Security Procedures; Verification Sample Clauses

Security Procedures; Verification. The Bank may establish from time to time and require the use of Security Procedures (“Security Procedures”) to verify the authenticity of a Payment Order submitted by you. These Security Procedures may include, but not be required to provide, the use of a call-back verification process to your Authorized Representative. You understand and agree that the Bank may amend the Security Procedures. You understand that the Security Procedures are designed to verify the authenticity, and not to detect errors in transmission or content, of the Payment Order. If a Payment Order is authorized or issued by you, or on your behalf, or you otherwise benefit from such Payment Order, you agree to be bound by the Payment Order, whether or not Bank complies with the Security Procedures. The Security Procedures for Payment Orders shall consist of the procedures Bank and you use to verify that a Payment Order has been validly issued by you and shall include: 1) You assume all risks associated with disclosure of any part of the Security Procedures, including to its employees or agents. You agree to maintain the confidentiality of any Security Procedures and prevent the disclosure of such procedures except on a “need to know” basis. You warrant and agree that no individual will be allowed to initiate and/or approve Payment Orders in the absence of proper supervision and adequate safeguards. You shall notify Bank immediately at (000) 000-0000 if you become aware of or suspect that any of the procedures relating to funds transfer may have been compromised or disclosed. 2) Your unique user ID’s, passwords, MFA (Multi-Factor Authentication) ID Token (a lightweight device issued to authenticate you by Bank) and/or other access devices or authentication techniques (“Access Codes”) may be required by Bank from time to time as part of the Security Procedures for any Payment Order, including to access the Online Banking service. You agree that Access Codes are strictly confidential and must be safeguarded at all times. You shall have sole responsibility for controlling the distribution and maintaining the confidentiality of the Access Codes assigned to you. You acknowledge that anyone with knowledge of your, or your Authorized Representatives’, Access Codes may be able to issue Payment Orders on your account. You authorize Bank to execute Payment Orders authenticated pursuant to the Security Procedures, including pursuant to the instructions of anyone who has provided Bank with proper Ac...
AutoNDA by SimpleDocs

Related to Security Procedures; Verification

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Account Verification Whether or not a Default or Event of Default exists, Agent shall have the right at any time, in the name of Agent, any designee of Agent or any Borrower, to verify the validity, amount or any other matter relating to any Accounts of Borrowers by mail, telephone or otherwise. Borrowers shall cooperate fully with Agent in an effort to facilitate and promptly conclude any such verification process.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Verification Procedure (1) The signature file of each processed file is validated. (2) If processed files are pieces of a bigger file, the latter is put together. (3) Each file obtained in the previous step is then decrypted and uncompressed. (4) Each data file contained in the previous step is then validated against the format defined in Part A, Section 9, reference 1 of this Specification. (5) If Part A, Section 9, reference 1 of this Specification includes a verification process, that will be applied at this step. If any discrepancy is found in any of the steps, the Deposit will be considered incomplete.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

  • E-Verification The Vendor represents and warrants that it will ensure its compliance with the Mississippi Employment Protection Act of 2008, and will register and participate in the status verification system for all newly hired employees. Mississippi Code Annotated §§71-11-1 et seq. The term “employee” as used herein means any person that is hired to perform work within the State of Mississippi. As used herein, “status verification system” means the Illegal Immigration Reform and Immigration Responsibility Act of 1996 that is operated by the United States Department of Homeland Security, also known as the E-Verify Program, or any other successor electronic verification system replacing the E-Verify Program. Vendor agrees to maintain records of such compliance. Upon request of the State and after approval of the Social Security Administration or Department of Homeland Security when required, Vendor agrees to provide a copy of each such verification. Vendor further represents and warrants that any person assigned to perform services hereafter meets the employment eligibility requirements of all immigration laws. The breach of this agreement may subject Vendor to the following: termination of this contract for goods or services and ineligibility for any state or public contract in Mississippi for up to three (3) years with notice of such cancellation/termination being made public; the loss of any license, permit, certification, or other document granted to Vendor by an agency, department or governmental entity for the right to do business in Mississippi for up to one (1) year; or,

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Third Party Verification 4.8.1 The SPD shall be further required to provide entry to the site of the Power Project free of all encumbrances at all times during the Term of the Agreement to SECI and a third Party nominated by any Indian Governmental Instrumentality for inspection and verification of the works being carried out by the SPD at the site of the Power Project. 4.8.2 The third party may verify the construction works/operation of the Power Project being carried out by the SPD and if it is found that the construction works/operation of the Power Project is not as per the Prudent Utility Practices, it may seek clarifications from SPD or require the works to be stopped or to comply with the instructions of such third party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!