Security Notice Sample Clauses

Security Notice. Please be assured that Platinum Credit Uganda Limited is actively working to ensure minimum consequences for fraud. We invest heavily in fraud protection systems to protect you as customers. Should we notice any ‘irregular’ behavior in your account usage, we may give you a call. Please do not be alarmed. We have your best interest at heart. If you think your mobile phone is lost or stolen and if you notice any irregular transactions on your statements call us immediately on our Contact Centre number +000000000000.
AutoNDA by SimpleDocs
Security Notice. Software may include security features that End User can use, along with other security tools, to implement increased security in End User’s storage area network ("SAN"). However, use of the security features of the Software does not guarantee the security of End User’s SAN or overall network. There are numerous factors that affect the security of a SAN, including, without limitation, correct installation and setup of the security features of Software and all related requirements, correctly configured security policies, selection of hardware and software (including network security tools), correct installation, configuration, and maintenance of the hardware and software, the interoperability of the various components of End User’s SAN and End User’s network, and a physically and electronically secure operating environment. In addition, Software may utilize digital certificates in connection with its access control features. Although digital certificates are a useful authentication security measure that improves overall security, they do not guarantee authenticity or security. To help End User evaluate the digital certificate functionality of Software, End User can obtain details from the Certification Practices Statement, which is included with the documentation End User received with this product or which End User can view at xxxx://xxx.xxxxxxxxxxxxxxxxxxx.xxx/cps. In designing the security of End User’s SAN, it is End User’s responsibility to evaluate all of these factors to ensure End User’s SAN meets End User’s security requirements. End User’s experience may vary based on these and other factors. End User’s use of Software, including the digital certificates, is subject to and governed by the terms of this license agreement and to End User’s compliance with the policies and procedures for the use of the security features of Software and digital certificates, which may be made available to End User by Brocade from time to time. If Xxxxxxx becomes aware of a breach of the security of its digital certificate infrastructure, Brocade reserves the right to re-issue digital certificates. In that event, End User will be required to submit new certificate signing requests and install reissued certificates across End User’s SAN. End User should plan for any network disruption that this may cause. END USER ACKNOWLEDGES THAT END USER HAS ACCESS TO SUFFICIENT INFORMATION TO ENSURE THAT END USER CAN MAKE AN INFORMED DECISION AS TO THE EXTENT TO WHICH END USER CHOOS...
Security Notice. Company takes reasonable and customary security measures to protect the privacy and security of your Ag Data. In the event of a data breach, natural disaster, or other unforeseen event that causes your Ag Data to be deleted or compromised, Company will notify you when you log in, by email, or other method required by law.
Security Notice. To help protect our customers from security threats, FIRST STATE BANK utilizes the following approach, which you hereby agree to. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error.
Security Notice. To help protect our customers from security threats, Thrivent Federal Credit Union utilizes the following approach, to which you hereby agree. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error.
Security Notice. To help protect our customers from security threats, Xxxxxxx Bank utilizes the following approach, to which you hereby agree. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error.
Security Notice. Contractor is responsible for the security of all data and information provided to it by the State while any such data and information is in Contractor’s possession or control. Contractor shall comply, and shall cause its Subcontractors to comply, with the State’s Cyber Security Policies, which are attached as Exhibit H, State Cybersecurity Policies.
AutoNDA by SimpleDocs
Security Notice. To help protect our customers from security threats, we utilize the following approach, which you hereby agree to. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error. You acknowledge no list of security practices can be all inclusive and foolproof for preventing theft. We will do the following, as applicable: • Offer customer education dealing with identity theft, phishing, smishing and malware • Identification of customers when logging on will consist of multi-factor authentication that utilizes user IDs and passwords, plus either pictures and phrases/challenge questions. Bank of Labor reserves the right to modify the identification process from time to time to implement new measures that are recommended in the industry to combat new or increased threats. You are responsible to install, update, maintain and properly use industry standard security products that are appropriate for you, such as the following: • Desktop firewall used to prevent unauthorized access to your network • Updated anti-virus protection used to prevent your computer or other access device from being victimized by the latest viruses and Trojans • Updated anti-spyware protection used to prevent spyware from providing potential tracking information about your Web activities • Operating system and desktop applications updated with the latest patches when they are available, particularly when and if they apply to a known exploitable vulnerability • A product that indicates the Web site you are on, or an Internet browser that indicates the site name Bank of Labor will NEVER request personal information by email or text messaging including account numbers, passwords, personal identification information or any other confidential customer information. Fraudulent emails may be designed to appear as though they are originated by Bank of Labor. Do not respond to any email request asking for personal or confidential information and do not click any links listed on that e-mail. These communications are not from Bank of Labor! Never give out any information that the Bank already has if you are contacted by phone, text message, or email. If you contact us we may verify your information to confirm your identity but we will never contact you and ask for your debit/credit card number. If we need to contact you, it will always be done in a m...
Security Notice. To help protect our customers from security threats, the Bank utilizes the following approach, which you hereby agree to. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error.
Security Notice. To help protect our members from security threats, Family Security Credit Union utilizes the following approach, to which you hereby agree. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error.
Time is Money Join Law Insider Premium to draft better contracts faster.