SECURITY PROCEDURES AND COMMUNICATIONS Sample Clauses

SECURITY PROCEDURES AND COMMUNICATIONS. Certain Security Procedures designed to verify the origination (but not errors in transmission or content) of instructions, orders and other communications sent by Bank and Client might be used in connection with the Service. Client agrees that any such mutually agreed-upon Security Procedures shall be deemed commercially reasonable. Bank shall not be obligated to act on a communication not transmitted in accordance with the Security Procedures and may refuse to act on any communication where Bank reasonably doubts its authorization, contents, origination or compliance with the Security Procedures. Bank shall have no duty to discover, and shall not be liable for, errors or omissions by Client. If Bank complies with the Security Procedures in respect of a communication, Bank shall be entitled to act on that communication and shall not be obligated to verify the content of such communication, establish the identity of the person giving it, or await any confirmation thereof, and Bank shall not be liable for acting on, and Client shall be bound by, any communication sent in the name of Client, whether or not authorized. Bank reserves the right to issue new Security Procedures and/or to cancel or change any Security Procedures from time to time. Whenever the Security Procedures include the assigning to Client of any confidential password, logon identification, identification code, personal or location identification number, repetitive code, or similar security device, Client shall not disclose such security device except to employees or agents authorized to act for Client in connection with the Service. Client shall implement such safeguards as are reasonably necessary to ensure the confidentiality and integrity of such security devices, and shall immediately notify Bank if the confidentiality or integrity of any such security device is breached or threatened. Client shall be solely responsible for the safekeeping of such security devices and assumes all risk of accidental disclosure or inadvertent use of such security devices by any party whatsoever, whether such disclosure or use is on account of Client's negligence or deliberate acts or otherwise. Bank shall not be liable for any loss or damage resulting from fraudulent, unauthorized or otherwise improper use of any security devices. When you begin to use the service, you will receive a User ID and a temporary password which will allow you access to your deposit site. This Password should be changed upon the...
AutoNDA by SimpleDocs
SECURITY PROCEDURES AND COMMUNICATIONS. Application of the procedures and Security Codes to authenticate a Communication will be collectively referred to as the “Security Proceduresin this Agreement. If we take any action that is not provided in the Security Procedures in connection with any Communication, such additional action should not be deemed to become a mandatory part of the continuing Security Procedures. You understand and agree that we will use the Security Procedures to verify the authenticity of Communications and that the Security Procedures are not designed to, and are not used for the purpose of, detecting errors in transmission or content of Communications, including discrepancies between account names and numbers. Before using a Service and before sending a Communication to us, you will review the Security Procedures and determine whether the Security Procedures will provide a commercially reasonable method for verifying whether a Communication is that of yours. As part of the review, you will consider the size, type and frequency of Communications you normally make or anticipate making, along with such other factors as you may deem relevant or appropriate. • Commercially Reasonable Procedures. If the size, type or frequency of Communications made by you changes such that the Security Procedures in use by you no longer provide a commercially reasonable method of providing security against unauthorized Communications, you shall immediately notify us.
SECURITY PROCEDURES AND COMMUNICATIONS. You are responsible for (i) maintaining the confidentiality and security of your Mobile Devices, access number(s), password(s), security question(s) and answer(s), account number (s), login information, and any other security or access information, used by you to access the Mobile Remote Deposit Capture service (collectively, "Access Information"), and (ii) preventing unauthorized access to or use of the information, files or data that you store, transmit or use in or with the Mobile Remote Deposit Capture service (collectively, "Account Information"). You agree not to supply your Access Information to anyone. You will be responsible for all electronic communications, including image transmissions, email and other data ("Communications") entered using the Access Information. Any Communications received through the use of the Access Information will be deemed to be sent or authorized by you. You agree to immediately notify us if you become aware of any loss, theft or unauthorized use of any Access Information, including your Mobile Devices. We reserve the right to deny you access to the Mobile Remote Deposit Capture service (or any part thereof) if we believe that any loss, theft or unauthorized use of Access Information has occurred.
SECURITY PROCEDURES AND COMMUNICATIONS. Check Images transmitted via Bank’s Remote Deposit Capture Service must be made by Users named by the Administrator using assigned Security Tokens. Mobile Deposit Users must use the Mobile Device Security Procedures.
SECURITY PROCEDURES AND COMMUNICATIONS 

Related to SECURITY PROCEDURES AND COMMUNICATIONS

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

Time is Money Join Law Insider Premium to draft better contracts faster.