Security Notice. Please be assured that Platinum Credit Uganda Limited is actively working to ensure minimum consequences for fraud. We invest heavily in fraud protection systems to protect you as customers. Should we notice any ‘irregular’ behavior in your account usage, we may give you a call. Please do not be alarmed. We have your best interest at heart. If you think your mobile phone is lost or stolen and if you notice any irregular transactions on your statements call us immediately on our Contact Centre number +000000000000.
Security Notice. Software may include security features that End User can use, along with other security tools, to implement increased security in End User’s network. However, use of the security features of the Software does not guarantee the security of End User’s overall network. There are numerous factors that affect the security of a network, including, without limitation, correct installation and setup of the security features of Software and all related requirements, correctly configured security policies, selection of hardware and software (including network security tools), correct installation, configuration, and maintenance of the hardware and software, the interoperability of the various components of End User’s network, and a physically and electronically secure operating environment. In addition, Software may utilize digital certificates in connection with its access control features. Although digital certificates are a useful authentication security measure that improves overall security, they do not guarantee authenticity or security. In designing the security of End User’s network, it is End User’s responsibility to evaluate all of these factors to ensure End User’s network meets End User’s security requirements. End User’s experience may vary based on these and other factors. End User’s use of Software, including the digital certificates, is subject to and governed by the terms of this Agreement and to End User’s compliance with the policies and procedures for the use of the security features of Software and digital certificates, which may be made available to End Users from time to time. If Broadcom becomes aware of a breach of the security of its digital certificate infrastructure, Broadcom reserves the right to re-issue digital certificates. In that event, End User will be required to submit new certificate signing requests and install reissued certificates across End User’s network. End User should plan for any network disruption that this may cause. END USER ACKNOWLEDGES THAT END USER HAS ACCESS TO SUFFICIENT INFORMATION TO ENSURE THAT END USER CAN MAKE AN INFORMED DECISION AS TO THE EXTENT TO WHICH END USER CHOOSES TO RELY ON DIGITAL CERTIFICATES AND OTHER SECURITY FEATURES IN SOFTWARE (“SECURITY”).
Security Notice. Company takes reasonable and customary security measures to protect the privacy and security of your Ag Data. In the event of a data breach, natural disaster, or other unforeseen event that causes your Ag Data to be deleted or compromised, Company will notify you when you log in, by email, or other method required by law.
Security Notice. To help protect our customers from security threats, FIRST STATE BANK utilizes the following approach, which you hereby agree to. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error.
Security Notice. To help protect our customers from security threats, Thrivent Federal Credit Union utilizes the following approach, to which you hereby agree. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error.
Security Notice. To help protect our customers from security threats, Xxxxxxx Bank utilizes the following approach, to which you hereby agree. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error.
Security Notice. Contractor is responsible for the security of all data and information provided to it by the State while any such data and information is in Contractor’s possession or control. Contractor shall comply, and shall cause its Subcontractors to comply, with the State’s Cyber Security Policies, which are attached as Exhibit H, State Cybersecurity Policies.
Security Notice. To help protect our customers from security threats, we utilize the following approach, which you hereby agree to. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error. You acknowledge no list of security practices can be all inclusive and foolproof for preventing theft. We will do the following, as applicable: • Offer customer education dealing with identity theft, phishing, smishing and malware • Identification of customers when logging on will consist of multi-factor authentication that utilizes user IDs and passwords, plus either pictures and phrases/challenge questions. Bank of Labor reserves the right to modify the identification process from time to time to implement new measures that are recommended in the industry to combat new or increased threats. You are responsible to install, update, maintain and properly use industry standard security products that are appropriate for you, such as the following: • Desktop firewall used to prevent unauthorized access to your network • Updated anti-virus protection used to prevent your computer or other access device from being victimized by the latest viruses and Trojans • Updated anti-spyware protection used to prevent spyware from providing potential tracking information about your Web activities • Operating system and desktop applications updated with the latest patches when they are available, particularly when and if they apply to a known exploitable vulnerability • A product that indicates the Web site you are on, or an Internet browser that indicates the site name Bank of Labor will NEVER request personal information by email or text messaging including account numbers, passwords, personal identification information or any other confidential customer information. Fraudulent emails may be designed to appear as though they are originated by Bank of Labor. Do not respond to any email request asking for personal or confidential information and do not click any links listed on that e-mail. These communications are not from Bank of Labor! Never give out any information that the Bank already has if you are contacted by phone, text message, or email. If you contact us we may verify your information to confirm your identity but we will never contact you and ask for your debit/credit card number. If we need to contact you, it will always be done in a m...
Security Notice. User Account, Password, and Security The User acknowledges and agrees that: The User is responsible for any and all activities that occur under the User’s account and for ensuring that all such use complies fully with the provisions of this Agreement. The User is responsible for protecting the confidentiality of the User’s password and account information. The User must notify Owl Software immediately of any unauthorized use of the User’s account or any other breach of security. Owl Software is not liable for any loss that the User may incur as a result of someone else using the User’s password or account, either with or without the User’s knowledge, and may be held personally liable for any losses incurred by Owl Software. The User may not use anyone else’s account at any time, without the permission of the account holder. If the username and/or password have become compromised, contact Owl Software immediately by email at xxxx@xxxxxxx.xxx or call 000-000-0000 to obtain a new one.
Security Notice. To help protect our customers from security threats, the Bank utilizes the following approach, which you hereby agree to. You acknowledge that these procedures are a commercially reasonable method of providing security against unauthorized payment orders or other transactions and that these procedures are not for the detection of error.