Security Elements Sample Clauses

Security Elements. The Solution contains the following security elements:
AutoNDA by SimpleDocs
Security Elements. 3.1.1. The User performs Operations pursuant to the authorisation granted by the Customer under the Electronic Services agreement concluded between the Customer and the Bank. The Customer and the User may coincide or differ. 3.1.2. The User must use the Security Elements personally. 3.1.3. The Bank must identify the User by means of the Security Elements. 3.1.4. The User must confirm the Operations by means of the Security Elements or other methods accepted by the Bank (e.g. by clicking the button in Danske eBank etc.). 3.1.5. The Bank is entitled to determine which of the Security Elements must be used to confirm the Operations. The Security Elements acceptable to the Bank are published on the Bank’s website and/or in the agreement regulating the relevant Operation and/or in 3.1.6. At the signing of the Agreement, the Bank will provide the User with the User ID, which must be used to log in to Danske eBank. 3.1.7. At the User’s request, the Bank may provide the User with the PIN Generator. Instructions on how to use the PIN Generator are available on the Bank‘s website. 3.1.8. The PIN Generator is protected by a PIN code. Having turned on the PIN Generator for the first time, the User must create a four- digit code that must be entered every time the PIN Generator is used. If the User enters a wrong code multiple times, the PIN Generator will be blocked. In order to unblock the PIN Generator, the User must visit the Bank’s place of Service and present the PIN Generator. 3.1.9. The User may obtain the Electronic Signature from the certification services provider or mobile network operator, which provides a mobile Electronic Signature service.
Security Elements. You will act on instructions received through Online Banking and/or Mobile Banking under my unique User ID and Password, the two elements required for Online Banking and/or Mobile Banking access to my accounts. My User ID and Password are established for security purposes. I understand that I cannot use the Service without a User ID and Password. I AGREE THAT USE OF THE USER ID AND PASSWORD CONSTITUTES A REASONABLE

Related to Security Elements

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § 00-00-000 et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Arrangements Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!