Security Recommendations Sample Clauses

Security Recommendations. The following recommendations non exhaustively set forth security recommendations that Fuzer's Client must take into account when using the Services or Equipment. Failing to comply with those recommendations will discharge Fuzer of any liability. General recommendations The Client must ensure that all employees, consultants, subcontractors, agents and other representatives are informed of those recommendations, so that they are able to comply with them. The Client will take all reasonable measures to prevent his equipment, employees, consultants, subcontractors, agents and other representatives to cause any damage to Fuzer assets (including hardware, software, data and brand image). This includes data losses, data corruptions and services interruptions due to: ● wrong configurations, errors, misconduct, false-operations and voluntary data alterations; ● spreading of viruses, Trojans, backdoors, or any other type of malicious code. Network Segregation Recommendation The Client must implement segregation between the voice and data network. The technical rules to be implemented by the Client for such purpose can be asked to Fuzer. The Client may not expose any service on the SOP(s) or any other Fuzer Equipment directly to the public Internet.
AutoNDA by SimpleDocs
Security Recommendations. We require an alpha-numeric password that is a minimum of 8 characters in length. We recommend that you create a password that utilizes numbers, special characters and both upper and lower case alpha characters. We require you to change your password periodically and do not allow you to use one of your previous four (4) passwords. Your password should not be associated with any commonly known or easily accessible personal identification, such as social security numbers, address, date of birth, names of children, and should be memorized rather than written down First Volunteer Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your access devices using a continually updated virus protection product that also scans Internet and e-mail files.
Security Recommendations. The upward trend of more and more customers using online channels for banking and financial services has expanded the opportunities for criminals and cyber-crime. Cyber criminals using malware, keystroke loggers and/or Trojan viruses have the ability to capture customer information such as login credentials and Multi-Factor Authentication challenge questions/answers and can highjack the user’s computer using their IP address so that the criminal will appear to be the end-user. Some of the most common approaches for criminals to compromise end user data is to take advantage of end users signing on to unsecured networks, not having up to date virus protection and security patches, visiting compromised web sites or opening attachments with embedded malware or Trojan software. Due to the sophisticated nature of this crime, there is not one single solution for online security. The best approach is a multi-layered approach. The Bank recommends use of a stand-alone computer to perform Cash Management activities ensuring that the computer is hardened, is not used for web-surfing or email, and that anti-virus software and security patches are installed and kept current. The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a continually updated virus protection product that also scans Internet and e-mail files. An undetected virus may corrupt and destroy programs, files and your hardware, and may even affect portions of the software used for The Bank’s online banking. BANKING TRANSACTIONS WITH ONLINE BANKING Customer authorizes the Bank to take on the Customer’s behalf any action necessary to complete any transaction initiated through the Services. This authority includes, without limitation, the withdrawal of funds from any of Customer’s Accounts or the obtaining of a loan or new deposit account both of which are effective as though the Customer had signed a check or withdrawal form to make the withdrawal or signed a direct loan check to obtain the loan. New services may be introduced for Online Banking from time to time. The Bank will notify you of the existence of these new services. By using these services when they become available, you agree to be bound by the rules governing the use of such services, which will be made available to you concerning these services.
Security Recommendations. The upward trend of more and more customers using online channels for banking and financial services has expanded the opportunities for criminals and cyber-crime. Cyber criminals using malware, keystroke loggers and/or Trojan viruses have the ability to capture customer information such as Login credentials and Multi-Factor Authentication challenge questions/answers and can highjack the user’s computer using their IP address so that the criminal will appear to be the end-user. Some of the most common approaches for criminals to compromise end user data is to take advantage of end users signing on to unsecured networks, not having up to date virus protection and security patches, visiting compromised web sites or opening attachments with embedded malware or Trojan software. Due to the sophisticated nature of this crime, there is not on single solution for online security. The best approach is a multi-layered approach. In addition to the information mentioned in the Use of Your Security Password; Authorization section: We require an alpha-numeric password that is 8-10 characters in length. We recommend that you create a password that utilizes both upper and lower case alpha characters. While it may seem like an inconvenience to change your password, this is an essential piece of the multi–layered security approach. We require you to change your password from time to time and do not allow you to use one of your previous four (4) passwords. Your password should not be associated with any commonly known or easily accessible personal identification, such as social security numbers, address, date of birth, names of children, and should be memorized rather than written down. As an enhanced online security feature, the System utilizes the RSA Multi-Factor Authentication Solution. RSA Authentication provides you added safety by helping ensure that only you can access your bank account. RSA Authentication remembers which computer(s) you normally use, preventing potential fraudsters from logging into your account even if they somehow obtain your login information. When the computer you are using to access the System is not recognized, you must verify your identity by responding correctly to the Challenge Questions that you established during the User enrollment process before you can proceed to access the System. We recommend that Cash Management Administrators establish a series of valid days of the week and/or time limitations for each User within the User settings....
Security Recommendations. To help enhance your Internet Service security, we recommend that you follow some general safety guidelines: • Never walk away from your computer while logged on to this service. • Memorize your PIN. • Don’t share your PIN with anyone. • Don’t choose a PIN that you use as a password or code for other unrelated services. • Choose a PIN that’s not easy to guess. For example, use a minimum of six characters with a combination of numeric and alpha characters, and do not use names of family members or pets alone or followed by a number. Words in a dictionary, derivatives of user ids and common characters sequence such as “12345678” should not be employed. Likewise, PINs should not contain proper names, geographic locations, common acronyms, slang or personal details such as spouse’s name, license plate, social security number, and birthday. Choosing a PIN that contains at least one lower case and one upper alphabetic character and the use of non- alphabetic characters where feasible such as a numeral (0-9) or punctuation character is strongly recommended. • Never give your PIN to somebody else, even if they identify themselves as our employee. Under no circumstances do we need your PIN. • You must report errors or problems immediately to us. Should you receive a suspicious email or telephone request for information that purports to be from us, you must notify us immediately. In any such case, notify your banker or call us at (000) 000-0000. IN CASE OF ERRORS OR QUESTIONS ABOUT YOUR ELECTRONIC TRANSFERS Telephone us at 000-000-0000 or write us at Denmark State Bank, 000 X. Xxxx Xx., X.X. Xxx 000, Xxxxxxx, XX, 00000 as soon as you can, if you think your statement or receipt is wrong or if you need more information about a transfer listed on the statement or receipt. Also, if your statement or posting shows transfers that you did not make, tell us at once. We must hear from you no later than 60 days after we made available to you the FIRST statement on which the problem or error appeared. If you do not tell us within 60 days of the date your statement is made available to you, you may not get any money you lost after the 60 days if we show that we could have stopped someone from taking the money if you would have told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods.
Security Recommendations. To help enhance your Online Services security, we recommend that you follow some general safety guidelines: ▪ When creating your Access ID, it must be unique and may not be used for other users that are authorized to access Online Services. ▪ If you are logged in to your Online Services using a public computer, do not walk away from the computer unless you have successfully logged out. ▪ Memorize your Password but if you must write it down, keep it stored in a safe or locked drawer or reputable third-party password keeper application. ▪ Do not give out your Account information, Password, or Access ID. ▪ Don’t choose a Password already used for other unrelated services. ▪ Choose a Password that is not easy to guess, keeping in mind that the requirement for choosing your Password is a minimum of eight (8) with a maximum of seventeen (17) characters, and must include one (1) numeric, one (1) alpha and one (1) special character. ▪ Do not use the word “password” in your Password. ▪ Consider using a passphrase as your Password. ▪ Try not to use names of family members or pets followed by a number. In addition, words in a dictionary, derivatives of Access IDs and common character sequences such as “12345678” should not be employed. Likewise, Passwords should not contain proper names, geographic locations, common acronyms, slang or personal details such as spouse’s name, license plate, social security number, or birthday. ▪ If you should receive a suspicious email or telephone call requesting information that purports to be from Denmark State Bank or notice errors on your account, please contact us immediately at 920-863-2161.

Related to Security Recommendations

  • Conclusion and Recommendations D. Evaluations for Offenders without a sex offense conviction shall answer the following additional referral questions in the evaluations:

  • Manufacturer's Recommendations All work or materials shall be installed in accordance with the manufacturer's recommendations and requirements. The Contractor shall obtain the manufacturer’s recommendations and requirements, for its use at the Site in executing the Work, copies of bulletins, circulars, catalogues, or other publications bearing the manufacturer’s titles, numbers, editions, dates, etc. If the manufacturer’s recommendations and requirements are not available, the Contractor shall request installation instructions from the Design Professional.

  • Conclusions and Recommendations The demonstration and evaluation process provided an opportunity to test community specific tools with a range of end users from the memory institution domain and to gain greater insight into both the current and future evolution of the SHAMAN prototypes for preservation, access and re-use. Xxxx et al. (2000) in their user evaluation study of the Alexandria Digital Library which incorporated the evaluation of a Web prototype by earth scientists, information specialists and educators raised four key questions in relation to their findings that SHAMAN may be well advised to consider, they are paraphrased here with our conclusions from the investigations. What have we learned about our target organizations and potential users?  Memory institutions are most definitely not a homogenised group; their needs and requirements differ greatly across the domain.  Representatives of the archives community are agreed on the benefits of SHAMAN‟s authenticity validation function.  The representatives of government information services remained unconvinced as to the need or benefit of grid technologies or distributed ingest while librarians saw the value of grid access as an asset of the framework. What have we learned about the evaluation approach for digital preservation?  Within the limits of the exercise, in terms of time-frame and resources, the approach adopted has generated useful information for the further development of demonstrators and for the development of the SHAMAN framework overall. What have we learned about the SHAMAN ISP1 demonstrator?  Respondents to the evaluation questionnaires and the focus groups indicate that, overall, the presentation of the demonstrator worked effectively and that, in general, participants in the demonstration and evaluation events were able to understand the intentions of the demonstration and to apply the ideas presented to their own context. What have we learned about the applicability of the SHAMAN framework to memory institutions?  Respondents to the questionnaires and participants in the focus groups readily identified the value of the SHAMAN framework to their own operations. The majority had not yet established a long-term digital preservation policy, but recognized the need. Generally, the concepts of distributed ingest and grid operations found favour.  Virtually all practitioners in the focus groups, however, drew attention to need of a lower level demonstration that would be closer to their everyday preservation troubles, especially for digital preservation to be applied to non-textual materials, such as film, photographs and sound archives. In addition to the criteria suggested by Xxxx et al., we can add a further project-related question: What have we learned that has implications for the training and dissemination phase of the Project?  It was not part of the remit of the demonstration and evaluation specifically to discover information of relevance to the training and dissemination function. However, a number of factors will affect the efficacy of any training programme in particular. o First, no common understanding of digital preservation can be assumed of the potential target audiences for training. Consequently, it is likely that self-paced learning materials will be most effective in presenting the SHAMAN framework. o Secondly, the aims of SHAMAN as a project must be conveyed clearly: specifically, that it is a kind of „proof-of-concept‟ project and is not intended to deliver a package of programs capable of being implemented by institutions. o Thirdly, it needs to be emphasised that the SHAMAN framework is not limited to text documents; it can be applied to materials of all kinds. However, the demonstrations relate to bodies of material that were actually available for use. o Fourthly, the existing presentation materials are capable of being adapted for use in training activities. o Finally, the target audiences will appreciate the possibility of online access to the demonstrator, which will need to have very great ease of access in order that people with diverse backgrounds are able to use it with equal facility. We believe that, overall, WP14 has met its aims and objectives in this demonstration and evaluation of ISP1. Valuable lessons have been learnt by all parties involved, which will be transferred to the evaluation of ISP2 in the coming months.

  • Representations and Recommendations Unless otherwise stated in writing, neither Xxxxxxxx Realty Inc, nor its brokers or licensees have made, on their own behalf, any representations or warranties, express or implied, with respect to any element of the Property including but not limited to, the legal sufficiency, legal effect, or tax consequences of this transaction. Any information furnished by either party should be independently verified before that party relies on such information. Xxxxxxxx Realty Inc. recommends that Buyer consult its attorneys and accountants before signing this Agreement regarding the terms and conditions herein and that Seller satisfy itself as to the financial ability of Buyer to perform.

  • JOINT SETTLEMENT RECOMMENDATION 2. Staff conducted an investigation of the Respondent’s activities. The investigation disclosed that the Respondent had engaged in activity for which the Respondent could be penalized on the exercise of the discretion of the Hearing Panel pursuant to s. 24.1 of By-law No. 1.

  • Recommendation The Sheriff recommends approval of the Board Order. The County Administrator concurs with the recommendation of the Sheriff. Should the Board of Commissioners concur with their recommendations, approval of the Board Order will implement that action. Respectfully submitted, /s/ XXXXX XXXXXX Xxxxx Xxxxxx County Administrator

  • RECOMMENDATION OF LEGAL AND TAX COUNSEL By signing this document, Xxxxx acknowledges that Xxxxxx has 210 advised that this document has important legal consequences and has recommended consultation with legal and tax or other counsel 211 before signing this Buyer Listing Contract.

  • Recommendations It is recommended that:

  • Announcement of Vacancies 11.6.1 All vacancy notices of classified bargaining Unit Member positions shall be distributed as follows:

  • Required Disclosure Notwithstanding Section 29(a) above, if the receiving Party becomes legally compelled to disclose the Confidential Information by a court, Governmental Authority or Applicable Law, or is required to disclose by the listing standards of any applicable securities exchange of the disclosing Party’s Confidential Information, the receiving Party shall promptly advise the disclosing Party of such requirement to disclose Confidential Information as soon as the receiving Party becomes aware that such a requirement to disclose might become effective, in order that, where possible, the disclosing Party may seek a protective order or such other remedy as the disclosing Party may consider appropriate in the circumstances. The receiving Party shall disclose only that portion of the disclosing Party’s Confidential Information that it is required to disclose and shall cooperate with the disclosing Party in allowing the disclosing Party to obtain such protective order or other relief.

Time is Money Join Law Insider Premium to draft better contracts faster.