Security Procedures to Verify a Request Sample Clauses

Security Procedures to Verify a Request. The Code or Codes are the security procedures. SBIC will use the User ID, Password and/or transaction password to verify the authenticity of the Customer’s Requests. The Customer agrees that the security procedures are not designed to and are not for the purpose of detecting error. If SBIC accepts a Request in the Customer’s name and in compliance with the User ID, Password and/or transaction password, then the Customer will be obligated on the Request and it will be treated as the Customer’s request, whether or not the Request was authorized by the Customer. If a Request received by SBIC was transmitted or authorized by the Customer, then the Customer will be obligated on the Request whether or not SBIC complied with the User ID, Password and/or Transaction Password, whether or not that Request was erroneous in any respect, and whether or not error would have been detected if SBIC had complied with such security procedures. The Customer is responsible for maintaining the confidentiality of the User ID, Password and/or Transaction Password, including any Codes or codes. The Customer will implement a comprehensive security program that includes administrative, technical and physical safeguards. The Customer will notify SBIC immediately in the event the Customer suspect that any security procedure has been or may be compromised or rendered ineffective.
AutoNDA by SimpleDocs

Related to Security Procedures to Verify a Request

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • BIDDING PROCEDURES TO KEEP IN MIND 1. All bidding is open to the public. You will need to raise your hand or call out your bid as the auctioneer asks for bids. It is easy! Don't be bashful! This is a one-time opportunity. Watch the auctioneer and his bid assistants. They will take your bid and will assist you with any questions.

  • Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.

  • Other Procurement Procedures The following procurement methods may be used for the procurement of works and goods that the Bank agrees meets the requirements established in the provisions of Section III of the Procurement Policies:

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • SAFETY PROCEDURES The Contractor shall:

  • Required Procurement Procedures for Obtaining Goods and Services The Grantee shall provide maximum open competition when procuring goods and services related to the grant-assisted project in accordance with Section 287.057, Florida Statutes.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

Time is Money Join Law Insider Premium to draft better contracts faster.