User Identification. 6.2.5.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.
6.2.5.2 User identification shall be accomplished by the assignment of a unique, permanent userid, and each userid shall have an associated identification number for security purposes.
6.2.5.3 Userids will be revalidated pursuant to each Party’s corporate policies.
User Identification. We authorize you and your Authorized Workforce to use the User IDs assigned to you by us. You acquire no ownership rights in any User ID, and User IDs may be revoked or changed at any time in our sole discretion. You will adopt and maintain reasonable and appropriate security precautions for User IDs to prevent their disclosure to or use by unauthorized persons. Each member of your Authorized Workforce shall have and use a unique identifier. You will use your best efforts to ensure that no member of your Workforce uses a User ID assigned to another person.
User Identification. 3.4.1 All Users authorised to submit payments in relation to an Account must provide due diligence information to the Bank where applicable.
3.4.2 The Client undertakes to provide due diligence information to the Bank in respect of any User or User Administrator upon the request of the Bank.
User Identification. This card is personal and non-transferable. Identification of PM users shall be corroborated by holders displaying a valid PM card and national identity document or other legally valid identity document. For users who obtain a National Library card, identification within the National Library shall be by means of production of their valid National Library card.
User Identification. The PM card is a personal and non-transferable document. The identification of the PM users will be made by means of the relevant updated PM card and the DNI (National Identity Card) or any other identification document with legal validity. Once the National Library of Spain card has been obtained, the identification of the users within it will be carried out through the updated National Library of Spain card.
User Identification. Upon registration, you must identify each User who will use a Bark Phone and the Bark Wireless Services and provide the information necessary for Bark to provide the Bark Wireless Services to such User as detailed in the registration process.
User Identification. 33.11.6.1 Access to each Party’s corporate resources will be based on identifying and authenticating individual users in order to maintain clear and personal accountability for each user’s actions.
33.11.6.2 User identification shall be accomplished by the assignment of a unique, permanent userid, and each userid shall have an associated identification number for security purposes.
33.11.6.3 Userids will be revalidated on a monthly basis. 33.11.7 User Authentication.
33.11.7.1 Users will usually be authenticated by use of a password. Strong authentication methods (e.g. one time passwords, digital signatures, etc.) may be required in the future.
33.11.7.2 Passwords must not be stored in script files.
33.11.7.3 Passwords must be entered by the user in real time.
33.11.7.4 Passwords must be at least 6-8 characters in length, not blank or a repeat of the userid; contain at least one letter, and at least one number or special character must be in a position other than the first or last one. This format will ensure that the password is hard to guess. Most systems are capable of being configured to automatically enforce these requirements. Where a system does not mechanically require this format, the users must manually follow the format.
33.11.7.5 Systems will require users to change their passwords regularly (usually every 31 days).
33.11.7.6 Systems are to be configured to prevent users from reusing the same password for 6 changes/months.
33.11.7.7 Personal passwords must not be shared. A user who has shared his password is responsible for any use made of the password.
User Identification. We authorize you and your Authorized Workforce to use the Credentials uniquely assigned to, or selected by, each such individual User. You acquire no ownership rights in any such Credentials, and such Credentials may be revoked, reset or changed at any time in the discretion of us or the Provider of Record. You will adopt and maintain reasonable and appropriate security precautions for your Credentials to prevent their disclosure to or use by unauthorized persons. Each member of your Authorized Workforce shall have and use a unique identifier. You will ensure that no member of your Workforce uses Credentials assigned to another Workforce member.
User Identification. In the Service Documentation for the Service, you will specify your primary representative(s) for the Service (“Primary Corporate Administrator(s)”). We will assign to you a Customer ID and Customer Password at the entity level and will assign to each Primary Corporate Administrator a User ID and User Password. IDs and passwords may be reset or changed from time to time, and we may require that they be changed from time to time. Your Primary Corporate Administrator(s) may authorize additional administrators with the same or other powers (together with the Primary Corporate Administrators, the “Corporate Administrators”) and assign them their own User IDs and User Passwords. You represent to us that each Corporate Administrator has full authority on your behalf to: • designate himself/herself and other individuals who will have authority to access the Service (“Authorized Users”), establish their permission rights, and otherwise act on your behalf in connection with the Service; • assign User IDs and User Passwords to Authorized Users for access to the Service; and • accept on your behalf all Service Documentation and other documents and correspondence relating to the Service. The Corporate Administrators are responsible for assigning User IDs and User Passwords to Authorized Users. We have no control over the establishment of Corporate Administrators (other than Primary Corporate Administrators), Authorized Users, or their Identification Data. You will notify us immediately if a Primary Corporate Administrator ceases to be associated with your organization or is no longer authorized to access the Service on your behalf, or if for any other reason you would like to modify or remove a Primary Corporate Administrator’s access to the Service. Any such notice must specifically mention the individual’s status as a Primary Corporate Administrator with respect to the Service. If you have Subsidiaries or affiliates with separate accounts, we may, in our discretion, treat each such entity as a separate entity for all security and set-up procedures, including the assignment of a separate Customer ID and Customer Password, or may allow, upon your request, use of common Customer ID and Customer Password. We may also allow common User IDs and User Passwords and common Security Devices (as defined below) for all entities for which a particular Authorized User is authorized to act. We recommend against the use of common User IDs and User Passwords. You understand that, ex...
User Identification. The Corporate Administrator designated under the terms of the Master Agreement shall have the authority to enter into FX Transactions through OLBB by means of a User ID, User Password and Security Device that we assigned to the Corporate Administrator. You hereby remake the representations set forth in the Master Agreement with respect to the authority of the Corporate Administrator, including the Corporate Administrator’s authority to grant permission to Authorized Users to engage in FX Transactions. You understand that the use of Identification Data and the Security Device are the “Security Procedures” for accessing the Service. We are authorized to act and rely upon all transactions submitted to us using the Identification Data and Security Device. We do not monitor FX Transactions entered into by you using the Service.