User Passwords. If your Application runs as a "client" on a computer or mobile device owned by an Direct Transfer user, you: (i) may not store the user's password on that device without consent from the user; (ii) may not transmit or store that password to any system other than the Direct Transfer service; (iii) must protect the password using the standard protection mechanism for the platform (the password MUST NOT be stored in cleartext); and (iv) must provide a mechanism for the user to log out, which must completely remove the username and password from your application and its persistent storage. If your Application runs as an Internet service on a multi-user server, you must not ask for, view, store or cache the sign-in name or password of Direct Transfer user accounts. Authorization to access the user's account is only permitted via the "web service" authentication scheme in the API.
User Passwords. The Subscriber shall communicate any claims of non-receipt of User password(s) to Blue J Legal within 14 days of signing of this Agreement.
User Passwords. Customer shall ensure that its Users protect their unique user identification name and not make them available to persons or entities not authorized to use the Services. Linkfluence will only store User’s passwords in encrypted form. Linkfluence personnel will not be able to read User’s passwords.
User Passwords. Delta Fiber Users will have a user name and password, which allows them to gain access to the Delta Fiber Services.
User Passwords. Passwords are case sensitive and support any visible extended characters. The Customer can configure: • The minimum password length • The required mixture of character types that Authorised Users and Learners must adhere to • The password expiry interval All passwords are encrypted in storage; hashed and salted with SHA2_512. Authorised Users and Learners may choose to authenticate via third parties (Facebook, Azure AD) by setting up a "OneFile Keychain". In these cases, a token provided by that third-party is stored to authenticate the Authorised User or Learner. A single superuser account is initially created for the Customer to create the different accounts it requires for its Authorised Users and Learners. Some Authorised Users will have different roles to fulfil in the Software so these are designated when the user accounts are created. For more details on what the different roles are, what their functions, permissions and restrictions are, please consult the relevant Documentation for the Software that you have subscribed to. Our Software keeps an audit trail of Authorised Users and Learners logging in and how they interact with certain functions. These audit trails can be accessed online and through reports. Our Software is hosted at two physically different data centres. The primary centre hosts the live, production Software that is used by everyone under normal circumstances. The secondary centre is used as a disaster recovery centre that constantly receives backups from the first centre, enabling us to elevate the second centre should the first centre become inoperable. Each centre uses a different Active Directory domain to keep them isolated from other networks. There is no Virtual Private Network (VPN) to the secondary centre, and multi-factor authentication is used by our administrators for management. A business continuity plan is maintained that provides guidance on when and how to elevate our secondary centre. We currently work to a recovery point objective (RPO) of 30 minutes and a recovery time objective (RTO) of 30 minutes.
User Passwords. You acknowledge that changing your user password on a regular basis is helpful in the effort to prevent unauthorized access to your personal account. You are responsible for protecting the confidentiality of your username and password and are exclusively responsible for all activities and conduct that occur under your user name and password. You are responsible for notifying Xxxxx Telephone immediately upon learning that your user name and password have been used or may be used without your authorization. At the end of each Internet session, you are responsible for logging out and terminating the session. You are solely liable for any loss, damage, additional service charges and/or third party charges associated with or as a result of failure to comply with section 5.3 or any other section of this Agreement.
User Passwords. PearlComm Users may have a user name and password, which allows them to gain access to the PearlComm Services.
User Passwords. Customer is solely responsible for keeping Customers’ and/or Users’ account name, password, and any other login credentials confidential. Customer is responsible for any and all activities that occur within Customer’s Account, whether authorized by Customer or not. Customer must notify Company immediately of any unauthorized access or use of Customer’s Account. Company will not be held responsible or liable for any losses due to lost or hacked passwords.
User Passwords. WAVE RURAL CONNECT Users will have a user name and password, which allows them to gain access to the WAVE RURAL CONNECT Services.
User Passwords. FARMERS RURAL CONNECT Users will have a user name and password, which allows them to gain access to the FARMERS RURAL CONNECT Services.