Security Procedures; Unauthorized and Authorized Entries; Inconsistent Entries Sample Clauses

Security Procedures; Unauthorized and Authorized Entries; Inconsistent Entries. Purpose of Security Procedures. You agree that the purpose of the security procedures set out in this Section J is to verify the authenticity of Entries transmitted to the Bank in your name and not to detect an error in the transmission or content of any Entry, and that no security procedure for the detection of such errors has been agreed upon by you and us. Single Approval and Dual Approval. The Bank may require Dual Control on all Entries initiated through ACH. In effect, you will be required to have two different individuals initiate and approve any file submission to the Bank. You may establish a dollar limit threshold that will allow submission of files by a single individual if the threshold is not exceeded. Exceeding Exposure Limits. The Bank will reject any file that exceeds the exposure limits designated by the Bank (“Exposure Limits”). Requests to exceed the Exposure Limits must be approved prior to any transmission of files that would exceed the Exposure Limit.
AutoNDA by SimpleDocs
Security Procedures; Unauthorized and Authorized Entries; Inconsistent Entries a. The Bank will use Security Procedures to verify the authenticity of your Entries. Youwill review the Security Procedures set forthin this CMTS Agreement and the BOB Agreement. You agree that the Security Procedures are commercially reasonable for you, after taking into consideration the type, size and frequency of Entries anticipated by you. You agree periodically to review the Security Procedures in light of your actual Entries and usage, to confirm that the Security Procedures remain commercially reasonable. You must notify the Bank at 0-000-000-0000 if you determine that the Security Procedures are no longer commercially reasonable in light of your actual Entry and usage.
Security Procedures; Unauthorized and Authorized Entries; Inconsistent Entries. Purpose of Security Procedures. You agree that the purpose of the security procedures set out in this Section J is to verify the authenticity of Entries transmitted to the Bank in your name and not to detect an error in the transmission or content of any Entry, and that no security procedure for the detection of such errors has been agreed upon by you and us. Single Approval and Dual Approval. The Bank may require Single Approval (two separate individuals) or Dual Approval (three separate individuals) on all Entries initiated through ACH. In effect, you will be required to have one individual initiate and at least one individual approve any file submission to the Bank. You may establish a dollar limit threshold that will allow submission of files with no approval or Single Approval if the threshold is not exceeded. Exceeding Exposure Limits. The Commercial Banking Online service will reject any file that exceeds the exposure limits designated by the Bank (“Exposure Limits”). Requests to exceed the Exposure Limits must be approved prior to any transmission of files that would exceed the designated Exposure Limit.
Security Procedures; Unauthorized and Authorized Entries; Inconsistent Entries 

Related to Security Procedures; Unauthorized and Authorized Entries; Inconsistent Entries

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

  • Additional Procedures Applicable to High Value Accounts 1. If a Preexisting Individual Account is a High Value Account as of December 31, 2013, the Reporting [FATCA Partner] Financial Institution must complete the enhanced review procedures described in paragraph D of this section with respect to such account by December 31, 2014. If based on this review, such account is identified as a U.S. Reportable Account, the Reporting [FATCA Partner] Financial Institution must report the required information about such account with respect to 2013 and 2014 in the first report on the Account. For all subsequent years, information about the account should be reported on an annual basis.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, Federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. What this means for you: When you open an account, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Other Procurement Procedures The following procurement methods may be used for the procurement of works and goods that the Bank agrees meets the requirements established in the provisions of Section III of the Procurement Policies:

  • ADDITIONAL CONTRACTOR TERMS AND CONDITIONS WITHIN AN AUTHORIZED USER AGREEMENT Additional Contractor Terms and Conditions may become part of an Authorized User Agreement in accordance with Section 28 of Appendix B. EMPLOYEE INFORMATION REQUIRED TO BE REPORTED BY CERTAIN CONSULTANT CONTRACTORS AND SERVICE CONTRACTORS Civil Service Law § 97 and State Finance Law § 163 establish reporting requirements for maintaining certain information concerning Contract Employees working under State Agency service and consulting Contracts. State Agency consultant Contracts are defined as “Contracts entered into by a state Agency for analysis, evaluation, research, training, data processing, computer programming, engineering, environmental health and mental health services, accounting, auditing, paralegal, legal, or similar services” (“covered consultant Contract” or “covered consultant services”). The information must be provided to the state Agency awarding such Contracts, OSC, DOB and CS. To meet these requirements, the Contractor agrees to complete:

  • CONTRACTOR STAFF WITHIN AUTHORIZED USER AGREEMENT The provisions of this section shall apply unless otherwise agreed in the Authorized User Agreement. All employees of the Contractor, or of its Subcontractors, who shall perform under an Authorized User Agreement, shall possess the necessary qualifications, training, licenses, and permits as may be required within the jurisdiction where the Services specified are to be provided or performed, and shall be legally entitled to work in such jurisdiction. All Business Entities that perform Services under the Contract on behalf of Contractor shall, in performing the Services, comply with all applicable Federal, State, and local laws concerning employment in the United States. Staffing Changes within Authorized User Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!