Security Procedure Selection Sample Clauses

Security Procedure Selection. Company’s (title) will determine which of Company’s employees will be authorized to create/modify and to verify ACH transfer requests (each, an “Operator”) and the dollar limits per transaction and per day assigned to each Operator and will communicate this information to Credit Union. Credit Union will set up the Operators by assigning each an Operator ID. The Company’s (title) will also be responsible for communicating any changes in Operators or in Operator limits or authorization(s) to Credit Union in writing with a signed authorization form and promptly reporting any breach of the security code. Company agrees to use the Credit Union’s Security Procedures selected below as described herein and as such Security Procedure may be amended as agreed upon by Company and the Credit Union from time to time, for the purpose of verifying the authenticity of ACH originations and communications amending or canceling ACH Orders. The Credit Union’s Security Procedure consists of a combination of security devices, questions and protocols, which include: dual authorization, Tokens, Passwords, and call back procedures, which are described in more detail below. The Credit Union maintains commercially reasonable Security Procedures based primarily of its knowledge of the service users’ circumstances and its knowledge of security procedures employed by similarly situated users and receiving banks. Company and its Users and other agents shall maintain the highest possible level of confidentiality with regard to the Security Procedure, and will take all steps necessary to prevent access to them by unauthorized persons. Company agrees to notify us immediately following your discovery of any unauthorized use. Subject to the Credit Union’s obligations under this Agreement, the Credit Union will have no liability in connection with, or resulting from, the execution of any transfer by the Credit Union that was verified pursuant to the Security Procedure, except to the extent applicable law prohibits the parties from varying the Credit Union’s liability with respect to such transfers. You understand that the Security Procedure is not for the purpose of detecting errors in transmission or content of an ACH Order. [NOTE: SECURITY PROCEDURES NEED TO BE CUSTOMIZED TO FIT WHAT THE CU ACTUALLY DOES. BUT THERE MUST BE A VALID SECURITY PROCEDURE.] Security Code. This procedure requires that a unique code separately agreed upon in writing by Company and Credit Union be presented with Com...
AutoNDA by SimpleDocs
Security Procedure Selection. The Token Card/Passcode - File Transmission/Batch Release security procedure described below is required for the product known as the Internet ACH Service. If Company uses the Internet to access ACH services, but does not use the Internet ACH Service, the Secure File Transport security procedure is required. For each of the other ACH services, Company acknowledges that Bank offers each of the security procedures described below for the purpose of verifying the authenticity of an instruction to originate an ACH credit or debit entry (a "payment order") received by Bank in the name of Company. Company refuses to have its payment orders verified by any security procedure other than the security procedure it has expressly designated. Company has reviewed various security procedures including the following and has determined that the security procedure designated in the Acceptance of Services best meets its requirements, given the size, type and frequency of the payment orders it will issue to Bank: TOKEN CARD/PASSCODE - File Transmission/Batch Release (for Internet ACH Service) - This procedure combines a token card with a personal identification number (PIN). A token card will be assigned to each Operator (as defined below). The PIN is set by each Operator individually upon first logon. The token card generates a random and unique security code every minute. The code combines with the PIN to provide a unique password every minute. The password must be presented with the ACH transmission or batch release authorization and is used by Bank to authenticate the identity of Company and/or the person originating the transmission or release. Bank will verify each request to access the Service by determining if the Passcode is valid for the associated Operator ID and if the Operator ID used by the person requesting access is the Operator ID of one of the persons Company has designated as being authorized such access. Bank has no obligation to confirm in any other way the identity of any person making such a request. IF COMPANY HAS REQUESTED SELF-ADMINISTRATION OF COMPANY'S ACCESS TO THE CEO, Bank will assign a Company ID code and will set up Company's first Company administrator ("FCA") by assigning a personal ID code and password to be used when the FCA first enters the CEO. The FCA can then set up additional Company administrators (who will have access to all services Company receive through the CEO), administrators and users. A User is an Operator. (Administrators ...
Security Procedure Selection. The Company acknowledges that the Bank ---------------------------- offers each of the security procedures described below for the purpose of verifying the authenticity of an instruction to originate an ACH electronic credit or debit entry (a "payment order") received by the Bank in the name of the Company. The Company refuses to have its payment orders verified by any security procedure other than the security procedure it has expressly designated. The Company has reviewed each of these security procedures and has determined that the following security procedure best meets its requirements, given the size, type and frequency of the payment orders it will issue to the Bank (check one): PI SecurID - File Transmission - This procedure combines a card with a --------------------------- personal identification number (PIN) known only by the Company and the Bank. The card generates a random and unique security code every minute. The code combines with the PIN to provide a unique password every minute. The password must be presented with the ACH transmission and is used by the Bank to authenticate the identity of the Company.

Related to Security Procedure Selection

  • Insolvency Proceedings, Etc Any Loan Party or any of its Subsidiaries institutes or consents to the institution of any proceeding under any Debtor Relief Law, or makes an assignment for the benefit of creditors; or applies for or consents to the appointment of any receiver, trustee, custodian, conservator, liquidator, rehabilitator or similar officer for it or for all or any material part of its property; or any receiver, trustee, custodian, conservator, liquidator, rehabilitator or similar officer is appointed without the application or consent of such Person and the appointment continues undischarged or unstayed for 60 calendar days; or any proceeding under any Debtor Relief Law relating to any such Person or to all or any material part of its property is instituted without the consent of such Person and continues undismissed or unstayed for 60 calendar days, or an order for relief is entered in any such proceeding; or

  • Bankruptcy, etc The Borrower or any Specified Subsidiary shall commence a voluntary case, proceeding or action concerning itself under (a) Title 11 of the United States Code entitled “Bankruptcy”, or (b) in the case of any Foreign Subsidiary that is a Specified Subsidiary, any domestic or foreign law relating to bankruptcy, judicial management, insolvency, reorganization, administration or relief of debtors in effect in its jurisdiction of incorporation, in each case as now or hereafter in effect, or any successor thereto (collectively, the “Bankruptcy Code”); or an involuntary case, proceeding or action is commenced against the Borrower or any Specified Subsidiary and the petition is not controverted within 30 days after commencement of the case, proceeding or action; or an involuntary case, proceeding or action is commenced against the Borrower or any Specified Subsidiary and the petition is not dismissed within 60 days after commencement of the case, proceeding or action; or a custodian (as defined in the Bankruptcy Code), judicial manager, receiver, receiver manager, trustee, administrator or similar person is appointed for, or takes charge of, all or substantially all of the property of the Borrower or any Specified Subsidiary; or the Borrower or any Specified Subsidiary commences any other voluntary proceeding or action under any reorganization, arrangement, adjustment of debt, relief of debtors, dissolution, insolvency, administration or liquidation or similar law of any jurisdiction whether now or hereafter in effect relating to the Borrower or any Specified Subsidiary; or there is commenced against the Borrower or any Specified Subsidiary any such proceeding or action that remains undismissed for a period of 60 days; or the Borrower or any Specified Subsidiary is adjudicated insolvent or bankrupt; or any order of relief or other order approving any such case or proceeding or action is entered; or the Borrower or any Specified Subsidiary suffers any appointment of any custodian receiver, receiver manager, trustee, administrator or the like for it or any substantial part of its property to continue undischarged or unstayed for a period of 60 days; or the Borrower or any Specified Subsidiary makes a general assignment for the benefit of creditors; or any corporate action is taken by the Borrower or any Specified Subsidiary for the purpose of effecting any of the foregoing; or

  • No Bankruptcy There are no bankruptcy proceedings pending, being contemplated by or, to the knowledge of Seller, threatened against Seller by any third party.

Time is Money Join Law Insider Premium to draft better contracts faster.