User Guides and Security Procedures Sample Clauses

User Guides and Security Procedures. We may provide you with a User ID and/or passwords (collectively, a “Security Code”) to access the Services. We may also provide you with operating procedures and user guides (“User Guides”) in connection with certain Services. You agree to: (a) comply with the User Guides and procedures that we provide to you; (b) take reasonable steps to safeguard the confidentiality and security of the Security Code, the User Guide, and any other proprietary property or information we provide to you in connection with the Services; (c) closely and regularly monitor the activities of employees who access the Services; and (d) notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached. Our security procedures are not designed for the detection of errors (e.g., duplicate payments or errors in your fund transfer instructions). We will not be obligated to detect errors by you or others, even if we take certain actions from time to time to do so. You agree to change the passwords you assign to your employees on a regular basis, but no less frequently than every 90 days. You agree to change your temporary passwords promptly after you are given access to the Services for the first time and whenever anyone who has had access to your Security Code is no longer employed or authorized by you to use the Services. We may require you to change your Security Code at any time. We may deny access to the Services without prior notice if we are unable to confirm (to our satisfaction) any person’s authority to access the Services or if we believe such action is necessary for security reasons. Each time you make a transfer or payment with a Service, you agree that our security procedures are commercially reasonable (based on the normal size, type, and frequency of your transactions). Some of our Services allow you or your Administrator to set transaction limitations and establish internal controls. Your failure to set such limitations and implement such controls increases your exposure to, and responsibility for, unauthorized transactions. You agree to be bound by any transfer or payment order we receive through the Services, even if the order is not authorized by you if it includes your Security Codes or is otherwise processed by us in accordance with our security procedures.
AutoNDA by SimpleDocs
User Guides and Security Procedures. We may provide you with a User ID and/or passwords (collectively, a "Security Code") to access the Services. We may also provide you with operating procedures and user guides ("User Guides") in connection with certain Services. You agree to:
User Guides and Security Procedures. We may provide you with a Username, password, and when applicable, a security token to access the Services. We may also provide you with operating procedures and user guides in connection with certain Services. You agree to (a) comply with the User Guides and procedures that we may provide to you; (b) take reasonable steps to safeguard the confidentiality and security of the Passwords, the User Guide, and any other proprietary property or information we provide to you in connection with the Services;(c) you will utilize the most recent operating systems and network browsers (d) closely and regularly monitor the activities of users who access the Services, and (e) notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached. Our security procedures are not designed for the detection of errors (e.g., duplicate payments or errors in your fund transfer instructions). We will not be obligated to detect errors by you or others, even if we take certain actions from time to time to do so. You agree to change your temporary passwords promptly after you are given access to the Services for the first time and whenever anyone who as had access to your password is no longer employed or authorized by you to use the Services. We may require you to change your Password at any time. We may deny access to the Services without prior notice if we are unable to confirm any person’s authority to access the Services or if we believe such action is necessary for security reasons. Each time you make a transfer or payment with a Service, you warrant that our security procedures are commercially reasonable (based on normal size, type, and frequency of your transactions). Some of our Services allow you or your Senior Administrator to set transaction limitation and establish internal controls. Your failure to set such limitations and implement such controls increases your exposure to, and responsibility for, unauthorized transactions. You agree to be bound by any transfer or payment order we receive through the Services, even if the order is not authorized by you, if it includes your password or is otherwise processed by us in accordance with our security procedures.
User Guides and Security Procedures. We may provide you with a User ID and/or passwords (collectively, a "Security Code") to access the Services. We may also provide you with operating procedures and user guides ("User Guides") in connection with certain Services. You agree to: (a) comply with the User Guides and procedures that we provide to you; (b) take reasonable steps to safeguard the confidentiality and security of the Security Code, the User Guide, and any other proprietary property or information we provide to you in connection with the Services; (c) closely and regularly monitor the activities of employees who access the Services; and (d) notify us immediately if you have any reason to believe the security or confidentiality required by this provision has been or may be breached. Our security procedures are not designed for the detection of errors (e.g., duplicate payments or errors in your fund transfer instructions). We will not be obligated to detect errors by you or others, even if we take certain actions from time to time to do so.

Related to User Guides and Security Procedures

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Safety Procedures The Contractor shall: (a) comply with all applicable safety regulations according to Attachment H; (b) take care for the safety of all persons entitled to be on the Site; (c) use reasonable efforts to keep the Site and Works clear of unnecessary obstruction so as to avoid danger to these persons; (d) provide fencing, lighting, guarding and watching of the Works until completion and taking over under clause 10 [Employer's Taking Over]; and (e) provide any Temporary Works (including roadways, footways, guards and fences) which may be necessary, because of the execution of the Works, for the use and protection of the public and of owners and occupiers of adjacent land.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Procurement procedures 11.1 The Recipient must secure the best value for money and shall act in a fair, open and non-discriminatory manner in all purchases of goods and services.

  • Reporting Procedures Enter in the XXX Entity Management area the information that XXX requires about each proceeding described in paragraph 2 of this award term and condition. You do not need to submit the information a second time under assistance awards that you received if you already provided the information through XXX because you were required to do so under Federal procurement contracts that you were awarded.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • WARRANTY PROCEDURES You need proof of purchase for warranty service.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!