Common use of Security Procedure Clause in Contracts

Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 4 contracts

Samples: Online Banking Agreement, Online Banking Agreement, Online Banking Agreement

AutoNDA by SimpleDocs

Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the Credentials is a portion of a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Credentials from time to time for security reasons. You should keep your Access Code Credentials in a secure location. Any person having access to your Access Code (or just your Access Code) Credentials will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCredentials. Providing your these Access Code Credentials to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.12.3.1. You agree to comply with any of the Security Procedures. You further Procedures and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including includes (without limitation) any the Access CodeCredentials, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure of the person gaining access to the Service, established from time to time by Bank (collectively “Security DevicesProcedures”), . You agree that the Security Procedures constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has Access Credentials have been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 3 contracts

Samples: Mytrustmark® Agreement, Mytrustmark® Agreement, Mytrustmark® Agreement

Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are solely responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. You acknowledge that the Financial Institution has no liability whatsoever for any unauthorized use of your Access Code. 2.2.11.2.1. You agree to comply with the all security procedures Financial Institution directs you to use (collectively, “Security Procedures. You further ”), and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by usus from time to time, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.21.2.2. You For Business Online Banking, you agree to keep all Security Procedures protectedappoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent Access Codes and tokens on your behalf, secureincluding assigning and revoking access privileges for persons to use the Service (each, a “User”), and strictly confidential providing new and subsequent Security Devices to those Users. Financial Institution will provide Client’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a Company ID, Company Password, User ID and User Password, and any tokens to be distributed by the Administrator to each User with respect to one or make available more of the same only Services. Client understands that the Administrator has the capability of providing administrative privileges identical to your authorized representative(s). You agree not to disclose or provide any Security Procedures that of the Administrator to any unauthorized personUser, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. Where you If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Client acknowledges that any Administrator shall have the ability to change or modify a Security Device from time control security levels such as Service access and Service transaction limits, including without limitation the ability to time (e.g., a password or User Name), you agree assign dollar amount limits to change Security Devices frequently in order to ensure the security of the Security DeviceACH origination. You also agree to notify us immediately, according to notification procedures prescribed by us, if you believe that the Administrator or any Security Procedures User shall also have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority on behalf of Client to electronically accept and approve any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.all agreements and

Appears in 2 contracts

Samples: Online Banking Agreement, Online Banking Agreement

Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are solely responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. You acknowledge that the Financial Institution has no liability whatsoever for any unauthorized use of your Access Code. 2.2.11.2.1. You agree to comply with the all security procedures Financial Institution directs you to use (collectively, “Security Procedures. You further ”), and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by usus from time to time, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.21.2.2. For Business Online Banking, you agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent Access Codes and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service (each, a “User”), and providing new and subsequent Security Devices to those Users. Financial Institution will provide Client’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a Company ID, Company Password, User ID and User Password, and any tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Client understands that the Administrator has the capability of providing administrative privileges identical to that of the Administrator to any User, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Client acknowledges that any Administrator shall have the ability to control security levels such as Service access and Service transaction limits, including without limitation the ability to assign dollar amount limits to ACH origination. You also agree that the Administrator or any User shall also have the authority on behalf of Client to electronically accept and approve any and all agreements and amendments to agreements by and between Financial Institution and Client, including but not limited to this Agreement. 1.2.3. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Namean Access Code), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by usus from time to time, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees and court costs, directly or indirectly caused by you, any User or Subuser, or your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure. 2.2.31.2.4. You agree to notify us immediately, according to notification procedures prescribed by usus from time to time, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.41.2.5. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 2 contracts

Samples: Online Banking Agreement, Online Banking Agreement

Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are solely responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. You acknowledge that the Financial Institution has no liability whatsoever for any unauthorized use of your Access Code. 2.2.11.2.1. You agree to comply with the all security procedures Financial Institution directs you to use (collectively, “Security Procedures. You further ”), and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by usus from time to time, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.21.2.2. You For Business Online Banking, you agree to keep all Security Procedures protectedappoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent Access Codes and tokens on your behalf, secureincluding assigning and revoking access privileges for persons to use the Service (each, a “User”), and strictly confidential providing new and subsequent Security Devices to those Users. Financial Institution will provide Client’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a Company ID, Company Password, User ID and User Password, and any tokens to be distributed by the Administrator to each User with respect to one or make available more of the same only Services. Client understands that the Administrator has the capability of providing administrative privileges identical to your authorized representative(s). You agree not to disclose or provide any Security Procedures that of the Administrator to any unauthorized personUser, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. Where you If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Client acknowledges that any Administrator shall have the ability to change or modify a Security Device from time control security levels such as Service access and Service transaction limits, including without limitation the ability to time (e.g., a password or User Name), you agree assign dollar amount limits to change Security Devices frequently in order to ensure the security of the Security DeviceACH origination. You also agree to notify us immediately, according to notification procedures prescribed by us, if you believe that the Administrator or any Security Procedures User shall also have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority on behalf of Client to electronically accept and approve any authorized representative(s) shall change or be revoked. You shall recover and return all agreements and amendments to us any Security Devices in the possession of any of your authorized representative(s) whose authority agreements by and between Financial Institution and Client, including but not limited to have the Security Device has been revokedthis Agreement. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 2 contracts

Samples: Online Banking Agreement, Online Banking Agreement

Security Procedure. The use of the Access CodeCode(s), as well as other Security Devices, as defined below, and any other procedures which the Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is Security Procedures are not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code Codes (or just your Access CodeCodes) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Devices have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Access Code, Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold the Bank harmless from any loss, damages, or expenses, including but not limited to attorneys’ fees, caused by you, your employees’, or agents’ failure to keep the Security Procedures or Security Device confidential and secure. 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 2 contracts

Samples: Digital Banking Agreement, Digital Banking Agreement

Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by the Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for the Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with the Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Online Banking Agreement

Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Consumer Online Banking Agreement

Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by the Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for the Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with the Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold the Bank harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security Procedures or Security Device confidential and secure. 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Online Banking Agreement

Security Procedure. The use of the Access CodeCode your Mobile Device, as well as other Biometric Logon, Security Devices, Devices (as defined below), and any other procedures which the Bank directs you to use in this Agreement or the Operating Instructions, constitute the Instructions are security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service Service(s) (collectively, the “Security ProceduresProcedure(s)”). The Access Code Security Procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) Biometric Logon will be able to access these Services and perform all transactions, including reviewing Account information and information, making Transfers to other Accounts and to other persons, and otherwise using the Services. You are responsible for safeguarding the Access CodeCodes, Biometric Logon and your Mobile Device(s). Providing these Access Codes to another person or allowing them to use your Mobile Device while your Access Code to another person or Biometric Logon is active effectively constitutes a grant of authority to access or make transactions on your accountsaccounts under Consumer Financial Protection Bureau Regulation E (“REG E”). 2.2.11. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, security or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively collectively, “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilizeServices, including without limitation, transfers limitation Transfers and access to confidential customer information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.22. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password Password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. 2.2.33. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.44. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Consumer Online and Mobile Access Agreement

Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Financial Institution directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit share account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructionauthorized 2.2.2. You acknowledge agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent User Ids, Passwords and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service, (“User”) and providing new and subsequent Security Devises to those Users. Financial Institution will provide Member’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a User ID number and Password, and tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Member understands that the Administrator has the capability of providing administrative privileges identical to that of the Administrator to any User, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Member will be required to use the Security Devise each time it accesses the Services. Member acknowledges that any Administrator shall have the ability to control security levels such as Service access and Service transaction limits, including without limitation the ability to assign dollar amount limits to transfers of funds. You also agree that you the Administrator or any User shall be bound by also have the authority on behalf of Member to electronically accept and approve any and all transactions initiated through the use of such Security Proceduresagreements and amendments to agreements by and between Financial Institution and Member, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, including but not limited to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such errorthis Master Agreement. 2.2.22.2.3. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure. 2.2.32.2.4. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.42.2.5. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.our

Appears in 1 contract

Samples: Master Cash Management Agreement

Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Financial Institution directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained account 2.2.2. You agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent User Ids, Passwords and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service, (“User”) and providing new and subsequent Security Devises to those Users. Financial Institution will provide Customer’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with Banka User ID number and Password, and you agree and intend tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Customer understands that the submission Administrator has the capability of transactions providing administrative privileges identical to that of the Administrator to any User, including the ability to create and instructions using maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Customer will be required to use the Security Procedures Devise each time it accesses the Services. Customer acknowledges that any Administrator shall be considered have the same ability to control security levels such as your authorized written signature in authorizing us Service access and Service transaction limits, including without limitation the ability to execute such transaction or instructionassign dollar amount limits to transfers of funds. You acknowledge and also agree that you the Administrator or any User shall be bound by also have the authority on behalf of Customer to electronically accept and approve any and all transactions initiated through the use of such Security Proceduresagreements and amendments to agreements by and between Financial Institution and Customer, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, including but not limited to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such errorthis Master Agreement. 2.2.22.2.3. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure. 2.2.32.2.4. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.42.2.5. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Business Online Banking and Master Cash Management Agreement

Security Procedure. The Security Codes must be entered on the appropriate pages of the Bank Site to initiate a secure AuburnBank Online banking session. Customer will be issued a temporary Security Code and will be required to change the Security Code upon initial log-in. Customer agrees that the use of the Access Security Codes along with other security processes or procedures required by the Bank or otherwise recommended and offered by the Bank for the purpose of verifying that communications, orders, instructions or inquiries regarding a Service transaction or other Service activity are those of Customer, and/or for the purpose of authenticating Customer or its Authorized Users in connection with Customer’s use of the Services, and/or for the purpose of authorizing transactions and other activities through the use of the Services, which processes or procedures may or may not involve the use of a Security Code, as well as other Security Devicesconstitutes a “commercially reasonable” security procedure for Customer’s use of AuburnBank Online and the Services hereunder (including, as defined belowwithout limitation, bill pay payment requests, person-to-person payment requests, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service stop payment orders) (collectively, the “Security Procedures”). The Access Code is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree Customer acknowledges that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method purpose of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) is for the verification of authenticity and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect an error in the transmission or content of communications any communication, transfer, or transactions payment order. No Security Procedure for the detection of any such error has been agreed upon between the Bank and Customer and, to the extent any instruction initiated under Customer’s subscription to AuburnBank Online and accepted by you and that you bear the sole responsibility for detecting and preventing such Bank in compliance with this Security Procedure contains any error. 2.2.2. You agree , to keep all Security Procedures protectedthe full extent allowed by law, secureCustomer shall be liable for, and shall indemnify the Bank against any claims, losses and expenses the Bank may incur that arise from or relate to the erroneous instructions. Customer is strictly confidential responsible to establish and maintain procedures to provide safeguard against unauthorized transmissions, and agrees to be bound by all requests, communications, or make available other instructions to the same only Bank that are initiated under Customer’s subscription to your AuburnBank Online and accepted by Bank in compliance with the Security Procedure selected by the Customer, regardless of whether or not Customer or any Authorized User actually authorized representative(s)the instruction. You agree not Customer warrants that no individual will be allowed to disclose or provide any Security Procedures initiate transfers in the absence of proper supervision and safeguards, and agrees to any unauthorized person. Where you have take reasonable steps to maintain the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security confidentiality of the Security DeviceProcedures and the Security Codes. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe Customer agrees that any request received by Bank in compliance with the Security Procedures have been stolen, compromised, required by Bank or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In recommended by Bank and selected by the event of any actual or threatened 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) Customer shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change irrefutably presumed to be necessary or desirable to protect the security from an Authorized User of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intendedCustomer.

Appears in 1 contract

Samples: Cash Management Services Agreement

Security Procedure. The use of the Access CodeLogin Credentials, as well as other Security Devicessecurity procedures, as defined belowincluding (without limitation) any user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a security procedure, and any other procedures which the Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the "Security Procedures"). The Access Code is Security Procedures are not designed for the detection of errors. We may require you to change your Access Code Login Credentials from time to time for security reasons. You should keep your Access Code Login Credentials in a secure location. Any person having access to your Access Code (or just your Access Code) Login Credentials will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Codethis information. Providing your Access Code this to another person effectively constitutes a grant of authority to access or make transactions on your accountsAccounts. You may also have the ability to add authorized users who, after establishing their own Login Credentials, will be able to access these Services as to your Accounts and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. 2.2.11. II.2.1. You agree to comply with the Security Procedures. You further , and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), Procedures constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, us that the Security Procedures or any Security Device has have been stolen, compromised, or otherwise become known to persons other than you or your representative(sauthorized user(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Accounts maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error errors in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such errorerrors. 2.2.22. II.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Where you have the ability to change or modify a Security Device Procedure from time to time (e.g., a password or User Nameyour Login Credentials), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, immediately if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3threatened breach of security, we may require you to establish new Login Credentials or Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You If you are a business, you agree to notify us immediatelyindemnify, according defend all claims, and hold the Bank harmless from any loss, damages, or expenses, including but not limited to notification procedures prescribed attorneys’ fees, caused by usyou, if the authority of any authorized representative(s) shall change your employees’, or be revoked. You shall recover and return agents’ failure to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have keep the Security Device has been revokedProcedures confidential and secure. 2.2.43. II.2.3. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, Procedures at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Online and Mobile Banking Agreement

Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts.attempting 2.2.1. a. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. b. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device, and in any event no less frequently than every six months. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold Bank harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by your, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure. 2.2.3. c. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. d. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Online Banking Agreement

Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are solely responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. You acknowledge that the Financial Institution has no liability whatsoever for any unauthorized use of your Access Code. 2.2.11.2.1. You agree to comply with the all security procedures Financial Institution directs you to use (collectively, “Security Procedures. You further ”), and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by usus from time to time, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.21.2.2. You For Online Banking, you agree to keep all Security Procedures protectedappoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent Access Codes and tokens on your behalf, secureincluding assigning and revoking access privileges for persons to use the Service (each, a “User”), and strictly confidential providing new and subsequent Security Devices to those Users. Financial Institution will provide Client’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a Company ID, Company Password, User ID and User Password, and any tokens to be distributed by the Administrator to each User with respect to one or make available more of the same only Services. Client understands that the Administrator has the capability of providing administrative privileges identical to your authorized representative(s). You agree not to disclose or provide any Security Procedures that of the Administrator to any unauthorized personUser, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. Where you If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Client acknowledges that any Administrator shall have the ability to change or modify a Security Device from time control security levels such as Service access and Service transaction limits, including without limitation the ability to time (e.g., a password or User Name), you agree assign dollar amount limits to change Security Devices frequently in order to ensure the security of the Security DeviceACH origination. You also agree to notify us immediately, according to notification procedures prescribed by us, if you believe that the Administrator or any Security Procedures User shall also have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority on behalf of Client to electronically accept and approve any authorized representative(s) shall change or be revoked. You shall recover and return all agreements and amendments to us any Security Devices in the possession of any of your authorized representative(s) whose authority agreements by and between Financial Institution and Client, including but not limited to have the Security Device has been revokedthis Agreement. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Online Banking Agreement

Security Procedure. The use of the Access CodeCode(s), as well as other your Mobile Device, Biometric Logon, Security Devices, Devices (as defined below), and any other procedures which the Bank directs you to use in this Agreement or the Operating Instructions, constitute the Instructions are security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is Security Procedures are not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) Biometric Logon will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers using the Xxxx Payment Services. A third party will be able to other Accounts and use your Online Banking Service with your Access Code, including your Biometric Logon, to other personschange Payees or amounts, or add new Payees to the Xxxx Payment Service. You are responsible for safeguarding the Access CodeCodes, Biometric Logon and your Mobile Device. Providing your these Access Code Codes to another person or allowing them to use your Mobile Device while your Access Codes or Biometric Logon is active effectively constitutes a grant of authority to access or make transactions on your accountsAccounts. 2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has have been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Devices have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Access Code, Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Online Banking Agreement

AutoNDA by SimpleDocs

Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Financial Institution directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent User Ids, Passwords and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service, (“User”) and providing new and subsequent Security Devises to those Users. Financial Institution will provide Customer’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a User ID number and Password, and tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Customer understands that the Administrator has the capability of providing administrative privileges identical to that of the Administrator to any User, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Customer will be required to use the Security Device each time it accesses the Services. Customer acknowledges that any Administrator shall have the ability to control security levels such as Service access and Service transaction limits, including without limitation the ability to assign dollar amount limits to transfers of funds. You also agree that the Administrator or any User shall also have the authority on behalf of Customer to electronically accept and approve any and all agreements and amendments to agreements by and between Financial Institution and Customer, including but not limited to this Master Agreement. 2.2.3. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure. 2.2.32.2.4. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.42.2.5. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Business Online Banking and Master Cash Management Agreement

Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the Credentials is a portion of a security procedures procedure established by Bank us to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Core System. The Access Code security procedure is not designed for the detection of errors. We may require you Independent Advisor to change your his/her Access Code Credentials from time to time for security reasons. You Independent Advisor should keep your his/her Access Code Credentials in a secure location. Any person having access to your the Access Code (or just your Access Code) Credentials will be able to access these Services the Core System and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other personstrades on certain Accounts. You are Independent Advisor is responsible for safeguarding the Access CodeCredentials. Providing your these Access Code Credentials to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1Client Accounts. You agree Independent Advisor agrees to comply with any of the Security Procedures. You further Procedures and any other Security Procedures we direct him/her to use, and you and Independent Advisor acknowledge and agree that to the Security Procedures, including (without limitation) any ), the Access CodeCredentials, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure of the person gaining access to the Core System, established from time to time by us (collectively “Security DevicesProcedures”), . You and Independent Advisor agree that the Security Procedures constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilizeCore System utilized, including without limitation, transfers and access to confidential information. You and Independent Advisor authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you and/or Independent Advisor have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has Access Credentials have been stolen, compromised, or otherwise become known to persons other than you or you, your representative(s) ), Independent Advisor or his/her representative, and until we have had a reasonable opportunity to act upon such notice. You and Independent Advisor agree that the initiation of a transaction or instructions instructions, entries and transactions using applicable Security Procedures constitutes constitute sufficient authorization for Bank us to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with Bankus, and you agree and intend that the submission of instructions, entries and transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructioninstructions. You and Independent Advisor acknowledge and agree that you and Independent Advisor shall be bound by any and all instructions, entries and transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by youyou or Independent Advisor, to the fullest extent allowed by law. You and Independent Advisor further acknowledge and agree that the Security Procedures are not designed to detect error errors in the transmission or content of communications or transactions initiated by you and/or Independent Advisor, and that you and Independent Advisor bear the sole responsibility for detecting and preventing such error. 2.2.2errors. You agree Independent Advisor agrees to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your his/her authorized representative(s). You agree Independent Advisor agrees not to disclose or provide any Security Procedures to any unauthorized person. Authorized representatives should be trained on the Security Procedures as they relate to their job function. Independent Advisor also agrees that Users shall not share Security Devices with each other. Where you have Independent Advisor has the ability to change or modify a Security Device Access Credentials from time to time (e.g., a password or User Name), you agree he/she agrees to change Security Devices Access Credentials frequently in order to ensure the security of the Security DeviceAccess Credentials. You agree Independent Advisor agrees to notify us immediately, according to notification procedures prescribed by us, if you believe he/she believes that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you Independent Advisor or your his/her authorized representative(s) or if you believe Independent Advisor believes that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3threatened breach of security, we may issue new Access Credentials or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you, Independent Advisor or any third party for any delay in taking such actions. You If you and/or Independent Advisor are an entity, you and Independent Advisor agree to indemnify, defend all claims, and hold us harmless from any loss, damages, or expenses, including, but not limited to attorneys’ fees, caused by your and/or Independent Advisor’s employees’ or agents’ failure to keep the Security Procedures or Access Credentials confidential and secure. In addition to protecting Access Credentials, Independent Advisor should also take precautions to protect his/her personal identification information, such as a driver’s license, Tax Identification Number, etc. This information by itself or together with other information may allow unauthorized access to your Accounts. Independent Advisor is also solely responsible for providing for and maintaining the physical, electronic, procedural, administrative, and technical security of data and systems in your possession or under your control and for protecting, securing, and backing up all information and data stored in or on his/her devices. For additional guidance on information security, please visit our website at xxx.xxxxxxxxx.xxx. Independent Advisor agrees to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover Access granted to data sent to and return from the Core System should be sufficient to us any Security Devices in the possession of any of your determine that authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4representatives and methods are completing transactions. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any device used in conjunction with the Security DevicesProcedure, at any time and from time to time in our discretion. We will endeavor to give you Independent Advisor reasonable notice of any change in Security Procedures; , provided that we may make any change in Security Procedures without advance notice to you Independent Advisor if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your Independent Advisor’s implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your his/her agreement to the change and your his/her agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Independent Advisor Access Agreement

Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes, which are the “access devices” to your accounts and Internet Banking. Providing your Access Code these access devices to another person effectively constitutes a grant of authority to access or make transactions on your accountsaccounts under Consumer Financial Protection Bureau Regulation E (“REG E”). 2.2.11. You agree to comply with the Security Procedures. You further ,” including any other Security Procedures that Bank directs you to use, either by written notice, by posting of Bank’s website or other electronic means, or any other way the Bank deems appropriate, and you acknowledge and agree that the such Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security DevicesDevice(s)”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us Bank to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction transactions or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of or authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructiontransaction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you hereunder and that you bear the sole responsibility for detecting and preventing such error. 2.2.22. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You also agree that Users shall not share Security Devices with others or with and between your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password Password or User NameID), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediatelyimmediately by calling Customer Care (see Article X Section E), according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold Bank harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security Procedures or Security Device confidential and secure. If you fail to comply with this paragraph, including the protection, safekeeping and confidentiality of any Security Procedures and/or Security Devices, you agree to indemnify and hold the Bank, its officers, directors, shareholders, agents, employees, and affiliates, and their respective officers, directors, agents and employees, harmless from and against any and all losses, costs, suits, damages, claims, liabilities and expenses (including reasonable attorneys’ fees) arising from or related in any way to Customer’s responsibilities hereunder. 2.2.33. You agree to notify us immediately, according to notification procedures prescribed immediately by us, calling Customer Care (see Article X Section E) if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.44. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Internet Banking Agreement

Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers transactions and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedmake 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Digital Banking Agreement

Security Procedure. The use of the Access CodeCode(s), as well as other Security Devices, as defined below, and any other procedures which the Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is Security Procedures are not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code Codes (or just your Access CodeCodes) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. (a) You agree to comply with the Security Procedures. You further , and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2(b) If you are a business, you agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent User Names, Passwords and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service, (“User”) and providing new and subsequent Security Devices to those Users. Bank will provide Customer’s designated Administrator, through United States postal mail and/or other delivery service selected by Bank at Bank’s option, with a User ID number and Password, and tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Customer understands that the Administrator has the capability of providing administrative privileges identical to that of the Administrator to any User, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Customer will be required to use the Security Device each time it accesses the Services. Customer acknowledges that any Administrator shall have the ability to control security levels such as Service access and Service transaction limits, including without limitation the ability to assign dollar amount limits to transfers of funds. You also agree that the Administrator or any User shall also have the authority on behalf of customer to electronically accept and approve any and all agreements, notices, and amendments to agreements by and between Bank and Customer, including but not limited to this Agreement. (c) You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. If you are a business customer, you represent and warrant that no User(s) will share any Security Devices or Access Codes with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Devices have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Access Code, Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold the Bank harmless from any loss, damages, or expenses, including but not limited to attorneys’ fees, caused by you, your employees’, or agents’ failure to keep the Security Procedures or Security Device confidential and secure. 2.2.3. (d) You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s), Administrator(s) or User(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. (e) We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Combined Business and Consumer Online Banking Agreement

Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the Credentials is a portion of a security procedures procedure established by Bank us to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Credentials from time to time for security reasons. You should keep your Access Code Credentials in a secure location. Any person having access to your Access Code (or just your Access Code) Credentials will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other personsinformation. You are responsible for safeguarding the Access CodeCredentials. Providing your these Access Code Credentials to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1Accounts. You agree to comply with any of the Security Procedures. You further Procedures and any other Security Procedures we direct you to use, and you acknowledge and agree that the Security Procedures, including include (without limitation) any the Access CodeCredentials, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure of the person gaining access to the Service, established from time to time by us (collectively “Security DevicesProcedures”), . You agree that the Security Procedures constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has Access Credentials have been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes constitute sufficient authorization for Bank us to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with Bankus, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructioninstructions. You acknowledge and agree that you shall be bound by any and all transactions instructions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Authorized representatives should be trained on the Security Procedures as they relate to their job function. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device Access Credentials from time to time (e.g., a password or User Name), you agree to change Security Devices Access Credentials frequently in order to ensure the security of the Security DeviceAccess Credentials. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3threatened breach of security, we may issue you new Access Credentials or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are an entity, you agree to indemnify, defend all claims, and hold us harmless from any loss, damages, or expenses, including, but not limited to attorneys’ fees, caused by your, your employees’, or agents’ failure to keep the Security Procedures or Access Credentials confidential and secure. In addition to protecting your Access Credentials, you should also take precautions to protect your personal identification information, such as your driver’s license, Tax Identification Number, etc. This information by itself or together with other information may allow unauthorized access to your Service Accounts. You also are solely responsible for providing for and maintaining the physical, electronic, procedural, administrative, and technical security of data and systems in your possession or under your control and for protecting, securing, and backing up all information and data stored in or on your devices. For additional guidance on information security, please visit our website at xxx.xxxxxxxxx.xxx. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover Access granted to data sent to and return from the Service should be sufficient to us any Security Devices in the possession of any of your determine that authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4representatives and methods are completing transactions. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any device used in conjunction with the Security DevicesProcedure, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Access Agreement

Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, Code and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the your Mobile Device is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers using the Xxxx Pay Services. With this Access Code, a third party will be able to other Accounts and use your Online Banking Service to other personsadd new payees to the Xxxx Pay Service. You are responsible for safeguarding the Access CodeCodes and your Mobile Device. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accountsaccounts under Consumer Financial Protection Bureau Regulation E (“REG E”). 2.2.1. a. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential customer information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructiontransaction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. b. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3. You agree to notify us immediatelythreatened breach of security, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the we may issue you a new Security Device has been revokedor establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. 2.2.4. c. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Mobile Banking Service Agreement

Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device, and in any event no less frequently than every six months. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Bank harmless from any loss, damages, or expenses, including but 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Business Online Banking Agreement

Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further ” and any other Security Procedures Financial Institution directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security DevicesDevice(s)”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.1. You agree to notify the Financial Institution of any additions, changes or removal of persons authorized to use the Service. You also agree that any Authorized User shall also have the authority on behalf of Customer to electronically accept and approve any and all agreements and amendments to agreements by and between Financial Institution and Customer, including but not limited to this Master Agreement. 2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure. 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Business Online Banking Master Cash Agreement

Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, Code and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the your Mobile Device is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errorserrors and we make no representation or warranty as to the security of the information. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding using the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts.Bill Pay 2.2.1. (a) You agree to comply with the Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential customer information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructiontransaction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. (b) You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3. You agree to notify us immediatelythreatened breach of security, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the we may issue you a new Security Device has been revokedor establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. 2.2.4. (c) We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.

Appears in 1 contract

Samples: Online Banking Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!