Security of Password/Access Code Sample Clauses

Security of Password/Access Code. Any password or access code (“Password”) that you select is foryour security purposes. The Password is confidential and should not be disclosed to third parties or recorded. You are responsible for safekeeping your Password. You agree not to disclose or otherwise make your Password available to anyone not authorized to sign on your accounts. If you authorize anyone to have or use your Password, you understand that person may use the Online Banking or Mobile Banking service to review all your account information and make account transactions. Also, you are responsible for all xxxx payments, transfers, or other transactions you authorize using Online or Mobile Banking. If you permit other persons to use your personal computer, Mobile Device and Password or any other means to access Online and Mobile Banking and Xxxx Pay services, you are fully responsible for any transactions they authorize. Therefore, we are entitled to act on transaction instructions received using your Password and you agree that the use of your access device or Password will have the same effect as your signature authorizing transactions. For anyone you authorize to use your Password in any manner, that authority will be considered unlimited in amount and manner until you specifically revoke such authority by notifying theCredit Union in writing and changing your Password immediately. You are responsible for any transactions made by such persons until you notify us in writing that transactions and access by that person are no longer authorized,and your PIN is changed. If you fail to maintain or change the security of your Password and the Credit Union suffers a loss, we may terminate your electronic funds transfer and account services immediately.
AutoNDA by SimpleDocs
Security of Password/Access Code. Any password, personal identification number (PIN), or access code (“Password”) that you select for any of our services is for your security purposes. The Password is confidential and should not be disclosed to third parties or recorded. You are responsible for safekeeping your Password. You agree not to disclose or otherwise make your Password available to anyone not authorized to sign on your accounts. If you authorize anyone to have or use your Password, you understand that person may use P2P Express service to make account transactions. If you permit other persons to use your personal computer, Mobile Device and Password or other means to access Mobile Banking, you are responsible for any transactions they authorize. Therefore, we are entitled to act on transaction instructions received using your Password and you agree that the use of your Password will have the same effect as your signature authorizing transactions. For anyone you authorize to use your Password in any manner, that authority will be considered unlimited in amount and manner until you specifically revoke such authority by notifying the Credit Union and changing your Password immediately. You are responsible for any transactions made by such persons until you notify us that transactions and access by that person are no longer authorized and your PIN is changed. If you fail to maintain or change the security of your Password and the Credit Union suffers a loss, we may terminate your electronic funds transfer and account services immediately.
Security of Password/Access Code. Any password or access code (“Password”) that you select is for your security purposes. The Password is confidential and should not be disclosed to third parties or recorded. You are responsible for safekeeping your Password. You agree not to disclose or otherwise make your Password available to anyone not authorized to sign on your accounts. If you authorize anyone to have or use your Password, you understand that person may use the Online Banking or Mobile Banking service to review all of your account information and make account transactions. Also, you are responsible for all bill payments, transfers or other transactions you authorize using Online or Mobile Banking. If you permit other persons to use your personal computer, Mobile Device and Password or other means to access Mobile Banking, you are responsible for any transactions they authorize. Therefore, we are entitled to act on transaction instructions received using your Password and you agree that the use of your Password will have the same effect as your signature authorizing transactions. For anyone you authorize to use your Password in any manner, that authority will be considered unlimited in amount and manner until you specifically revoke such authority by notifying the Credit Union and changing your Password immediately. You are responsible for any transactions made by such persons until you notify us that transactions and access by that person are no longer authorized and your PIN is changed. If you fail to maintain or change the security of your Password and the Credit Union suffers a loss, we may terminate your electronic funds transfer and account services immediately.
Security of Password/Access Code. Any password or access code (“password”) that you select is for your security purposes. The password is confidential and should not be disclosed to third parties or recorded. You are responsible for safekeeping your password. You agree not to disclose or otherwise make your password available to anyone not authorized to sign on your accounts. If you authorize anyone to have or use your password, you understand that person may use the Electronic Service to review all of your account information and make account transactions. Also, you are responsible for all Bill Payment, transfers, or other transactions you authorize using

Related to Security of Password/Access Code

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code. (b) Any Service Instructions identified by the Account Holder’s TBS Access Code shall be deemed to be given by the Account Holder and shall be conclusive and binding on the Account Holder and the Account Holder hereby authorises the Bank to act on any such Service Instructions identified by the Account Holder’s TBS Access Code. (c) All acts on the part of the Bank pursuant to such Service Instructions identified by the Account Holder’s TBS Access Code shall be conclusive and binding on the Account Holder (notwithstanding that such Service Instructions may not have been given by the Account Holder or with his consent or authority). (d) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled (but not obliged), in its reasonable discretion, to permit the Account Holder to operate the TBS without the use of his T-PIN upon verifying the identity of the Account Holder in accordance with the Bank’s prevailing prescribed procedure at the time. (e) Notwithstanding and without prejudice to the other terms and conditions herein, the Bank shall be entitled, in its reasonable discretion, to refuse to act on all or any Service Instructions; and the Bank shall be entitled in its reasonable discretion to require written confirmation of the Account Holder’s Service Instructions (even where identified by the Account Holder’s TBS Access Code), and to refuse to act on any such Service Instructions unless and until such written confirmation is received by the Bank. (f) The use of any TBS and the TBS Access Code is also subject to the Bank’s terms and conditions governing the type of Account or facility of which the TBS may be operated in connection therewith and nothing in these terms and conditions shall be construed as amending or varying those terms and conditions. (g) The Bank shall at its reasonable discretion, be entitled to change, de- activate or revoke the use of the TBS Access Code at any time without giving any reason but with reasonable notice to the Account Holder.

  • CANCELLATION OF TBS ACCESS CODE The Account Holder may cancel his TBS Access Code by giving notice to the Bank in writing or in any other manner as may be determined by the Bank, and such notice shall only be effective upon actual receipt thereof by the relevant officer-in-charge at the Bank.

  • Security of State Information The Contractor represents and warrants that it has implemented and it shall maintain during the term of this Contract the highest industry standard administrative, technical, and physical safeguards and controls consistent with NIST Special Publication 800-53 (version 3 or higher) and Federal Information Processing Standards Publication 200 and designed to (i) ensure the security and confidentiality of State Data; (ii) protect against any anticipated security threats or hazards to the security or integrity of the State Data; and (iii) protect against unauthorized access to or use of State Data. Such measures shall include at a minimum: (1) access controls on information systems, including controls to authenticate and permit access to State Data only to authorized individuals and controls to prevent the Contractor employees from providing State Data to unauthorized individuals who may seek to obtain this information (whether through fraudulent means or otherwise); (2) industry-standard firewall protection; (3) encryption of electronic State Data while in transit from the Contractor networks to external networks; (4) measures to store in a secure fashion all State Data which shall include multiple levels of authentication; (5) dual control procedures, segregation of duties, and pre-employment criminal background checks for employees with responsibilities for or access to State Data; (6) measures to ensure that the State Data shall not be altered or corrupted without the prior written consent of the State; (7) measures to protect against destruction, loss or damage of State Data due to potential environmental hazards, such as fire and water damage; (8) staff training to implement the information security measures; and (9) monitoring of the security of any portions of the Contractor systems that are used in the provision of the services against intrusion on a twenty-four (24) hour a day basis.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the NYISO OATT.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!