Security of Data Transmission and Storage Sample Clauses

Security of Data Transmission and Storage. Electronic communications using the Service may not always be encrypted. You acknowledge that there is a risk that data, including email, electronic communications, and personal data, may be accessed by unauthorized third parties when communicated between you and G.Round or between you and other parties. Additionally, your communications and Content on the Service may be publicly available to other parties.
AutoNDA by SimpleDocs
Security of Data Transmission and Storage. You assume all risk that any information you download and store in your Financial Management Software may be accessed by unauthorized third parties and once downloaded, we are no longer responsible for the security and confidentiality of that information, nor are we responsible for the security and confidentiality of the information if you: (i) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your Financial Management Software. Any information that you download is done at your own risk and you are solely responsible for any damage that might occur to the computer (or other electronic device) to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage in a computer or Device.
Security of Data Transmission and Storage. You expressly acknowledge that any wireless access to your accounts may not be secure and, as such, you assume the risk associated with unauthorized access to the Mobile Banking Services and any information contained therein, resulting from such wireless connectivity. You assume all risk that any information you download or otherwise stored on your Wireless Access Device may be accessed by unauthorized third parties. Without limiting the foregoing, you acknowledge that your Wireless Access Device may become subject to unauthorized tracking, "hacking" or other manipulation by spyware, viruses or other malicious code ("malware") We are not responsible for advising you of the existence or potential effect of any malware. Your use of your hardware and software is at your own risk.
Security of Data Transmission and Storage. Electronic communications using the Application may not always be encrypted. You acknowledge that there is a risk that data, including email, electronic communications, and personal data, may be accessed by unauthorized third parties when communicated between you and Photage LLC or between you and other parties. You also acknowledge that the internet and mobile phone networks may be subject to breaches of security and that the submission of Content or other information may not be secure. As between you and Photage LLC, any Content will be non- confidential and non-proprietary and Photage LLC will not be liable for any use or disclosure of Content. You acknowledge and agree that your relationship with Photage LLC is not a confidential, fiduciary, or other type of special relationship, and your decision to submit any Content does not place Photage LLC in a position different from that held by members of the general public, including with regard to your Content. None of your Content will be subject to any obligation of confidence on the part of Photage LLC, and Photage LLC will not be liable for any use or disclosure of any Content you provide. Photage LLC and its affiliates, and agents are permitted, but not obligated, to review or retain your Communications. Photage LLC may monitor your Communications to evaluate the quality of service you receive, your compliance with the Agreement, the security of the Application, or for other reasons. You agree that such monitoring activities will not entitle you to any cause of action or other right with respect to the manner in which Photage LLC or its affiliates or agents monitor your Communications and enforces or fails to enforce the terms of the Agreement. In no event will Photage LLC or any of its affiliates or agents be liable for any costs, damages, expenses, or any other liabilities incurred by you as a result of monitoring activities by Photage LLC or its affiliates or agents.
Security of Data Transmission and Storage. You assume all risk that any information you download and store in your Financial Management Software may be accessed by unauthorized third parties and once downloaded, we are no longer responsible for the security and confidentiality of that information, nor are we responsible for the security and confidentiality of the information if you: (i) use wireless connections to download your Account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your Financial Management Software. Any information that you download is done at your own risk and you are solely responsible for any damage that might occur to the computer (or other electronic device) to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage in a computer or Device. Transfers Scheduled and recurring transfers can be made from a linked Seacoast National Bank checking, savings, or money market Account to most linked Seacoast National Bank Accounts, including loan Accounts. Transfers can be made from a linked Seacoast National Bank checking, savings, money market Account to most personal or business Accounts. You may make transfers from a line of credit Account to a deposit Account, buy you may not make a transfer from one line of credit to another line of credit. You also may, with loan officer approval, make draws on certain other loans to a deposit Account, but you may not make a draw on a loan to credit another loan. Transfers from a deposit Account are immediately reflected in the Account’s available balance on the date of the transfer. Transfers scheduled for a weekend or a non-Bank Business Day will be processed on the prior Bank Business Day. All other scheduled and recurring transfers will be processed from the funding Account at the beginning of the Bank Business Day requested. Funds transferred to a deposit Account prior to 7:00 PM ET on a Bank Business Day will appear with the same day’s date in the deposit Account transaction history. Transfers to a Seacoast National Bank deposit Account made after 7:00 PM ET as described above on a Bank Business Day but before 11:59 PM ET may be included in the balance we use to pay transactions that night. This process may impact when fees apply to your Account. Please note that although these transfers are included in the balance we use to pay transactions that n...
Security of Data Transmission and Storage. Electronic communications using the Application may not always be encrypted. You acknowledge that there is a risk that data, including email, electronic communications, and personal data, may be accessed by unauthorized third parties when communicated between you and Owner or between you and any third-party. Owner and its affiliates, and agents are permitted, but not obligated, to review or retain your Communications. Owner may monitor your Communications to evaluate the quality of service you receive, your compliance with the Agreement, the security of the Application, or for other reasons. You agree that such monitoring activities will not entitle you to any cause of action or other right with respect to the manner in which Owner or its affiliates or agents monitor your Communications and enforces or fails to enforce the terms of the Agreement. In no event will Owner or any of its affiliates or agents be liable for any costs, damages, expenses, or any other liabilities incurred by you as a result of monitoring activities by Owner or its affiliates or agents.
Security of Data Transmission and Storage. 1. You agree and understand that: • you assume all risk that any Eligible Account information you download and store in your Financial Management Software may be accessed by unauthorized third parties; • if you send the information in a manner that is not secure, or if you take the Eligible Account information out of our secure systems by downloading it, we are no longer responsible for the security and confidentiality of that information, and that the responsibility is now yours (or may be shared with others, such as your Financial Management Software provider); and • we are not responsible for the security and confidentiality of the Eligible Account information if you: (a) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (b) allow other persons access to your Financial Management Software. 2. You agree that any Eligible Account information that you download is done at your own risk and you are solely responsible for any damage that might occur to the computer (or other electronic device) to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage in a computer or other electronic device.
AutoNDA by SimpleDocs
Security of Data Transmission and Storage. You expressly acknowledge that any wireless access to your accounts may not be secure and, as such, you assume the risk associated with unauthorized access to the Services and any information contained therein, resulting from such wireless connectivity. You assume all risk that any information you download or otherwise store on your wireless access device may be accessed by unauthorized third parties. We are not responsible for the security and confidentiality of information when you: (i) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your wireless access device. You agree that any account information that you download is done at your own risk and you are solely responsible for any damage that might occur to the electronic device to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage on an electronic device.

Related to Security of Data Transmission and Storage

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • ACCESS TO SECURITY LOGS AND REPORTS Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

  • Transmission of Data Customer understands that the technical processing and transmission of Customer’s Electronic Communications is fundamentally necessary to use of the Cloud Service. Customer is responsible for securing DSL, cable or another high speed Internet connection and up-to-date “browser” software in order to utilize the Cloud Service. Customer expressly consents to Oracle’s interception and storage of Electronic Communications and/or Customer Data as needed to provide the Services hereunder, and Customer acknowledges and understands that Customer’s Electronic Communications will involve transmission over the Internet, and over various networks, only part of which may be owned and/or operated by Oracle. Customer further acknowledges and understands that Electronic Communications may be accessed by unauthorized parties when communicated across the Internet, network communications facilities, telephone or other electronic means. Without limiting Oracle’s applicable obligations under the Security or Confidentiality Sections of this Agreement, Oracle is not responsible for any Electronic Communications and/or Customer Data which are delayed, lost, altered, intercepted or stored during the transmission of any data whatsoever across networks not owned and/or operated by Oracle, including, but not limited to, the Internet and Customer’s local network.

  • Connecting Transmission Owner’s Attachment Facilities Construction The Connecting Transmission Owner’s Attachment Facilities shall be designed and constructed in accordance with Good Utility Practice. Upon request, within one hundred twenty (120) Calendar Days after the Commercial Operation Date, unless the Connecting Transmission Owner and Developer agree on another mutually acceptable deadline, the Connecting Transmission Owner shall deliver to the Developer “as-built” drawings, relay diagrams, information and documents for the Connecting Transmission Owner’s Attachment Facilities set forth in Appendix A. The Connecting Transmission Owner [shall/shall not] transfer operational control of the Connecting Transmission Owner’s Attachment Facilities and Stand Alone System Upgrade Facilities to the NYISO upon completion of such facilities.

  • Information Submission by Connecting Transmission Owner The initial information submission by Connecting Transmission Owner shall occur no later than one hundred eighty (180) Calendar Days prior to Trial Operation and shall include New York State Transmission System information necessary to allow the Developer to select equipment and meet any system protection and stability requirements, unless otherwise mutually agreed to by the Developer and Connecting Transmission Owner. On a monthly basis Connecting Transmission Owner shall provide Developer and NYISO a status report on the construction and installation of Connecting Transmission Owner’s Attachment Facilities and System Upgrade Facilities and System Deliverability Upgrades, including, but not limited to, the following information: (1) progress to date; (2) a description of the activities since the last report; (3) a description of the action items for the next period; and (4) the delivery status of equipment ordered.

  • Data Transmission Control Except as necessary for the provision of the Cloud Services in accordance with the Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at SAP to provide the agreed-upon service levels (for example, encryption and lead-lined containers).

  • Connecting Transmission Owner’s Attachment Facilities Connecting Transmission Owner shall design, procure, construct, install, own and/or control the Connecting Transmission Owner’s Attachment Facilities described in Appendix A hereto, at the sole expense of the Developer.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Documents To the extent applicable to this Agreement, in accordance with §1861(v)(I)(i) of the Social Security Act (42 USC §1395x) as amended, and the provisions of 42 CFR §420.300 et seq, Contractor will allow, during and for a period of not less than four (4) years after the expiration or termination of this Agreement, access to this Agreement and its books, documents, and records; and contracts between Contractor and its subcontractors or related organizations, including books, documents and records relating to same, by the Comptroller General of the United States, the U.S. Department of Health and Human Services and their duly authorized representatives.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!