The Browser Sample Clauses

The Browser. When using your browser to access a Service, the browser uses encryption technology that scrambles data to make it readable by the sender and designated receiver only. A key is required to decode the information. When you request information about your accounts or loans, the encrypted request is sent to us or our service provider. We send our replies back to you in an encrypted format. Even though the information sent back and forth is encrypted, you will be able to read the data on your computer screen. You are responsible for maintaining an updated version of your internet browser. If you need to upgrade your browser follow the simple instructions on how to do this located in the browser's HELP menu. We review and approve the use of different browsers to ensure they meet our strict security standards. In addition to the required browser encryption, usernames or customer IDs and passwords or PINs are used as another feature to help ensure that your transactions on the Internet are safe and secure. When you log on to the Services, we authenticate you by your username/Customer ID and password/PIN. This information is known only by you and it is up to you to keep this information secure. If you think that your information has been compromised, you should immediately: 1) Change your password or PIN immediately; 2) contact a Client Service Specialist; and 3) check your account history for any unauthorized transactions. Quicken is a registered trademark of Intuit, Inc. Microsoft Money and Microsoft Internet Explorer, Excel are registered trademarks of Microsoft Inc. Investment advisory services provided to City National Bank clients through City National Rochdale, LLC, a wholly owned subsidiary of City National Bank. All investing is subject to risk, including the possible loss of the money you invest. Past performance is no guarantee of future performance.
AutoNDA by SimpleDocs

Related to The Browser

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Workspace Whenever an academic or student union building is planned for construction or renovation, there shall be consideration of the needs for office space of graduate student employees in relevant departments. The University shall provide to all graduate student employees an on-campus mailbox. With approval of their department chair, graduate student employees shall be given key access into the buildings in which their offices or labs are housed for the purpose of performing assistantship work in said office or lab which is permitted by the department chair to be done outside of regular business hours. Department chairs may deny key access into buildings and/or offices/labs in order to minimize access to confidential materials or to minimize the risk of theft, fire/explosion hazards, personal harm, and other security/safety issues. Denial shall not be arbitrary or capricious. If key access is denied, the reason will be provided to the graduate student employee(s) involved. All departmental policies related to the issuance of keys to TOs shall apply equally to TOs in the Division of Continuing Education. Graduate student employees shall have reasonable access to photocopiers for copying related to their employment within departmental guidelines for usage. The parties agree to the creation of a joint committee, composed of equal numbers of representatives of the Union and the University, that will attempt to develop a plan to provide appropriate telephone access for bargaining unit members in connection with their employment responsibilities. The University will provide to this committee a report on the offices assigned to bargaining unit members during the 2005-2006 academic year and the proximity of those offices to a University telephone available for use by the respective bargaining unit member.

  • E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.

  • Linking to the Website and Social Media Features You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval, or endorsement on our part. This Website may provide certain social media features that enable you to: • Link from your own or certain third-party websites to certain content on this Website. • Send emails or other communications with certain content, or links to certain content, on this Website. • Cause limited portions of content on this Website to be displayed or appear to be displayed on your own or certain third-party websites. You may use these features solely as they are provided by us, and solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not: • Establish a link from any website that is not owned by you. • Cause the Website or portions of it to be displayed on, or appear to be displayed by, any other site, for example, framing, deep linking, or in-line linking. • Link to any part of the Website other than the homepage. • Otherwise take any action with respect to the materials on this Website that is inconsistent with any other provision of these Terms of Use. The website from which you are linking, or on which you make certain content available, must comply in all respects with the Content Standards set out in these Terms of Use. You agree to cooperate with us in causing any unauthorized framing or linking immediately to stop. We reserve the right to withdraw linking permission without notice. We may disable all or any social media features and any links at any time without notice in our discretion.

  • Misuse of Internet-based Services You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • Functionality Customer is entitled to additional functionality previously purchased or bundled with the software if available in the version or update released on or after the start date of the Agreement. Customer acknowledges that certain functionality in current and previous software versions may not be available in future upgrades. Added functionality may require additional paid services (clinical and technical) to configure and support.

  • Content You Provide You hereby grant to the Financial Institution and its service providers, including Central 1 and Yodlee Inc. (collectively, “Service Providers”) a license to use any information, data, passwords, materials or other content (collectively, “Your Content”) that you provide through or to the PFM Service for the following purposes:

  • AT WEBSITE XXX XXXXXXXXXXXXXXXX.XXX Prospective bidders may submit bids for the property online via xxx.xxxxxxxxxxxxxxxx.xxx (For online bidding, please register at least one (1) working day before auction day for registration & verification purposes)

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

Time is Money Join Law Insider Premium to draft better contracts faster.