Safeguards and Security. 6.1 You must take all reasonable steps to keep safe all communication channels you have with the Associated Service Provider including any API keys, passwords, PINs or email addresses you use to communicate with the Associated Service Provider. If you become aware that there is a risk that your communication with the Associated Service Provider is no longer secure, you must notify the Associated Service Provider’s customer support as soon as possible.
6.2 You must take all reasonable precautions to prevent fraudulent use of Payment Services.
6.3 We shall contact you via email in the event of suspected or actual fraud or security threats, unless we are of the view that your emails might be compromised, in which case we shall contact you by telephone.
6.4 We may stop or suspend the use of the Associated Service Provider's App based upon:
(a) the security of the Associated Service Provider's App;
(b) suspected unauthorised or fraudulent use of the Associated Service Provider's App.
6.5 We may stop or suspend your ability to use the Associated Service Provider or any Account Information Service Provider or Payment Initiation Service Provider if we have reasonably justified and duly evidenced reasons for same relating to:
(a) unauthorised or fraudulent access to your payment account information by the Associated Service Provider, that Account Information Service Provider or that Payment Initiation Service Provider; and/or
(b) the risk of unauthorised or fraudulent initiation of a Payment. If we do deny access to the Associated Service Provider or any Account Information Service Provider or Payment Initiation Service Provider in accordance with this paragraph 6.4, unless doing so would compromise security or is unlawful, we shall notify you as soon as possible via phone or email in accordance with clause 2.4.
Safeguards and Security. 9.2.1 Business Associate shall use safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of PHI and other confidential data and comply, where applicable, with subpart C of 45 CFR Part 164 with respect to electronic protected health information, to prevent use or disclosure of the information other than as provided for by this Agreement. Such safeguards shall be based on applicable Federal Information Processing Standards (FIPS) Publication 199 protection levels.
9.2.2 Business Associate shall, at a minimum, utilize a National Institute of Standards and Technology Special Publication (NIST SP) 800-53 compliant security framework when selecting and implementing its security controls and shall maintain continuous compliance with NIST SP 800-53 as it may be updated from time to time. The current version of NIST SP 800-53, Revision 5, is available online at; updates will be available online through the Computer Security Resource Center website.
9.2.3 Business Associate shall employ FIPS 140-2 validated encryption of PHI at rest and in motion unless Business Associate determines it is not reasonable and appropriate to do so based upon a risk assessment, and equivalent alternative measures are in place and documented as such. FIPS 140-2 validation can be determined online through the Cryptographic Module Validation Program Search, with information about the Cryptographic Module Validation Program under FIPS 140-2. In addition, Business Associate shall maintain, at a minimum, the most current industry standards for transmission and storage of PHI and other confidential information.
9.2.4 Business Associate shall apply security patches and upgrades, and keep virus software up-to-date, on all systems on which PHI and other confidential information may be used.
9.2.5 Business Associate shall ensure that all members of its workforce with access to PHI and/or other confidential information sign a confidentiality statement prior to access to such data. The statement must be renewed annually.
9.2.6 Business Associate shall identify the security official who is responsible for the development and implementation of the policies and procedures required by 45 CFR Part 164, Subpart C.
Safeguards and Security. 7.2.1. Business Associate shall use safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of PHI and other confidential data and comply, where applicable, with Subpart C of 45 C.F.R. Part 164 with respect to ePHI, to prevent use or disclosure of the information other than as provided for by this Agreement. Such safeguards shall be, at a minimum, at Federal Information Processing Standards (“FIPS”) Publication 199 protection levels. Business Associate shall implement reasonable and appropriate policies and procedures to comply with the standards, implementation specifications and other requirements of Subpart C of 45 C.F.R. Part 164, in compliance with 45 C.F.R. § 164.316. Business Associate shall maintain a comprehensive written information privacy and security program that includes administrative, technical, and physical safeguards appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities.
7.2.2. Business Associate shall, at a minimum, utilize an industry-recognized security framework when selecting and implementing its security controls, and shall maintain continuous compliance with its selected framework as it may be updated from time to time. Examples of industry-recognized security frameworks include but are not limited to:
7.2.2.1. NIST SP 800-53 - National Institute of Standards and Technology Special Publication 800-53 7.2.2.2. FedRAMP - Federal Risk and Authorization Management Program 7.2.2.3. PCI - PCI Security Standards Council 7.2.2.4. ISO/ESC 27002 - International Organization for Standardization / International Electrotechnical Commission standard 27002 7.2.2.6. IRS PUB 1075 - Internal Revenue Service Publication 1075
Safeguards and Security. 9.2.1 Business Associate shall use safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of PHI and other confidential data and comply, where applicable, with subpart C of 45 CFR Part 164 with respect to electronic protected health information, to prevent use or disclosure of the information other than as provided for by this Agreement. Such safeguards shall be, at a minimum, at Federal Information Processing Standards (FIPS) Publication 199 protection levels.
9.2.2 Business Associate shall, at a minimum, utilize an industry- recognized security framework when selecting and implementing its security controls, and shall maintain continuous compliance with its selected framework as it may be updated from time to time. Examples of industry-recognized security frameworks include but are not limited to
9.2.2.1 NIST SP 800-53 – National Institute of Standards and Technology Special Publication 800-53 9.2.2.2 FedRAMP – Federal Risk and Authorization Management Program
Safeguards and Security. 19.1 The Client must notify Argentex via telephone or by email using the contact details set out in clause 2.1 on becoming aware of the misappropriation of Argentex Online. This includes:
(a) The loss by the Client or any Authorised Person of their Security Details; and/or
(b) someone other than the Client or an Authorised Person knowing or using their Security Details or otherwise being able to gain access to Argentex Online.
19.2 The Client and each Authorised Person must take all reasonable steps to keep Argentex Online and their Security Details safe and prevent fraudulent use of the Services. This includes:
(a) the Client and each Authorised Person not telling anyone, including Argentex or someone purporting to be Argentex, the Client’s Security Details – we will never ask for Security Details via telephone or email or using any other method (except when the Client is required to enter those details on Argentex Online);
(b) the Client and each Authorised Person notifying Argentex, using one of the methods set out in clause 2.1, as soon as it suspects or knows that someone other than themselves knows their Security Details or can otherwise gain access to Argentex Online;
(c) logging off Argentex Online every time the computer (or other device used to gain access to Argentex Online) is left by the Client or the relevant Authorised Person;
(d) always ensuring that login details and Security Details are not stored by the browser or cached or otherwise recorded by the computer (or other device used to gain access to Argentex Online);
(e) having recognised anti-virus software put on the device that the Client and each Authorised Person use to gain access to Argentex Online and the email account(s) that the Client and each Authorised Person use to communicate with Argentex;
(f) notifying Argentex immediately if a virus is found on the device the Client or any Authorised Person uses to obtain access to Argentex Online and the email account the Client use to communicate with Argentex;
(g) ensuring that the e-mail account(s), phone number, mobile phone number, computer and other network the Client and each Authorised Person use to communicate with Argentex is secure and only accessed by the Client or the relevant Authorised Person as these may be used to reset Security Details;
(h) regularly checking emails so that the Client is aware if there are new Instructions which the Client has not authorised or if new Beneficiary Account details are added to Argentex On...
Safeguards and Security. 11.1 You must notify us via telephone or by email using the contact details set out in clause 1.3 on becoming aware of the misappropriation of the Platform – the misappropriation of the Platform includes:
(a) the loss by you or any Authorised Person of their Password; and/or
(b) someone other than you or the Authorised Person knowing their Password or otherwise being able to gain access to the Platform.
11.2 You and each Authorised Person must take all reasonable steps to keep safe the Platform. This includes:
(a) each Authorised Person not telling anyone, including us or someone purporting to be us, your Password – we will never ask for your Passwords via telephone or email or using any other method (except when you are required to enter same on the Platform);
(b) each Authorised Person and you notifying us, using one of the methods set out in clause 1.3, as soon as it suspects or knows that someone other than themselves knows their Passwords or can otherwise gain access to the Platform.
(c) logging off the Platform every time the computer (or other device used to gain access to the Platform) is left by you or the relevant Authorised Person;
(d) always ensuring that login details and Passwords are not stored by the browser or cached or otherwise recorded by the computer (or other device used to gain access to the Platform);
(e) having recognised anti-virus software put on the device you use to gain access to the Platform and the email account you and each Authorised Person use to communicate with us;
(f) notifying us immediately if a virus is found on the device you or any Authorised Person uses to obtain access to the Platform and the email account you use to communicate with us;
(g) ensuring that the e-mail account(s), phone number, mobile phone number, computer, fax and other network you and each Authorised Person use to communicate with us is secure and only accessed by you or the relevant Authorised Person as these may be used to reset Passwords;
(h) regularly checking the Platform and the Client System so that you are aware if there are new Payment Orders which you have not authorised or if new Beneficiary Account details are added to the Platform or the API which you did not add.
11.3 You must take all reasonable precautions to prevent fraudulent use of Services.
11.4 You must inform us as soon as you become aware that the Client System and/or the API have become compromised. You are fully responsible for the security or the Client System. All Paym...
Safeguards and Security. 9.2.1 Business Associate shall use safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of PHI and other confidential data and comply, where applicable, with subpart C of 45 CFR Part 164 with respect to electronic protected health information, to prevent use or disclosure of the information other than as provided for by this Agreement. Such safeguards shall be based on applicable Federal Information Processing Standards (FIPS) Publication 199 protection levels.
9.2.2 Business Associate shall, at a minimum, utilize an industry-recognized security framework when selecting and implementing its security controls, and shall maintain continuous compliance with its selected framework as it may be updated from time to time. Examples of industry- recognized security frameworks include but are not limited to
9.2.2.1 NIST SP 800-53 – National Institute of Standards and Technology Special Publication 800-53 9.2.2.2 FedRAMP – Federal Risk and Authorization Management Program
9.2.2.3 PCI – PCI Security Standards Council 9.2.2.4 ISO/ESC 27002 – International Organization for Standardization 9.2.2.5 IRS PUB 1075 – Internal Revenue Service Publication 1075
Safeguards and Security. 11.1. You must notify us via telephone or by email using our contact details set out in Clause 30.2 on becoming aware of the misappropriation of the Online Platform – this will include you and each Authorised Trader notifying us as soon as it suspects or knows that someone other than themselves knows their Access Codes or can otherwise gain access to the Online Platform.
11.2. You and each Authorised Trader must take all reasonable steps to keep safe the Online Platform. This includes:
11.2.1. not telling anyone, including us or someone purporting to be us, your Access Codes – we will never ask for your Access Codes via telephone or email or using any other method (except when you are required to enter same on the Online Platform);
11.2.2. each Authorised Trader and you notifying us, using one of the methods set out in clause 30.2, as soon as it suspects or knows that someone other than themselves knows their Access Codes or can otherwise gain access to the Online Platform.
11.2.3. logging off the Online Platform every time the computer or other device used to gain access to the Online Platform is left by you or the relevant Authorised Trader;
11.2.4. always ensuring that the Access Codes are not stored by the browser or cached or otherwise recorded by the computer or other device used to gain access to the Online Platform;
11.2.5. having recognised anti-virus software on the computer or other device you use to gain access to the Online Platform;
11.2.6. notifying us immediately if a virus is found on the computer or other device you or any Authorised Trader uses to obtain access to the Online Platform;
11.2.7. ensuring that the e-mail account(s), phone number, mobile phone number, computer, fax and other network you and each Authorised Trader use to communicate with us is secure and only accessed by you or the Authorised Trader as these may be used to reset the Access Codes;
11.2.8. regularly checking your emails so that you are aware if there are new Requests which you have not authorised.
11.3. You must take all reasonable precautions to prevent fraudulent use of Services. This includes ensuring that the e-mail account(s), phone numbers, mobile phone numbers and computers you and each Authorised Trader use to communicate with us are secure and only accessed by you or an Authorised Trader.
11.4. You and each Authorised Trader must also regularly check its emails as they may receive emails from us relating to new Requests having been received. T: +00 (0) ...
Safeguards and Security. Business Associate shall use safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of PHI and other confidential data and comply, where applicable, with subpart C of 45 CFR Part 164 with respect to electronic protected health information, to prevent use or disclosure of the information other than as provided for by this Agreement. Such safeguards shall be based on applicable Federal Information Processing Standards (FIPS) Publication 199 protection levels.
Safeguards and Security. 13.1 The Client must take all reasonable precautions to prevent fraudulent use of Payment Services. In particular, it is essential that the Client, among other security measures:
(a) takes all reasonable steps to keep safe its personalised security features (including all passwords and PINs required to access the Payment Services) and any currency, Drafts and other documentary payment methods it receives;
(b) uses the Payment Services provided by CD in accordance with the terms and conditions for their use as indicated in these Terms and on the CD website (and in the event of any conflict, these Terms shall prevail);
(c) notifies CD in accordance with Clause 3 without undue delay on becoming aware of the loss, theft, misappropriation or unauthorised use of any Onward Payment or unauthorised use of the Payment Service. Where CD communicates with and accepts written instructions from the Client’s e-mail address the Client must ensure that its e-mail account is secure.
13.2 CD may stop or suspend any Onward Payment (in whole or in part) and/or the Client’s use of the Payment Service if it has reasonable grounds for doing so relating to:
(a) the security of the Payment Service or an Onward Payment;
(b) the suspected unauthorised or fraudulent use of the Payment Service or an Onward Payment; and/or
(c) where the Onward Payment is being made in connection with a credit line, if CD believes that there is a significantly increased risk that the Client may be unable to fulfil its liability to pay. Unless doing so would compromise reasonable security measures or be unlawful, before stopping or suspending any Onward Payment (in whole or in part) or the Client’s use of the Payment Service (as appropriate) or immediately after doing so, CD must inform the Client and give its reasons for doing so. As soon as practicable after the reason for stopping or suspending any Onward Payment (in whole or in part) or the Client’s use of the Payment Service (as appropriate) has ceased to exist, CD must allow the outstanding element of the Onward Payment or the resumption of the Client’s use of the Payment Service (as appropriate).
13.3 If the Client believes that a Payment Instruction has been given, or an Onward Payment made, in error and/ or was unauthorised by it, the Client must notify CD as soon as possible via the helpline or e-mail address listed in Clause 3. Failure to notify CD immediately on becoming aware of within 13 months of the date of any Onward Payment could result...