Security Procedure for Mobile TIB Sample Clauses

Security Procedure for Mobile TIB. In addition to the provisions stated in this Agreement, you hereby agree that the following is a commercially reasonable security procedure for accessing your Mobile TIB service and authorizing instructions to us (including payment orders): (i) logging in with the Access Credentials of an Authorized User who is enrolled in Mobile TIB, and (ii) not accepting any instruction via Mobile TIB that could not be authorized via TIB using the same Access Credentials. You represent that the foregoing security procedure is commercially reasonable for your particular needs, considering the size, type and frequency of your Accounts and treasury internet banking activities. You acknowledge that your enrollment in Mobile TIB is not a required part of Bank’s TIB service. Any instruction received by us in good faith and in compliance with the foregoing security procedures shall for all purposes be effective as your authorized instruction, even if you did not in fact authorize or send it. (Please see, without limitation, the Section entitled “Security Procedure and User Guides”. If you no longer want a person to be enrolled in Mobile TIB, you are responsible for un-enrolling that person from Mobile TIB. Notify Bank AT ONCE if you have any information that the security of any Access Credentials might be compromised. You acknowledge that Mobile TIB service involves electronic transmission of information across wireless networks that are not under our control. You agree that we are not responsible for the privacy, security, accuracy or availability of your wireless data transmissions.
AutoNDA by SimpleDocs

Related to Security Procedure for Mobile TIB

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • OIG Removal of IRO In the event OIG has reason to believe the IRO does not possess the qualifications described in Paragraph B, is not independent and objective as set forth in Paragraph E or has failed to carry out its responsibilities as described in Paragraph C, OIG shall notify Indivior in writing regarding OIG’s basis for determining that the IRO has not met the requirements of this Appendix. Indivior shall have 30 days from the date of OIG’s written notice to provide information regarding the IRO’s qualifications, independence or performance of its responsibilities in order to resolve the concerns identified by OIG. If, following OIG’s review of any information provided by Indivior regarding the IRO, OIG determines that the IRO has not met the requirements of this Appendix, OIG shall notify Indivior in writing that Indivior shall be required to engage a new IRO in accordance with Paragraph A of this Appendix. Indivior must engage a new IRO within 60 days of its receipt of OIG’s written notice. The final determination as to whether or not to require Indivior to engage a new IRO shall be made at the sole discretion of OIG. APPENDIX B INDEPENDENT REVIEW ORGANIZATION REVIEWS

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

Time is Money Join Law Insider Premium to draft better contracts faster.