Security of Data Transmission and Storage Sample Clauses

Security of Data Transmission and Storage. Electronic communications using the Service may not always be encrypted. You acknowledge that there is a risk that data, including email, electronic communications, and personal data, may be accessed by unauthorized third parties when communicated between you and G.Round or between you and other parties. Additionally, your communications and Content on the Service may be publicly available to other parties.
AutoNDA by SimpleDocs
Security of Data Transmission and Storage. You assume all risk that any information you download and store in your Financial Management Software may be accessed by unauthorized third parties and once downloaded, we are no longer responsible for the security and confidentiality of that information, nor are we responsible for the security and confidentiality of the information if you: (i) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your Financial Management Software. Any information that you download is done at your own risk and you are solely responsible for any damage that might occur to the computer (or other electronic device) to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage in a computer or Device.
Security of Data Transmission and Storage. 1. You agree and understand that: • you assume all risk that any Eligible Account information you download and store in your Financial Management Software may be accessed by unauthorized third parties; • if you send the information in a manner that is not secure, or if you take the Eligible Account information out of our secure systems by downloading it, we are no longer responsible for the security and confidentiality of that information, and that the responsibility is now yours (or may be shared with others, such as your Financial Management Software provider); and • we are not responsible for the security and confidentiality of the Eligible Account information if you: (a) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (b) allow other persons access to your Financial Management Software.
Security of Data Transmission and Storage. Electronic communications using the Application may not always be encrypted. You acknowledge that there is a risk that data, including email, electronic communications, and personal data, may be accessed by unauthorized third parties when communicated between you and Owner or between you and any third-party. Owner and its affiliates, and agents are permitted, but not obligated, to review or retain your Communications. Owner may monitor your Communications to evaluate the quality of service you receive, your compliance with the Agreement, the security of the Application, or for other reasons. You agree that such monitoring activities will not entitle you to any cause of action or other right with respect to the manner in which Owner or its affiliates or agents monitor your Communications and enforces or fails to enforce the terms of the Agreement. In no event will Owner or any of its affiliates or agents be liable for any costs, damages, expenses, or any other liabilities incurred by you as a result of monitoring activities by Owner or its affiliates or agents.
Security of Data Transmission and Storage. Electronic communications using the Application may not always be encrypted. You acknowledge that there is a risk that data, including email, electronic communications, and personal data, may be accessed by unauthorized third parties when communicated between you and Photage LLC or between you and other parties. You also acknowledge that the internet and mobile phone networks may be subject to breaches of security and that the submission of Content or other information may not be secure. As between you and Photage LLC, any Content will be non- confidential and non-proprietary and Photage LLC will not be liable for any use or disclosure of Content. You acknowledge and agree that your relationship with Photage LLC is not a confidential, fiduciary, or other type of special relationship, and your decision to submit any Content does not place Photage LLC in a position different from that held by members of the general public, including with regard to your Content. None of your Content will be subject to any obligation of confidence on the part of Photage LLC, and Photage LLC will not be liable for any use or disclosure of any Content you provide. Photage LLC and its affiliates, and agents are permitted, but not obligated, to review or retain your Communications. Photage LLC may monitor your Communications to evaluate the quality of service you receive, your compliance with the Agreement, the security of the Application, or for other reasons. You agree that such monitoring activities will not entitle you to any cause of action or other right with respect to the manner in which Photage LLC or its affiliates or agents monitor your Communications and enforces or fails to enforce the terms of the Agreement. In no event will Photage LLC or any of its affiliates or agents be liable for any costs, damages, expenses, or any other liabilities incurred by you as a result of monitoring activities by Photage LLC or its affiliates or agents.
Security of Data Transmission and Storage. You assume all risk that any information you download and store in your Financial Management Software may be accessed by unauthorized third parties and once downloaded, we are no longer responsible for the security and confidentiality of that information, nor are we responsible for the security and confidentiality of the information if you: (i) use wireless connections to download your Account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your Financial Management Software. Any information that you download is done at your own risk and you are solely responsible for any damage that might occur to the computer (or other electronic device) to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage in a computer or Device. Transfers Scheduled and recurring transfers can be made from a linked Seacoast National Bank checking, savings, or money market Account to most linked Seacoast National Bank Accounts, including loan Accounts. Transfers can be made from a linked Seacoast National Bank checking, savings, money market Account to most personal or business Accounts. You may make transfers from a line of credit Account to a deposit Account, buy you may not make a transfer from one line of credit to another line of credit. You also may, with loan officer approval, make draws on certain other loans to a deposit Account, but you may not make a draw on a loan to credit another loan. Transfers from a deposit Account are immediately reflected in the Account’s available balance on the date of the transfer. Transfers scheduled for a weekend or a non-Bank Business Day will be processed on the prior Bank Business Day. All other scheduled and recurring transfers will be processed from the funding Account at the beginning of the Bank Business Day requested. Funds transferred to a deposit Account prior to 7:00 PM ET on a Bank Business Day will appear with the same day’s date in the deposit Account transaction history. Transfers to a Seacoast National Bank deposit Account made after 7:00 PM ET as described above on a Bank Business Day but before 11:59 PM ET may be included in the balance we use to pay transactions that night. This process may impact when fees apply to your Account. Please note that although these transfers are included in the balance we use to pay transactions that n...
Security of Data Transmission and Storage. You expressly acknowledge that any wireless access to your accounts may not be secure and, as such, you assume the risk associated with unauthorized access to the Mobile Banking Services and any information contained therein, resulting from such wireless connectivity. You assume all risk that any information you download or otherwise stored on your Wireless Access Device may be accessed by unauthorized third parties. Without limiting the foregoing, you acknowledge that your Wireless Access Device may become subject to unauthorized tracking, "hacking" or other manipulation by spyware, viruses or other malicious code ("malware") We are not responsible for advising you of the existence or potential effect of any malware. Your use of your hardware and software is at your own risk. We are not responsible for the security and confidentiality of information when you:
AutoNDA by SimpleDocs
Security of Data Transmission and Storage. You expressly acknowledge that any wireless access to your accounts may not be secure and, as such, you assume the risk associated with unauthorized access to the Services and any information contained therein, resulting from such wireless connectivity. You assume all risk that any information you download or otherwise store on your wireless access device may be accessed by unauthorized third parties. We are not responsible for the security and confidentiality of information when you: (i) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your wireless access device. You agree that any account information that you download is done at your own risk and you are solely responsible for any damage that might occur to the electronic device to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage on an electronic device.
Security of Data Transmission and Storage. You expressly acknowledge that any wireless access to your accounts may not be secure and, as such, you assume the risk associated with unauthorized access to the TransferNow® Services and any information contained therein, resulting from such wireless connectivity. You assume all risk that any information you download or otherwise stored on your Wireless Access Device may be accessed by unauthorized third parties. Without limiting the foregoing, you acknowledge that your Wireless Access Device may become subject to unauthorized tracking, "hacking" or other manipulation by spyware, viruses or other malicious code ("malware"). We are not responsible for advising you of the existence or potential effect of any malware. Your use of your hardware and software is at your own risk. We are not responsible for the security and confidentiality of information when you: (i) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your Wireless Access Device. You agree that any account information that you download is done at your own risk, and you are solely responsible for any damage that might occur to the electronic device to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage on an electronic device. YOU AGREE TO TERMINATE THE TRANSFERNOW® SERVICE, OR DISABLE YOUR REGISTERED WIRELESS ACCESS DEVICE FROM THE TRANSFERNOW® SERVICE IMMEDIATELY IN THE EVENT YOUR REGISTERED DEVICE BECOMES LOST, STOLEN OR IS NO LONGER IN USE BY YOU. Stop Payment Services You may request a stop payment on a check issued on your Account(s) by completing the form presented as part of the check stop payment Service and submitting all the required information to us (“Check Stop Payment”). Check Stop Payments must be received by us in sufficient time prior to presentment of the relevant item for payment that we have a reasonable opportunity to act on the request. All Check Stop Payment orders, renewals, and revocations of stop orders will be subject to our current policy on stop payment orders. For significant or material items, contact us by coming to one of our branches or by telephone in addition to using the Services for Check Stop Payment. You are responsible for reviewing all information available to you to determine whether the check has already been ...

Related to Security of Data Transmission and Storage

  • Data Transmission The procedures for transmitting load obligation data to PJM for DS Supplier’s DS Load shall be as set forth by PJM.

  • Transmission of Data Customer understands that the technical processing and transmission of Customer’s Electronic Communications is fundamentally necessary to use of the Cloud Service. Customer is responsible for securing DSL, cable or another high speed Internet connection and up-to-date “browser” software in order to utilize the Cloud Service. Customer expressly consents to Oracle’s interception and storage of Electronic Communications and/or Customer Data as needed to provide the Services hereunder, and Customer acknowledges and understands that Customer’s Electronic Communications will involve transmission over the Internet, and over various networks, only part of which may be owned and/or operated by Oracle. Customer further acknowledges and understands that Electronic Communications may be accessed by unauthorized parties when communicated across the Internet, network communications facilities, telephone or other electronic means. Without limiting Oracle’s applicable obligations under the Security or Confidentiality Sections of this Agreement, Oracle is not responsible for any Electronic Communications and/or Customer Data which are delayed, lost, altered, intercepted or stored during the transmission of any data whatsoever across networks not owned and/or operated by Oracle, including, but not limited to, the Internet and Customer’s local network.

  • Connecting Transmission Owner’s Attachment Facilities Construction The Connecting Transmission Owner’s Attachment Facilities shall be designed and constructed in accordance with Good Utility Practice. Upon request, within one hundred twenty (120) Calendar Days after the Commercial Operation Date, unless the Connecting Transmission Owner and Developer agree on another mutually acceptable deadline, the Connecting Transmission Owner shall deliver to the Developer “as-built” drawings, relay diagrams, information and documents for the Connecting Transmission Owner’s Attachment Facilities set forth in Appendix A. The Connecting Transmission Owner [shall/shall not] transfer operational control of the Connecting Transmission Owner’s Attachment Facilities and Stand Alone System Upgrade Facilities to the NYISO upon completion of such facilities.

  • Information Submission by Connecting Transmission Owner The initial information submission by Connecting Transmission Owner shall occur no later than one hundred eighty (180) Calendar Days prior to Trial Operation and shall include New York State Transmission System information necessary to allow the Developer to select equipment and meet any system protection and stability requirements, unless otherwise mutually agreed to by the Developer and Connecting Transmission Owner. On a monthly basis Connecting Transmission Owner shall provide Developer and NYISO a status report on the construction and installation of Connecting Transmission Owner’s Attachment Facilities and System Upgrade Facilities and System Deliverability Upgrades, including, but not limited to, the following information: (1) progress to date; (2) a description of the activities since the last report; (3) a description of the action items for the next period; and (4) the delivery status of equipment ordered.

  • Use of State Facilities Resources and Equipment a. Meeting Space and Facilities. The Employer’s campuses and facilities may be used by the Union to hold meetings subject to the University’s policy and availability of the space. The Employer may provide private space for stewards and/or Union representatives to meet in confidence with those they represent on a space available basis. Staff representatives may reserve and utilize meeting rooms in accordance with University policy and procedure. Such requests will be subject to availability and all applicable fees.

  • Connecting Transmission Owner’s Attachment Facilities Connecting Transmission Owner shall design, procure, construct, install, own and/or control the Connecting Transmission Owner’s Attachment Facilities described in Appendix A hereto, at the sole expense of the Developer.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Interconnection Customer’s Interconnection Facilities Construction The Interconnection Customer’s Interconnection Facilities shall be designed and constructed in accordance with Good Utility Practice. Within one hundred twenty (120) Calendar Days after the Commercial Operation Date, unless the Participating TO and Interconnection Customer agree on another mutually acceptable deadline, the Interconnection Customer shall deliver to the Participating TO and CAISO “as-built” drawings, information and documents for the Interconnection Customer’s Interconnection Facilities and the Electric Generating Unit(s), such as: a one-line diagram, a site plan showing the Large Generating Facility and the Interconnection Customer’s Interconnection Facilities, plan and elevation drawings showing the layout of the Interconnection Customer’s Interconnection Facilities, a relay functional diagram, relaying AC and DC schematic wiring diagrams and relay settings for all facilities associated with the Interconnection Customer's step-up transformers, the facilities connecting the Large Generating Facility to the step-up transformers and the Interconnection Customer’s Interconnection Facilities, and the impedances (determined by factory tests) for the associated step-up transformers and the Electric Generating Units. The Interconnection Customer shall provide the Participating TO and the CAISO specifications for the excitation system, automatic voltage regulator, Large Generating Facility control and protection settings, transformer tap settings, and communications, if applicable. Any deviations from the relay settings, machine specifications, and other specifications originally submitted by the Interconnection Customer shall be assessed by the Participating TO and the CAISO pursuant to the appropriate provisions of this LGIA and the LGIP.

  • Developer and Connecting Transmission Owner Notice Developer and Connecting Transmission Owner shall each notify the other Party, first orally and then in writing, of the release of any Hazardous Substances, any asbestos or lead abatement activities, or any type of remediation activities related to the Large Generating Facility or the Attachment Facilities, each of which may reasonably be expected to affect the other Party. The notifying Party shall: (i) provide the notice as soon as practicable, provided such Party makes a good faith effort to provide the notice no later than twenty-four hours after such Party becomes aware of the occurrence; and (ii) promptly furnish to the other Party copies of any publicly available reports filed with any Governmental Authorities addressing such events.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!