Security Alerts Sample Clauses

Security Alerts. If we, through Electronic Services, make the Alerts Services available and you use the Alerts Services, you acknowledge and agree that: (a) The following terms will have the following meanings in this section (and elsewhere in this Agreement):
AutoNDA by SimpleDocs
Security Alerts. The Company does not guarantee to provide you with security alerts or any other alert, and the Company shall not be held liable for not providing any alerts. In no event will the Company be held responsible for any damages or losses which you may sustain as a result of compromise of your Log-In, Registration Details, or other Account information, other than due to the gross negligence of the Company.
Security Alerts. Online Security Alerts help you monitor and protect your Accounts from unauthorized access. Typical security alerts include notifying the customer via the requested method when a password has been changed, a computer browser is successfully registered for Online Banking, a User login is disabled or a User login is locked out, a new User is created, or security alert preferences are changed. Some of these Security Alerts may not be disabled by the User. Please review the full menu of available Security Alerts. In some circumstances, when we perceive that unusual behavior may be occurring in one or more of your Accounts and time is of the essence, we attempt to contact you immediately to verify the activity or transactions in question, using any communication channel that is available to us.
Security Alerts. Online Security Alerts help you monitor and protect your Accounts from unauthorized access. Typical security alerts include sending the customer via the requested method when an ACH Transaction or wire payment have been initiated and are out for review, a password has been changed, a computer browser is successfully registered for Online Banking, a user login is disabled or a user login is locked out, a new user is created, or security alert preferences are changed. Some of these Security Alerts may not be disabled by the user. Please review the full menu of available security alerts. In some circumstances, when we perceive that unusual behavior may be occurring in one or more of your Accounts and time is of the essence, we attempt to contact you immediately to verify the activity or transactions in question, using any communication channel that is available to us.
Security Alerts. Authorized Users may sign up for the AgileStacks security vulnerabilities list. AgileStacks will use this list to notify Authorized Users of urgent security vulnerabilities.
Security Alerts. Security Alerts help you monitor and protect your Accounts from unauthorized access. SouthState Bank automatically provides you with several Security Alerts, which you cannot disable. In addition, you can set up additional Security Alerts to further protect your Accounts. You can set up Security Alerts so that you are notified from time to time via SMS text message, email and/or phone call (the "delivery methods"). Security Alerts will also be delivered to your Online and Mobile Banking Message Center.
Security Alerts. The Service provides you with certain security alerts, for example, following certain changes made to your Accounts or Online Banking profile. For example, we will send you an alert following a change to your user name, password or email address. • We also provide alerts following certain activity or events relating to access and use of Online Banking or your Online Banking credentials such as a locked or unlocked access or invalid responses to challenge questions. • We automatically activate these alerts for you.
AutoNDA by SimpleDocs

Related to Security Alerts

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Security Audit Customer agrees that PROS’ Audit Report will be used to satisfy any audit or inspection requests by or on behalf of Customer, and PROS will make Audit Reports available to Customer upon request. PROS will promptly remediate any material weaknesses or significant control deficiencies identified in any Audit Reports. In the event that an audit opinion is qualified and the qualification has not been remediated by the date of the Audit Report, PROS shall (i) provide Customer with PROS remediation plan; and (ii) execute such plan in accordance with its terms.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Arrangements Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Protection of Collateral (a) The Issuer will (i) execute and deliver all such supplements and amendments to this Indenture and instruments of further assurance and other instruments, (ii) file or authorize and cause to be filed all such financing statements and amendments and continuations of such financing statements and (iii) take such other action, in each case necessary or advisable to: (A) maintain or preserve the Lien and security interest (and the priority of such security interest) of this Indenture or carry out more effectively the purposes of this Indenture; (B) perfect, publish notice of or protect the validity of any Grant made or to be made by this Indenture; (C) enforce any of the Collateral; or (D) preserve and defend title to the Collateral and the rights of the Indenture Trustee and the Secured Parties in the Collateral against the claims of all Persons. (b) The Issuer authorizes the Administrator and the Indenture Trustee to file any financing or continuation statements, and amendments to such statements, in all jurisdictions and with all filing offices as are necessary or advisable to preserve, maintain and protect the interest of the Indenture Trustee in the Collateral. Such financing and continuation statements may describe the Collateral in any manner as the Administrator or the Indenture Trustee may reasonably determine to ensure the perfection of the interest of the Indenture Trustee in the Collateral (including describing the Collateral as “all assets” of the Issuer). The Administrator or the Indenture Trustee, as applicable, will deliver to the Issuer file-stamped copies of, or filing receipts for, any such financing statement and continuation statement promptly upon such document becoming available following filing. (c) The Indenture Trustee is under no obligation (i) to make any determination of whether any such financing or continuation statements, and amendments to such statements, are required to be filed pursuant to this Section 3.5 or (ii) to file any such financing or continuation statements, or amendment to such statements, and will not be liable for failure to do so.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!