Security and Passwords; Additional Security Issues Regarding Internet Email Sample Clauses

Security and Passwords; Additional Security Issues Regarding Internet Email. I agree to comply with all reasonable instructions or recommendations that The Bank may issue regarding Service security. I agree to review and follow any separate instructions/guides that The Bank provides concerning security best practices. I agree to set up, maintain and regularly review my security arrangements concerning access to, and use of the Services and information stored on my computing and communications systems and my control of the Access code to ensure that my computing and communications systems and the Access Code are protected against intrusion according to best industry practice. I understand the importance of my role in preventing misuse of my account and I agree to protect the confidentiality of my Account(s), Account number(s), and Access Code. I understand that identification information by itself or together with information related to my Account(s) may allow unauthorized access to my Account(s). I am solely responsible for the security of my Access code and my computers and other devices that I use to access the Services. I agree to make sure that any Device I use to access the Services is free from and adequately protected against computer viruses and other destructive components. I am solely responsible for the performance and protection of my browsers, including the prompt adoption of all security patches and other security measures issued or recommended from time to time by the browser supplier. I am strictly responsible for establishing and maintaining commercially reasonable security measures to safeguard against unauthorized transmissions and network infections. I agree that such measures will include, but not be limited to, security technology that provides a minimum level of security equivalent to 128-bit RC4 encryption technology for the transmission of Transactions over the Internet. The Bank is not responsible for any Trojan Horses, spyware, malware, or electronic virus or viruses that I may encounter or that infect my computing system. I agree to scan my Device and other electronic media using a reliable virus product to detect and remove any Trojan Horses, spyware, malware, or viruses routinely according to best current industry practice. During the term of this Agreement, I agree to maintain insurance to adequately cover the risk of unauthorized access to my computer systems and other devices. I acknowledge that there are certain security, corruption, transmission error, and access availability risks associated with...
AutoNDA by SimpleDocs

Related to Security and Passwords; Additional Security Issues Regarding Internet Email

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • CERTIFICATION REGARDING USE OF CONTRACT FUNDS FOR LOBBYING This provision is applicable to all Federal-aid construction contracts and to all related subcontracts which exceed $100,000 (49 CFR 20).

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

  • Security Violations and Accounts Updates Grantee will adhere to the Confidentiality Article requirements and HHS Data Usage Agreement of this contract and immediately contact System Agency if a security violation is detected, or if Grantee has any reason to suspect that the security or integrity of the CMBHS data has been or may be compromised in any way.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Accessing the Website and Account Security We reserve the right to withdraw or amend this Website and any service or material we provide on the Website in our sole discretion without notice. We will not be liable if for any reason all or any part of the Website is unavailable at any time or for any period. From time to time, we may restrict access to some parts of the Website, or the entire Website, to users, including registered users. To access the Website or some of the resources it offers, you may be asked to provide certain registration details or other information. It is a condition of your use of the Website and any resources downloaded from the Website that all the information you provide on the Website is correct, current, and complete. You agree that all information you provide to register with this Website or otherwise, including but not limited to through the use of any interactive features on the Website, is governed by our Privacy Policy, and you consent to all actions we take with respect to your information consistent with our Privacy Policy. If you choose, or are provided with, a user name, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any other person or entity. You also acknowledge that your account is personal to you and agree not to provide any other person with access to this Website or portions of it using your user name, password or other security information. You agree to notify us immediately of any unauthorized access to or use of your user name or password or any other breach of security. You also agree to ensure that you exit from your account at the end of each session. You should use particular caution when accessing your account from a public or shared computer so that others are not able to view or record your password or other personal information. We have the right to disable any user name, password or other identifier, whether chosen by you or provided by us, at any time in our sole discretion for any or no reason, including if, in our opinion, you have violated any provision of these Terms of Use.

  • Supplemental JBoss Software Conditions Software Access and Software Maintenance for Supplemental JBoss Software is intended and available for Development Purposes only and for up to 25 users for each 16 Core Band Subscription of Red Hat JBoss Middleware Software that you purchased. If you deploy or use the Supplemental JBoss Software for Production Purposes or for more than 25 users, you agree to purchase the appropriate Software Subscriptions for each Unit that you deploy or use. Red Hat’s Open Source Assurance Program applies only to the Red Hat JBoss Middleware Software Subscription that you purchased (such as Red Hat JBoss Enterprise Application Platform in the example above) and does not apply to Supplemental JBoss Software. JBoss xPaaS Subscriptions (defined below) are not considered Supplemental JBoss Software. Each installation and use of JBoss xPaaS Subscriptions Software for either Development Purposes or Production Purposes is a Unit and requires a paid Software Subscription.

  • Certification Regarding Use of State Funds If Party is an employer and this Agreement is a State-funded grant in excess of $1,001, Party certifies that none of these State funds will be used to interfere with or restrain the exercise of Party’s employee’s rights with respect to unionization.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Links from the Website If the Website contains links to other sites and resources provided by third parties, these links are provided for your convenience only. This includes links contained in advertisements, including banner advertisements and sponsored links. We have no control over the contents of those sites or resources, and accept no responsibility for them or for any loss or damage that may arise from your use of them. If you decide to access any of the third-party websites linked to this Website, you do so entirely at your own risk and subject to the terms and conditions of use for such websites.

Time is Money Join Law Insider Premium to draft better contracts faster.