Security Procedures and User Guides Sample Clauses

Security Procedures and User Guides. We may provide you with one or more numbers, passwords, tokens, challenge questions and/or other means of identification and authentication (collectively "Password") to access our Services. We also may provide you with operating procedures and user guides ("User Guides") in connection with certain Services. You agree to: (a) comply with the User Guides and procedures that we make available to you as may be updated or supplemented from time to time; (b) take reasonable steps to safeguard the confidentiality and security of the Password, the User Guides, and any other proprietary property or information we provide to you in connection with the Services; (c) limit access to your Password to persons who have a need to know such information; (d) closely and regularly monitor the activities of employees who access the Services; (e) notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached; and (f) immediately change your Password if you know or suspect that the confidentiality of the Password has been compromised in any way. Our security procedures are not designed for the detection of errors (e.g., duplicate payments or errors in your funds transfer instructions). We will not be obligated to detect errors by you or others, even if we take certain actions from time to time to do so. You agree to change any temporary Password we give you promptly after you are given access to the Services for the first time and whenever anyone who has had access to any Password is no longer employed or authorized by you to use the Services. For security reasons, you also agree to change the Passwords you assign to your employees on a regular basis, but no less frequently than the time period specified by the Service’s User Guide. We may require you to change your Password at any time. As an alternative to verifying transactions by means of a Password, we may elect to verify the authenticity or content of any order or instruction by placing a call to any authorized signer on your account or any other person designated by you for that purpose. We may deny access to the Services without prior notice if: we are unable to confirm to our satisfaction any person’s authority to access the Services; we are unable to verify the identity of the person we are calling; or we believe such action is necessary for security reasons. Each time you utilize a Service in any manner, you warrant: that our security pro...
AutoNDA by SimpleDocs

Related to Security Procedures and User Guides

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • SAFETY PROCEDURES The Contractor shall:

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Indemnity Procedures Promptly after receipt by an Indemnified Party of any claim or notice of the commencement of any action or administrative or legal proceeding or investigation as to which the indemnity provided for in Article 18.1 may apply, the Indemnified Party shall notify the Indemnifying Party of such fact. Any failure of or delay in such notification shall not affect a Party's indemnification obligation unless such failure or delay is materially prejudicial to the indemnifying Party. The Indemnifying Party shall have the right to assume the defense thereof with counsel designated by such Indemnifying Party and reasonably satisfactory to the Indemnified Party. If the defendants in any such action include one or more Indemnified Parties and the Indemnifying Party and if the Indemnified Party reasonably concludes that there may be legal defenses available to it and/or other Indemnified Parties which are different from or additional to those available to the Indemnifying Party, the Indemnified Party shall have the right to select separate counsel to assert such legal defenses and to otherwise participate in the defense of such action on its own behalf. In such instances, the Indemnifying Party shall only be required to pay the fees and expenses of one additional attorney to represent an Indemnified Party or Indemnified Parties having such differing or additional legal defenses. The Indemnified Party shall be entitled, at its expense, to participate in any such action, suit or proceeding, the defense of which has been assumed by the Indemnifying Party. Notwithstanding the foregoing, the Indemnifying Party (i) shall not be entitled to assume and control the defense of any such action, suit or proceedings if and to the extent that, in the opinion of the Indemnified Party and its counsel, such action, suit or proceeding involves the potential imposition of criminal liability on the Indemnified Party, or there exists a conflict or adversity of interest between the Indemnified Party and the Indemnifying Party, in such event the Indemnifying Party shall pay the reasonable expenses of the Indemnified Party, and (ii) shall not settle or consent to the entry of any judgment in any action, suit or proceeding without the consent of the Indemnified Party, which shall not be unreasonably withheld, conditioned or delayed.

Time is Money Join Law Insider Premium to draft better contracts faster.