Security and Security Procedures Sample Clauses

Security and Security Procedures. For security purposes, you will be required to change the temporary password provided by the Bank upon your initial login to the System. You acknowledge and agree that: (a) the Bank shall have no access to your password; (b) you shall be solely responsible to determine what password will be used by you; and (c) the identification of such password selected by you shall not be communicated to the Bank. You agree that the Bank shall be authorized to effect the System Services upon receipt and verification by the System of your password, and that the Bank is authorized to act on instructions received upon receipt and verification by the System of your password. You agree that any transactions processed with your log-in ID and password are deemed to have been authorized by you. You are solely responsible for the confidentiality and security of your password and shall safeguard against unauthorized transmission of instructions to the Bank and you agree to change your password regularly. The Bank will not be liable for any transaction ordered by any person to whom you have granted access regardless of the purpose for which you granted the access or for any information about your account revealed in reliance upon your log-in ID and password. Upon three unsuccessful attempts to use a password, your access to the System will be disabled, and further access to the System shall be permitted only upon compliance with established procedures by the Bank, including the issuance of a new password. You acknowledge the importance of your role in preventing misuse of the accounts through the System and agree to promptly examine all account statements for accuracy immediately upon receipt. You agree to protect the confidentiality of your account(s) and account number(s), and personal identification information. (You acknowledge that certain personal identification information by itself, or together with information related to the accounts, may allow unauthorized access to such accounts.) While data transferred via the System is encrypted in an effort to provide transmission security, you acknowledge that the internet is inherently unsecure and that all data transfers, including the System Services, occur openly on the internet and potentially can be monitored and read by others. The Bank specifically does not warrant that data transfers utilizing the System, or email transmitted to and from the Bank, will not be monitored or read by others; we cannot and do not warrant that ac...
AutoNDA by SimpleDocs
Security and Security Procedures. Customer assumes sole responsibility for the actions of its User. The Bank therefore recommends that Customer only allow access to the System to its business owner. If Customer does not do so, and if Customer allows access to any other User, whether or not such User is an employee, this is done at Customer’s own risk and peril. For security purposes, Customer shall be required to change its temporary password provided by the Bank upon Customer’s initial login to the System. Customer acknowledges and agrees that: (a) the Bank shall have no access to Customer’s password; (b) Customer shall be solely responsible to determine what password will be used by it; and
Security and Security Procedures 

Related to Security and Security Procedures

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Provisions Order 1600.72A, Contractor and Industrial Security Program applies to all Contractors, subcontractors, consultants, or any other persons (not visitors) who have access to FAA facilities, sensitive unclassified information, and resources. See Security Guidelines (Attachment J-9) for more details. The Government will update the document periodically to reflect the current FAA security policy. The Government designates all eFAST labor categories as enumerated in Attachment J-3 as low risk for the Risk/Sensitivity Level. Program office CORs will review labor category designations and indicate changes to the contractually designated default Risk/Sensitivity Level Designations as appropriate for their specific contracts or task orders. This would require a submission of a “Contractor Position Risk/Sensitivity Level Designation Record” form (FAA Form 1600-77).

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!