Security of Data Transmission and Storage Sample Clauses

Security of Data Transmission and Storage. Electronic communications using the Service may not always be encrypted. You acknowledge that there is a risk that data, including email, electronic communications, and personal data, may be accessed by unauthorized third parties when communicated between you and G.Round or between you and other parties. Additionally, your communications and Content on the Service may be publicly available to other parties.
AutoNDA by SimpleDocs
Security of Data Transmission and Storage. You assume all risk that any information you download and store in your Financial Management Software may be accessed by unauthorized third parties and once downloaded, we are no longer responsible for the security and confidentiality of that information, nor are we responsible for the security and confidentiality of the information if you: (i) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your Financial Management Software. Any information that you download is done at your own risk and you are solely responsible for any damage that might occur to the computer (or other electronic device) to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage in a computer or Device.
Security of Data Transmission and Storage. You expressly acknowledge that any wireless access to your accounts may not be secure and, as such, you assume the risk associated with unauthorized access to the Mobile Banking Services and any information contained therein, resulting from such wireless connectivity. You assume all risk that any information you download or otherwise stored on your Wireless Access Device may be accessed by unauthorized third parties. Without limiting the foregoing, you acknowledge that your Wireless Access Device may become subject to unauthorized tracking, "hacking" or other manipulation by spyware, viruses or other malicious code ("malware") We are not responsible for advising you of the existence or potential effect of any malware. Your use of your hardware and software is at your own risk. We are not responsible for the security and confidentiality of information when you:
Security of Data Transmission and Storage. Electronic communications using the Application may not always be encrypted. You acknowledge that there is a risk that data, including email, electronic communications, and personal data, may be accessed by unauthorized third parties when communicated between you and Owner or between you and any third-party. Owner and its affiliates, and agents are permitted, but not obligated, to review or retain your Communications. Owner may monitor your Communications to evaluate the quality of service you receive, your compliance with the Agreement, the security of the Application, or for other reasons. You agree that such monitoring activities will not entitle you to any cause of action or other right with respect to the manner in which Owner or its affiliates or agents monitor your Communications and enforces or fails to enforce the terms of the Agreement. In no event will Owner or any of its affiliates or agents be liable for any costs, damages, expenses, or any other liabilities incurred by you as a result of monitoring activities by Owner or its affiliates or agents.
Security of Data Transmission and Storage. You expressly acknowledge that any wireless access to your accounts may not be secure and, as such, you assume the risk associated with unauthorized access to the TransferNow® Services and any information contained therein, resulting from such wireless connectivity. You assume all risk that any information you download or otherwise stored on your Wireless Access Device may be accessed by unauthorized third parties. Without limiting the foregoing, you acknowledge that your Wireless Access Device may become subject to unauthorized tracking, "hacking" or other manipulation by spyware, viruses or other malicious code ("malware"). We are not responsible for advising you of the existence or potential effect of any malware. Your use of your hardware and software is at your own risk. We are not responsible for the security and confidentiality of information when you: (i) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your Wireless Access Device. You agree that any account information that you download is done at your own risk, and you are solely responsible for any damage that might occur to the electronic device to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage on an electronic device. YOU AGREE TO TERMINATE THE TRANSFERNOW® SERVICE, OR DISABLE YOUR REGISTERED WIRELESS ACCESS DEVICE FROM THE TRANSFERNOW® SERVICE IMMEDIATELY IN THE EVENT YOUR REGISTERED DEVICE BECOMES LOST, STOLEN OR IS NO LONGER IN USE BY YOU. Stop Payment Services You may request a stop payment on a check issued on your Account(s) by completing the form presented as part of the check stop payment Service and submitting all the required information to us (“Check Stop Payment”). Check Stop Payments must be received by us in sufficient time prior to presentment of the relevant item for payment that we have a reasonable opportunity to act on the request. All Check Stop Payment orders, renewals, and revocations of stop orders will be subject to our current policy on stop payment orders. For significant or material items, contact us by coming to one of our branches or by telephone in addition to using the Services for Check Stop Payment. You are responsible for reviewing all information available to you to determine whether the check has already been ...
Security of Data Transmission and Storage. You expressly acknowledge that any wireless access to your accounts may not be secure and, as such, you assume the risk associated with unauthorized access to the Services and any information contained therein, resulting from such wireless connectivity. You assume all risk that any information you download or otherwise store on your wireless access device may be accessed by unauthorized third parties. We are not responsible for the security and confidentiality of information when you: (i) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your wireless access device. You agree that any account information that you download is done at your own risk and you are solely responsible for any damage that might occur to the electronic device to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage on an electronic device.
Security of Data Transmission and Storage. 1. You agree and understand that: • you assume all risk that any Eligible Account information you download and store in your Financial Management Software may be accessed by unauthorized third parties; • if you send the information in a manner that is not secure, or if you take the Eligible Account information out of our secure systems by downloading it, we are no longer responsible for the security and confidentiality of that information, and that the responsibility is now yours (or may be shared with others, such as your Financial Management Software provider); and • we are not responsible for the security and confidentiality of the Eligible Account information if you: (a) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (b) allow other persons access to your Financial Management Software.
AutoNDA by SimpleDocs
Security of Data Transmission and Storage. Electronic communications using the Application may not always be encrypted. You acknowledge that there is a risk that data, including email, electronic communications, and personal data, may be accessed by unauthorized third parties when communicated between you and Photage LLC or between you and other parties. You also acknowledge that the internet and mobile phone networks may be subject to breaches of security and that the submission of Content or other information may not be secure. As between you and Photage LLC, any Content will be non- confidential and non-proprietary and Photage LLC will not be liable for any use or disclosure of Content. You acknowledge and agree that your relationship with Photage LLC is not a confidential, fiduciary, or other type of special relationship, and your decision to submit any Content does not place Photage LLC in a position different from that held by members of the general public, including with regard to your Content. None of your Content will be subject to any obligation of confidence on the part of Photage LLC, and Photage LLC will not be liable for any use or disclosure of any Content you provide. Photage LLC and its affiliates, and agents are permitted, but not obligated, to review or retain your Communications. Photage LLC may monitor your Communications to evaluate the quality of service you receive, your compliance with the Agreement, the security of the Application, or for other reasons. You agree that such monitoring activities will not entitle you to any cause of action or other right with respect to the manner in which Photage LLC or its affiliates or agents monitor your Communications and enforces or fails to enforce the terms of the Agreement. In no event will Photage LLC or any of its affiliates or agents be liable for any costs, damages, expenses, or any other liabilities incurred by you as a result of monitoring activities by Photage LLC or its affiliates or agents.

Related to Security of Data Transmission and Storage

  • Transmission of Data Customer understands that the technical processing and transmission of Customer’s Electronic Communications is fundamentally necessary to use of the Cloud Service. Customer is responsible for securing DSL, cable or another high speed Internet connection and up-to-date “browser” software in order to utilize the Cloud Service. Customer expressly consents to Oracle’s interception and storage of Electronic Communications and/or Customer Data as needed to provide the Services hereunder, and Customer acknowledges and understands that Customer’s Electronic Communications will involve transmission over the Internet, and over various networks, only part of which may be owned and/or operated by Oracle. Customer further acknowledges and understands that Electronic Communications may be accessed by unauthorized parties when communicated across the Internet, network communications facilities, telephone or other electronic means. Without limiting Oracle’s applicable obligations under the Security or Confidentiality Sections of this Agreement, Oracle is not responsible for any Electronic Communications and/or Customer Data which are delayed, lost, altered, intercepted or stored during the transmission of any data whatsoever across networks not owned and/or operated by Oracle, including, but not limited to, the Internet and Customer’s local network.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

Time is Money Join Law Insider Premium to draft better contracts faster.