Use of Security Procedures Sample Clauses

Use of Security Procedures. You acknowledge that you have been advised of the various security procedures employed by us, that you understand them, and that the Instructions you will issue to us under this Schedule will employ the security procedure suitable to your particular circumstances.
AutoNDA by SimpleDocs
Use of Security Procedures. (a) Notwithstanding the use by the parties at any time of a Security Procedure set forth in the User Guide or the use by the parties of other procedures capable of detecting Customer’s errors, Bank shall not be responsible for the detection of and shall have no liability for failing to detect any Customer error contained in any payment order sent by Customer to Bank. In some cases, the Bank may in its sole discretion take actions in addition to the Security Procedure to further identify or establish the authorization of the caller, or to detect a potential error in the transmission or content of the transfer request. Such additional actions shall not be deemed part of the agreed Security Procedure for that or any other transfer request. In no event shall taking or omitting any additional action by Bank in response to any one or more transfer requests give rise to any liability or standard of care on the part of Bank beyond the specific Security Procedure. The agreed Security Procedure is not designed or intended to detect errors in the transmission of, or the content of, the Customer’s transfer requests (e.g., duplicate payments, or errors in beneficiary or amount). Bank is not obligated to detect errors by the Customer or others, even if Bank takes certain actions from time to time to do so.
Use of Security Procedures. The initiation of a transfer, payment, stop payment order, check reorder or other instruction or transaction (“Instruction”) on myTrustmark℠ using your myTrustmark℠ user ID (login ID), password or the Security Procedures (whether or not authorized by you) constitutes your authorization for us to act on that Instruction and you agree that you are bound by that Instruction.

Related to Use of Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • CUSTOMS PROCEDURES 1. Each Party shall endeavour to apply its customs procedures in a predictable, consistent and transparent manner.

  • SAFETY PROCEDURES The Contractor shall:

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Operational Procedures In order to minimize operational problems, it will be necessary for trade information to be supplied in a secure manner by the Subadviser to the Fund’s Service Providers, including: JPMorgan Chase Bank, National Association (the “Custodian”), Virtus Fund Services (the “Fund Administrator”) BNY Mellon Investment Servicing (US) Inc., (the “Sub-Accounting Agent”), any Prime Broker to the Series, and all other Counterparties/Brokers as required. The Subadviser must furnish the Fund’s service providers with required daily information as to executed trades in a format and time-frame agreed to by the Subadviser, Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties and designated persons of the Fund. Trade information sent to the Custodian, Fund Administrator, Sub-Accounting Agent and Prime Broker/Counterparties must include all necessary data within the required timeframes to allow such parties to perform their obligations to the Series. The Sub-Accounting Agent specifically requires a daily trade blotter with a summary of all trades, in addition to trade feeds, including, if no trades are executed, a report to that effect. Daily information as to executed trades for same-day settlement and future trades must be sent to the Sub-Accounting Agent no later than 4:30 p.m. (Eastern Time) on the day of the trade each day the Fund is open for business. All other executed trades must be delivered to the Sub-Accounting Agent on Trade Date plus 1 by Noon (Eastern Time) to ensure that they are part of the Series’ NAV calculation. (The Subadviser will be responsible for reimbursement to the Fund for any loss caused by the Subadviser’s failure to comply with the requirements of this Schedule A.) On fiscal quarter ends and calendar quarter ends, all trades must be delivered to the Sub-Accounting Agent by 4:30 p.m. (Eastern Time) for inclusion in the financial statements of the Series. The data to be sent to the Sub-Accounting Agent and/or Fund Administrator will be as agreed by the Subadviser, Fund Administrator, Sub-Accounting Agent and designated persons of the Fund and shall include (without limitation) the following:

  • AML/KYC Procedures “AML/KYC Procedures” means the customer due diligence (CDD) procedures of a Reporting Financial Institution pursuant to the anti-money laundering or similar requirements of the jurisdiction concerned to which such Reporting Financial Institution is subject.

  • Referral Procedures (a) For signatory Unions now having a job referral system contained in a Schedule A, the Contractor agrees to comply with such system and it shall be used exclusively by such Contractor, except as modified by this Agreement. Such job referral system will be operated in a nondiscriminatory manner and in full compliance with federal, state, and local laws and regulations which require equal employment opportunities and non-discrimination. All of the foregoing hiring procedures, including related practices affecting apprenticeship, shall be operated so as to consider the goals of the College to encourage employment of College residents and utilization of small local businesses on the Project, and to facilitate the ability of all Contractors to meet their employment needs. The Unions will exert their best efforts to recruit and refer sufficient numbers of skilled craft workers to fulfill the labor requirements of the Contractor, including specific employment obligations to which the Contractor may be legally and/or contractually obligated; and to refer apprentices as requested to develop a larger, skilled workforce. The Unions will work with their affiliated regional and national unions, and jointly with the Community Workforce Coordinator and others designated by the College, to identify and refer competent craft persons as needed for Project Work, and to identify and hire individuals, particularly residents of the College, for entrance into joint labor/management apprenticeship programs, or to participation in other identified programs and procedures to assist individuals in qualifying and becoming eligible for such apprenticeship programs, all maintained to increase the available supply of skilled craft personnel for Project Work and future construction of maintenance work to be undertaken by the College.

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

Time is Money Join Law Insider Premium to draft better contracts faster.