Security Procedure. The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.
Security Procedure. The Fund acknowledges that the Security Procedure it has designated on the Fund Selection Form was selected by the Fund from security procedures offered by the Transfer Agent. The Fund shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated to the Transfer Agent in writing. The Fund must notify the Transfer Agent immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Fund's authorized personnel. The Transfer Agent shall verify the authenticity of all Fund instructions according to the Security Procedure.
Security Procedure. The Company hereby elects to use the procedure selected below as its security procedure (the Security Procedure). The Security Procedure will be used by the Custodian to verify the authenticity of a payment order or a communication amending or canceling a payment order. The Custodian will act on instructions received provided the instruction is authenticated by the Security Procedure. The Company agrees and acknowledges in connection with (i) the size, type and frequency of payment orders normally issued or expected to be issued by the Company to the Custodian, (ii) all of the security procedures offered to the Company by the Custodian, and (iii) the usual security procedures used by customers and receiving banks similarly situated, that authentication through the Security Procedure shall be deemed commercially reasonable for the authentication of all payment orders submitted to the Custodian. The Company hereby elects (PLEASE CHOOSE ONE) the following Security Procedure as described below: [ ] BIDS AND BIDS WORLDVIEW PAYMENT PRODUCTS. BIDS and BIDS Worldview Payment Products, are on-line payment order authorization facilities with built-in authentication procedures. The Custodian and the Company shall each be responsible for maintaining the confidentiality of passwords or other codes to be used by them in connection with BIDS. The Custodian will act on instructions received through BIDS without duty of further confirmation unless the Company notifies the Custodian that its password is not secure. [X] SWIFT. Primary Method the Custodian and the Company shall comply with SWIFT's authentication procedures. The Custodian will act on instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. [ ] TESTED TELEX. The Custodian will accept payment orders sent by tested telex, provided the test key matches the algorithmic key the Custodian and Company have agreed to use.
Security Procedure. The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client's authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.
Security Procedure. The Trust must notify ALPS immediately of any change in the Trust’s authorized personnel with respect to the Security Procedure. ALPS shall verify the authenticity of all Trust instructions according to the Security Procedure. For purposes of this Section 13 only, instructions received from representatives of a Fund’s investment adviser will be considered to be instructions from the Trust.
Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submiss...
Security Procedure. The Fund must notify ALPS immediately of any change in the Fund’s authorized personnel with respect to the Security Procedure. ALPS shall verify the authenticity of all Fund instructions according to the Security Procedure. ALPS is authorized to make exceptions to the Security Procedure if instructed by the Fund. For purposes of this Section 13 only, instructions received from representatives of the Fund’s investment adviser will be considered to be instructions from the Fund.
Security Procedure. The Fund, on behalf of the Portfolios, acknowledges that the Security Procedure it has designated on the Funds Transfer Addendum was selected by the Fund from security procedures offered. The Fund shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated to the Transfer Agent in writing. The Fund must notify the Transfer Agent immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Fund’s authorized personnel. The Transfer Agent shall verify the authenticity of all instructions received from the Fund according to the Security Procedure.
Security Procedure. The Fund hereby elects to use the procedure selected below as its security procedure (the Security Procedure). The Security Procedure will be used by the Custodian to verify the authenticity of a payment order or a communication amending or canceling a payment order. The Custodian will act on instructions received provided the instruction is authenticated by the Security Procedure. The Fund agrees and acknowledges in connection with (i) the size, type and frequency of payment orders normally issued or expected to be issued by the Fund to the Custodian, (ii) all of the security procedures offered to the Fund by the Custodian, and (iii) the usual security procedures used by customers and receiving banks similarly situated, that authentication through the Security Procedure shall be deemed commercially reasonable for the authentication of all payment orders submitted to the Custodian. The Fund hereby elects (please choose one) the following Security Procedure as described below:
Security Procedure. The Administrator on behalf of the Trust and the Portfolios acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Administrator from security procedures offered by the Transfer Agent. The Administrator shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated to the Transfer Agent in writing. The Administrator must notify the Transfer Agent immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Administrator’s authorized personnel. The Transfer Agent shall verify the authenticity of all Administrator instructions according to the Security Procedure.