Security Procedure and User Guides Sample Clauses

Security Procedure and User Guides. As used in this Agreement and in Specifications, a “security procedure” is a procedure by which we verify that an instruction or other communication issued in your name, or your authorized signers or users names, or with respect to your accounts, was made and authorized by you. Different Services have different security procedures, as disclosed to you herein or in one or more Specifications for the specific Services. By receiving a Service’s Specifications and then using that Service, you are representing that you have determined that the Service’s security procedure is commercially reasonable for your needs as expressed to us (including the size, type and frequency of your typical transactions with that Service), and you are agreeing that the security procedure is commercially reasonable, and agreeing that we may accept, rely, act upon, and enforce against you any instruction (including payment instructions) or other communication (e.g., designation of accounts or authorized signers or users for the Service, or establishing or modifying payment templates) received by us in compliance with that security procedure, even if that instruction or communication was not actually made, sent or authorized by you. If a Service’s disclosed security procedure is not commercially reasonable for your needs, or if you are unwilling to be bound by all instructions and communications received by us in accordance with that security procedure, then you must not use that Service. Contact your treasury services representative who can discuss alternative products, and in some instances alternative or additional security procedures. We may provide you with (or allow your Administrator(s) or Authorized User(s) to select) one or more Access Credentials to access our Services. We also may provide you with operating procedures, and user guides in the Specifications in connection with certain Services. You agree to: (a) comply with the Specifications and procedures that we provide to you; (b) take all necessary steps to safeguard the security and confidentiality of your Access Credential, Specifications, and any other proprietary property or information we provide to you in connection with the Services; (c) limit access to the Access Credential to persons who have a need to know such information; (d) closely and regularly monitor the activities of employees who access the Services; (e) notify us immediately if you have any reason to believe the security or confidentiality required by...
AutoNDA by SimpleDocs
Security Procedure and User Guides. We may provide you with one or more numbers, passwords, tokens, challenge questions and/or other means of identification and authentication (collectively "Password") to access our Services. We also may provide you with operating procedures and user guides ("User Guides") in connection with certain Services. You agree to: (a) comply with the User Guides and procedures that we make available to you; (b) take reasonable steps to safeguard the confidentiality and security of the Password, the User Guide, and any other proprietary property or information we provide to you in connection with the Services; (c) never share your password; (d) closely and regularly monitor the activities of employees who access the Services; (e) notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached; and (f) immediately change your Password if you know or suspect that the confidentiality of the Password has been compromised in any way. Our security procedures are not designed for the detection of errors (e.g., duplicate payments or errors in your funds transfer instructions). We will not be obligated to detect errors by you or others, even if we take certain actions from time to time to do so. You agree to change any temporary Password we give you promptly after you are given access to the Services for the first time and whenever anyone who has had access to any Password is no longer employed or authorized by you to use the Services. For security reasons, you also agree to change the Passwords you assign to your employees on a regular basis, but no less frequently than every 120 days. We may require you to change your Password at any time. As an alternative to verifying transactions by means of a Password, we may elect to verify the authenticity or content of any order or instruction by placing a call to any authorized signer on your account or any other person designated by you for that purpose. We may deny access to the Services without prior notice if we are unable to confirm to our satisfaction any person’s authority to access the Services or if we believe such action is necessary for security reasons. Each time you make a transfer or payment with a Service, you warrant that our security procedures are commercially reasonable (based on the normal size, type, and frequency of your transactions). Some of our Services allow you or your Administrator to set transaction limitations and establish i...
Security Procedure and User Guides. We may provide you with one or more numbers, passwords and/or other means of identification and authentication (each, a "Password") to access our Services. We also may provide you with operating procedures and online user guides (collectively, "User Guides") in connection with certain Services. You agree to: (a) comply with the User Guides and procedures that we provide to you; (b) take reasonable steps to safeguard the confidentiality and security of the Password, the User Guide, and any other proprietary property or information we provide to you in connection with the Services; (c) limit access to your Password to persons who have a need to know such information; (d) closely and regularly monitor the activities of employees who access the Services; (e) notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached; and (f) immediately change your Password if you know or suspect that the confidentiality of the Password has been compromised in any way. Additionally, for ACH and wire transfer requests initiated through the Service, you will be assigned a security Token or utilize an out of band authentication code (collectively, the “Security Information”). You and we shall each use our best efforts to prevent the disclosure of the Security Information applicable to ACH and Wire Transfer Requests. Authorized Representative for callback verification. Bank will reject any Service request, including any wire transfer request, that cannot be verified as provided herein.
Security Procedure and User Guides. We may provide you with one or more Access Credentials (defined below) to access our Services. We also may provide you with operating procedures and user guides in the Specifications in connection with certain Services. You agree to: (a) comply with the Specifications and procedures that we provide to you; (b) take all necessary steps to safeguard the confidentiality and security of your Access Credential, Specifications, and any other proprietary property or information we provide to you in connection with the Services; (c) limit access to the Access Credential to persons who have a need to know such information; (d) closely and regularly monitor the activities of employees who access the Services; (e) notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached; and (f) immediately change or exchange your Access Credential (and any password used to access your Access Credential) if you know or suspect that the confidentiality of the Access Credential has been compromised in any way. Our security procedures are not designed for the detection of errors (e.g., duplicate payments, or errors in your funds transfer instructions such as beneficiary or amount). We are not obligated to detect errors by you or others, even if we take certain actions from time to time to do so.
Security Procedure and User Guides. We may provide you with one or more numbers, passwords and/or other means of identification and authentication (each, a “Password”) to access our Services. We also may provide you with operating procedures and online user guides (collectively, “User Guides”) in connection with certain Services. You agree to: (a) comply with the User Guides and procedures that we provide to you; (b) take reasonable steps to safeguard the confidentiality and security of the Password, the User Guide, and any other proprietary property or information we provide to you in connection with the Services; (c) limit access to your Password to persons who have a need to know such information; (d) closely and regularly monitor the activities of employees who access the Services; (e) notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached; and (f) immediately change your Password if you know or suspect that the confidentiality of the Password has been compromised in any way. Additionally, for ACH and wire transfer requests initiated through the Service, you will be assigned a security Token or utilize an out of band authentication code (collectively, the “Security Information”). You and we shall each use our best efforts to prevent the disclosure of the Security Information applicable to ACH and Wire Transfer Requests. Each time you submit an Order using the Funds Transfer Service or transmit a file containing Orders using the Wire Upload Service (a “File”), you reaffirm your agreement that our security and verification procedures are commercially reasonable based on the normal size, type, and frequency of your transactions. You agree to be bound by any transfer, instruction or payment order we receive through the Services, even if it is not authorized by you, if it includes your Password or is otherwise processed by us in accordance with our security procedures. Some of our Services allow you or your Administrator to set transaction limitations and establish internal controls. Your failure to set such limitations and implement such controls increases your exposure to, and responsibility for, unauthorized transactions. We strongly recommend that you impose a dual control environment in connection with the transmission and confirmation of Orders. If you elect not to do so, you agree to be subject to a higher standard of care with respect to your accounts, transactions and statements. Our security and ...
Security Procedure and User Guides. We may provide you with one or more Access Credentials (defined below) to access our Services. We also may provide you with operating procedures and user guides in connection with certain Services. You agree to: (a) comply with the Specifications and procedures that we provide to you; (b) take all necessary steps to safeguard the confidentiality and security of your Access Credential, Specifications, and any other proprietary property or information we provide to you in connection with the Services; (c) limit access to the Access Credential to persons who have a need to know such information; (d) closely and regularly monitor the activities of employees who access the Services; (e) notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached; and

Related to Security Procedure and User Guides

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Other Procurement Procedures National Competitive Bidding

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!