Security Protocol. Bank and Customer shall agree to Security Protocols that must be used in connection with authorized Service(s). The specific Security Protocol for each Service is described in the Business Online Banking Terms or the applicable Service Terms in Article IV of this Agreement. Customer acknowledges and agrees that it has been informed of and understands Bank’s Security Protocol and that such Security Protocol is commercially reasonable. Customer agrees to be bound by any Payment Order, transaction or service change Order that is acted upon by Bank in accordance with such Security Protocol.
a) Bank reserves the right to issue new Security Protocol requirements and/or to cancel or change any Security Protocol by giving verbal (followed up by written) or written notice to Customer.
b) Bank also reserves the right to periodically audit Customer's information technology processes, and to mandate controls or suspend Services until Customer complies with such Security Protocol as determined by Bank in its sole discretion.
Security Protocol. Company and/or Owner shall abide by the Security Protocols established by Bank for use in connection with authorized Services(s). Company acknowledges and agree that all Authorized Representatives have been informed of and understand Bank’s Security Protocol and that such Security Protocol is commercially reasonable. Company agrees to be bound by any Payment Order, transaction, or service change Order that is acted upon by Bank in accordance with such Security Protocol. Bank reserves the right to issue new Security Protocol requirements and/or to cancel or change any Security Protocol from time to time by giving verbal (followed up by written) or written notice to Company. Separate from the Security Protocol, Bank may, in its discretion, use additional procedures to help identify, analyze, and/or address suspicious behavior. However, Bank’s failure to do so shall not be evidence of any failure to exercise reasonable care or good faith, or evidence of any failure of Bank to implement commercially reasonable Security Protocol. Bank is not responsible for its refusal to act upon any instruction received by Bank or its agents that does not comply with this Agreement, including, without limitation, where its reasonable efforts to verify instructions in accordance with the Security Protocol have failed or where action is delayed until such verification can be obtained. Additionally, and separate from the Security Protocol, we may provide Company with instructions and guidance with respect to the Services, including, but not limited to, Bank’s “Security Protocols/Best Practice Procedures” set forth on Section II hereto. Company acknowledges that Bank reserves the right to amend, from time to time, the Security Protocol as it deems necessary, including the “Security Protocols/Best Practice Procedures.” Bank also reserves the right to periodically audit Company information technology processes, and to mandate controls or suspend Services until Company complies with such Security Protocol as determined by Bank in its sole discretion. Company and/or the Owners will cooperate and provide reasonable assistance and information to conduct such audit, including, without limitation, reasonable access to computer and operating systems, policies, records, and other materials.
Security Protocol. Specify the security protocol options the Receiver supports to be followed in downloading and/or uploading from/to the FTP site. The IAIABC recommends the use of Secure Socket Layer (SSL). • Certificates: Specify required certificate usage policies when using Secure Socket Layer (SSL).
Security Protocol. For the convenience of, and courtesy to guests and visitors of Strata Lot Proprietors, the security protocol for admission and entry of all guests to the Development shall be determined by the Executive Committee in consultation with the Hotel Manager, and if necessary, Strata Lot Proprietors shall contribute to the upkeep of an intercom system to facilitate contact with Proprietors by the security station at the entrance to the Development.
Security Protocol. Both Parties shall exert due diligence in defining and implementing a written security protocol All personnel involved in the implementation of this agreement will opt in to the automatic emergency communications of both entities, such as emergency communication e-mails and/or text messages.
Security Protocol. As part of the onboarding process, candidates are required to sign intellectual property documents thus ensuring that they protect confidential information both on the clients’ and Tech Army’s side. PRINCIPAL PERSONNEL WHO WILL BE INVOLVED IN PROVIDING SERVICES Below is a breakdown of the principal personnel who will be responsible for the provisioning of resources under this contract.
Security Protocol. Service Provider will develop and implement, or satisfy Customer that Service Provider has developed and implemented, and maintain throughout the Term a comprehensive Security Plan that meets or exceeds Customer's Security Protocol as set forth in Schedule 7 or as may be required under any Pass Through Services Contract.
18.1.1 Customer may revise the Security Protocol from time to time during the Term.
18.1.2 If Customer changes such Security Protocol in a manner that results in substantial cost increases to Service Provider, Service Provider's compliance with the new Security Protocol will be subject to the Change Control Procedures. Customer will give Service Provider reasonable advance notice of changes in the Security Protocol.
18.1.3 If Service Provider intends to implement a Change to the Service Provider’s Security Plan (including pursuant to Customer's request), Service Provider will notify Customer. Service Provider will not, without Customer's prior written approval, implement any such Change if, in Customer’s reasonable judgment, such Change would cause the Service Provider’s Security Plan to fail to meet the standards set forth in the Security Protocol.
18.1.4 If Service Provider or Subcontractors discover or are notified of a breach or potential breach of security relating to the Security Protocol, Service Provider will immediately (i) notify the Customer Contract Executive of such breach or potential breach, (ii) cooperate with Customer, at Service Provider's expense, to remedy the effects of the breach or potential breach and (iii) take such measures as may be necessary to prevent the recurrence of such breach.
Security Protocol. Access to ODOT's Xxxxx Xxxx Building follows an established security process. Additional information will be provided to Lessee upon booking the auditorium regarding their obligations for this process. Xxxxxx agrees to follow all security protocols and agrees to ensure that all participants are made aware of the security protocols.
Security Protocol. (a) Seller agrees that it’s Products will meet network security requirements established in the reasonable discretion of Verizon Wireless and it will resolve Verizon Wireless identified network security issues related to Products within periods reasonably determined by the parries. Verizon Wireless agrees to provide to Seller written identification of the security requirements or issues.
(b) Performance Compensation Credit shall apply in accordance with the terms of Attachment B-6 hereto if a Priority 1 or Priority 2 (as those terms are defined in Attachment B-6 hereto) problem occurs as a result of a security requirement or issue identified by Verizon Wireless and either (i) the date reasonably determined by the parties for resolution of the requirement or issue has passed or (ii) it is more than 10 days after Verizon Wireless provided written identification of the security requirement or issue and the parties have not agreed upon a date for resolution of the issue or requirement.
Security Protocol. 4.19.1 The Owner and the Contractor note the decision by the HOA to appoint a professional and dedicated Estate Security Company to provide access control, monitoring and response services in the interest of Members and residents living on the Estate, and the Owner and the Contactor, with a view to ensuring a beneficial and co-ordinated security management system, herewith agree to adhere to the Estate Security Protocol and to accept the authority of the appointed Estate Security Company in this regard, and further confirm the obligation of the Contractor to inform his personnel and service providers accordingly.
4.19.2 The Parties confirm their awareness of the fact that the Security Protocol applicable to the Estate is determined by the HOA in consultation with the BCO and amended from time-to-time depending on the prevailing circumstances affecting the security interests of the HOA and residents, and the Contractor agrees to adhere to any amendment of the said Protocol and to instruct his personnel to follow suit.
4.19.3 The Contractor herewith confirms his personal knowledge of the terms and conditions of the current Security Protocol of the Estate pertaining to the completion of an induction course by the personnel of Contractors prior to their involvement in Construction activities, the issuing and displaying of identity cards, and the right of the HOA to cancel identity cards should any irregularity regarding the use thereof occur, and the Contractor herewith agrees to take appropriate action to ensure full compliance therewith, as well as any amendments thereto.
4.19.4 The Contractor agrees to make prior access arrangements with the Estate Security Manager, or his delegate, for ad-hoc visitors related to the Construction process, who shall be fetched by the Contractor, or his delegate, at the Entrance Gate of the Estate after compliance with the sign-in Protocol, and who shall be briefed by the Contractor, or his delegate, regarding the Rules of the Estate and the relevant provisions of this Agreement.
4.19.5 The Contractor herewith note and agree to the Security Protocol allowing the HOA and BCO to, in conjunction with the Estate Security Contractor, carry out spot checks on Vehicles and personnel of the Contractor at the Entrance Gate, with the view, among others, to ensuring compliance with identity card protocol, the Rules of the Estate, and the provisions of this Agreement regarding liquor, illegal substances, firearms, and the like, and to gi...