your account or password(s) and for any fees incurred for the Service, or for software or other merchandise purchased through the Service, or any other expenses incurred in accordance with the terms of this Agreement. You agree that you are responsible for backing up (a) any data you submit, receive or transfer over the Service, including, without limitation, your email; and (b) any data, files, programs, or applications on any device you connect to the Service. You acknowledge that you are aware that content accessible on or through the Service may contain material that is unsuitable for minors (persons under 18 years of age). You agree to supervise usage of your account by minors. You ratify and confirm any obligations incurred by a minor using your account.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!