TELUS Online Security Sample Clauses

TELUS Online Security. 4.1. NortonLifeLock Inc.("NortonLifeLock") is the provider of the TELUS Online Security Services (the "TOS Services"). In addition to this Agreement, your access to and use of the TOS Services is subject to NortonLifeLock's license and services agreement and the NortonLifeLock and Norton Global Privacy Statement. The NortonLifeLock license and services agreement can be found here: xxxxx://xxx-xxxxxx.xxxxxx.xxx/estore/XXXX/en/NN/EULA_New_Norton_EN.pdf. The NortonLifeLock privacy statement can be found at xxxxx://xxx.XxxxxxXxxxXxxx.xxx/privacy. To view the list of eligible devices, visit Xxxxxx.xxx (xxxxx://xxxxxxx.xxxxxx.xxx/sp/fr/ca/home/current/solutions/v133891548). 4.2. The TOS Services offer a variety of service plans and features. Not every feature is available on every service plan. Certain features may require additional information or action from you. If that information is not provided or if that action is not taken, the functionality of the feature may be limited 4.2.1. Activation and enrollment through NortonLifeLock is required in order to activate your TELUS Online Security services. 4.3. It is your responsibility to ensure that your equipment and software meet the current minimum system requirements specified by TELUS as being necessary for access to the TOS Services. TELUS shall post such minimum system requirements on the TOS Services Web Site or otherwise notify you of such requirements. You acknowledge that such requirements may change from time to time, without notice, at NortonLifeLock's and/or TELUS' sole discretion. 4.4. TELUS does not guarantee that the TOS Services will operate with all equipment or software including, without limitation, all Internet applications and appliances. Not all products, services and features are available on all devices or operating systems. System requirement information on Xxxxxx.xxx 4.5. TELUS will provide assistance for billing, download and installation issues and will transfer to NortonLifeLock for assistance on issues regarding identity theft, restoration and expenses reimbursement, if applicable and depending on the plan you have subscribed to. 4.6. You acknowledge and agree that: 4.6.1. TELUS is not an insurer, if applicable and depending on the plan you have subscribed to, any claims for loss or damage arising from your use of or reliance on the TOS Service should be directed to NortonLifeLock Inc.; 4.6.2. NortonLifeLock Inc. is the provider of the TOS Services, which means your access to and us...
AutoNDA by SimpleDocs

Related to TELUS Online Security

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • SOFTWARE SECURITY If applicable, BA warrants that software security features will be compatible with the CE’s HIPAA compliance requirements. This HIPAA Business Associate Agreement-Addendum shall supersede any prior HIPAA Business Associate Agreements between CE and BA.

  • Internet Security The Service utilizes a comprehensive security strategy to protect your accounts and transactions conducted over the Internet. Prior to activating your access to the Service, our Internet Banking Department will verify your identity and authorization against information associated with the Eligible Account (s) that you request to be linked to the Service. Access IDs and Passcodes - One of the main security features protecting the Service is the unique combination of your Access Identification Code (Access ID) and Passcode. During the enrollment process, you will be asked to select a unique Access ID, and then choose a Passcode that will be used to gain access to the Service. You determine your own Passcode, which is encrypted in our database. Neither this Institution nor its Service Providers have access to this information. The Service will automatically deactivate your account after three unsuccessful login attempts within a 24-hour time frame. You may reset your passcode online or you may contact this Institution for assistance. Because your Passcode is used to access your accounts, you should treat it as you would any other sensitive personal data. • You should carefully select a Passcode that is hard to guess. • You should not use words based on your name, address or other personal information. • Special characters may be used to increase security. • Do NOT use dictionary words. The “Help” link within the Service will offer tips on choosing a secure Passcode that you can remember. • Keep your Passcode safe. • Memorize your Passcode and do NOT write it down. • You should also change your Passcode occasionally, such as every 90 days. • A Passcode should be changed immediately if you suspect that your Passcode has been compromised. This can be done at any time from the “User Services” menu after you log on to the Service. NEITHER THIS INSTITUTION NOR ITS SERVICE PROVIDERS WILL CONTACT YOU VIA TELEPHONE OR EMAIL REQUESTING PERSONAL INFORMATION, YOUR ACCESS ID, OR YOUR PASSCODE. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS INFORMATION, PLEASE CONTACT US IMMEDIATELY.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!