Security of Your Mobile Device Sample Clauses

Security of Your Mobile Device. You are responsible for (i) maintaining the confidentiality and security of your Mobile Devices, access number(s), password(s), security question(s) and answer(s), account number (s), login information, and any other security or access information, used by you to access the Service, and (ii) preventing unauthorized access to or use of the information, files or data that you store, transmit or use in or with the Service. You agree not to supply your Access Information to anyone and to immediately notify us if you become aware of any loss, theft or unauthorized use of any access information, including your Mobile Devices. We reserve the right to deny you access to the Service if we believe that any loss, theft or unauthorized use of access information has occurred.
AutoNDA by SimpleDocs
Security of Your Mobile Device i. If your Mobile Device is lost, stolen or in any way compromised you must notify us immediately and we will cancel the Software. Alternatively you are able to cancel the engin2go Software via the self care tool which can be found at xxx.xxxxx.xxx.xx ii. You acknowledge that we are not responsible for any lost or stolen Mobile Device. iii. You acknowledge that you are responsible for all charges for calls made using your lost or stolen Mobile Device up until the time that you notify us that your Mobile Device has been lost or stolen, or if you cannot contact us, up until the time you cancel the Software using the Selfcare tool, which can be found at xx.xxxxx.xxx.xx iv. You agree to take all reasonable precautions to ensure that the process which you use to access the Service from the Software does not expose you to the risk of viruses, malicious code or other forms of interference which may damage your Mobile Device v. To the extent permitted by law we do not accept any responsibility for any interference or damage to your Mobile Device which arises in connection with your use of the Software, including but not limited to any virus or malicious code that may contaminate or destroy your Mobile Device warnings vii. You acknowledge that you are responsible for implementing and maintaining sufficient procedures to satisfy your particular requirements in respect of the security and protection of you Mobile Device and the method by which you access the internet with your Mobile Device.
Security of Your Mobile Device. You are responsible for (i) maintaining the confidentiality and security of your Mobile Devices, access number(s), password(s), security question(s) and answer(s), account number (s), login information, and any other security or access information, used by you to access the Service, and (ii) preventing unauthorized access to or use of the information, files or data that you store, transmit or use in or with the Service. You agree not to supply your Access Information to anyone and to immediately notify us if you become aware of any loss, theft or unauthorized use of any access information, including your Mobile Devices. We reserve the right to deny you access to the Service if we believe that any loss, theft or unauthorized use of access information has occurred. If you believe your password has been lost or stolen or that someone may have fraudulently accessed your Account without your permission, contact us at 000-000-0000 or write us at Capital Bank, 00000 X-00 Xxxx Xxxxxxx, Xxxxxxx, Xxxxx 00000.
Security of Your Mobile Device. You are responsible for maintaining the confidentiality and security of your mobile devices, account number(s), password(s), security question(s) and answer(s), login information, and any other security or access information, used by you to access the Mobile Banking – Mobiliti Services. You agree not to supply your information to anyone and to immediately notify the Credit Union if you become aware of any loss, theft or unauthorized use of any access information, including your mobile devices. You agree to check your statements and transactions regularly and report any errors to us promptly by calling us at 000-000-0000, 000-000-0000, or 000-000-0000 and to cancel immediately your participation in Mobile Banking – Mobiliti. The Credit Union reserves the right to deny your access to Mobile Banking – Mobiliti if we believe that any loss, theft or unauthorized use of access information has occurred.
Security of Your Mobile Device. You are responsible for maintaining the confidentiality and security of your mobile device, access number(s), passwords, security question(s) and answer(s), account number(s), login information and any other security access information, used by you to access Mobile Deposit (collectively, Access Information) and preventing unauthorized access to or use of the
Security of Your Mobile Device. You are responsible for (i) maintaining the confidentiality and security of your Mobile Devices, access number(s), password(s), security question(s) and answer(s), account number (s), login information, and any other security or access information, used by you to access Mobile Deposit, and (ii) preventing unauthorized access to or use of the information, files or data that you store, transmit or use in or with Mobile Deposit. You agree not to supply your Access Information to anyone and to immediately notify us if you become aware of any loss, theft or unauthorized use of your Mobile Devices or any Security Information used by you to access Mobile Deposit. We reserve the right to deny you access to Mobile Deposit if we believe that any loss, theft or unauthorized use of access information has occurred.
Security of Your Mobile Device. You are responsible for (i) maintaining the confidentiality and security of your Mobile Devices, access number(s), password(s), security question(s) and answer(s), account number(s), login information, and any other security or access information, used by you to access the Service, and (ii) preventing unauthorized access to or use of the information, files or data that you store, transmit or use in or with the Service. You understand it is recommended to secure your mobile device with a screen lock. You agree not to supply your access information to anyone and to immediately notify us if you become aware of any loss, theft or unauthorized use of any access information, including your Mobile Devices. We reserve the right to deny you access to the Service if we believe that any loss, theft or unauthorized use of access information has occurred. Fees – The Bank may opt to charge a fee for the Service. You are responsible for paying the fees for the use of the Service. The Bank may change the fees for use of this Service at any time pursuant to the section titled “Acceptance Qualifications for and Information Regarding the Services – Provision of the Services to you is at the Bank’s sole discretion. For new customers, in order to qualify for the Services, the bank may require the account be open for a minimum of 6 months and account have fewer than 6 overdrafts year to date and otherwise be in good standing. Ineligible ItemsYou agree to scan and deposit only “checks” as that term is defined in Federal Regulation CC (“Reg CC). When the images of the front and back of the check are transmitted to the Bank, they are individually or collectively converted to an electronic image for subsequent presentment and collection. It shall therefore be deemed an “item” within the meaning of Articles 3 and 4 of the Uniform Commercial Code.
AutoNDA by SimpleDocs
Security of Your Mobile Device. You are responsible for (i) maintaining the confidentiality and security of your mobile devices, access number(s), password(s), security question(s) and answer(s), account number (s), login information, and any other security or access information, used by you to access the Mobile App and use Mobile Deposit, and (ii) preventing unauthorized access to or use of the information, files or data that you store, transmit or use in or with the Mobile App and/or Mobile Deposit. You agree not to supply your access information to anyone and to immediately notify the Bank if you become aware of any loss, theft or unauthorized use of any access information, including your Mobile Devices. The Bank reserves the right to deny you access to Mobile Deposit if the Bank believes that any loss, theft or unauthorized use of access information has occurred. You are responsible for notifying the Bank if the Mobile Device registered with the Bank is no longer being used.

Related to Security of Your Mobile Device

  • Protection of Your Data We will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Your Data, as described in the Documentation. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Your Data by Our personnel except (a) to provide the Purchased Services and prevent or address service or technical problems, (b) as compelled by law in accordance with Section 8.3 (Compelled Disclosure) below, or (c) as You expressly permit in writing.

  • PROTECTION OF YOUR CONTENT 5.1 In order to protect Your Content provided to Oracle as part of the provision of the Services, Oracle will comply with the applicable administrative, physical, technical and other safeguards, and other applicable aspects of system and content management, available at xxxx://xxx.xxxxxx.xxx/us/corporate/contracts/cloud-services/index.html. 5.2 To the extent Your Content includes Personal Data (as that term is defined in the applicable data privacy policies and the Data Processing Agreement (as that term is defined below)), Oracle will furthermore comply with the following: a. the relevant Oracle privacy policies applicable to the Services, available at xxxx://xxx.xxxxxx.xxx/us/legal/privacy/overview/index.html; and b. the applicable version of the Data Processing Agreement for Oracle Services (the “Data Processing Agreement”), unless stated otherwise in Your order. The version of the Data Processing Agreement applicable to Your order (a) is available at xxxxx://xxx.xxxxxx.xxx/corporate/contracts/cloud- services/contracts.html#data-processing and is incorporated herein by reference, and (b) will remain in force during the Services Period of Your order. In the event of any conflict between the terms of the Data Processing Agreement and the terms of the Service Specifications (including any applicable Oracle privacy policies), the terms of the Data Processing Agreement shall take precedence.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Use of Your Information The Beta Technology may include functionality that permits UPS to measure Your usage of its features and informs UPS of this usage electronically. UPS has the right to collect from Your computer, Your system configuration data and a log of Your activities while using the Beta Technology (the “Beta Technology Report”). UPS may use the Beta Technology Report to help conduct trouble-shooting analysis and improve the functionality of the Beta Technology. You consent and agree that UPS shall be free to reproduce, use, disclose, exhibit, display, transform, create derivative works from, and distribute to others without limitation or obligation of any type to You all comments, information, data, and suggestions, including the Beta Technology Report and feedback data (but not including financial data, financial plans or product plans not commonly known or publicly available), that You provide to UPS related to the Beta Technology. Further, UPS shall be free to use any ideas, concepts, know-how, or techniques contained in such information without limitation or obligation of any type to You.

  • Your Data Subject to the limited rights granted by You hereunder, We acquire no right, title or interest from You or Your licensors under this Agreement in or to Your Data, including any intellectual property rights therein.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Disclosure of Your Information We will disclose information to third parties about your account or the transfers you make:

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!