Common use of Verification and Security Procedures Clause in Contracts

Verification and Security Procedures. (a) Bank and Customer shall from time to time agree upon security procedures to be followed by Customer upon the issuance of an instruction and/or by Bank upon the receipt of an instruction, so as to enable Bank to verify that such instruction is authorized (“Security Procedures”). A Security Procedure may, without limitation, involve the use of algorithms, codes, passwords, encryption and telephone call backs. The Customer acknowledges that Security Procedures are designed to verify the authenticity of, and not detect errors in, instructions. For the avoidance of doubt, the parties agree that a SWIFT message issued in the name of the Customer through any third party utility agreed upon by the parties as being a method for providing Instructions and authenticated in accordance with that utility’s customary procedures, shall be deemed to be an authorised Instruction.

Appears in 16 contracts

Samples: Global Custody Agreement, Master Global Custody Agreement (Curian Variable Series Trust), Master Global Custody Agreement (Curian Variable Series Trust)

AutoNDA by SimpleDocs

Verification and Security Procedures. (a) Bank and Customer shall from time to time agree upon security procedures to be followed by Customer upon the issuance of an instruction and/or by Bank upon the receipt of an instruction, so as to enable Bank to verify that such instruction is authorized ("Security Procedures"). A Security Procedure may, without limitation, involve the use of algorithms, codes, passwords, encryption and telephone call backs. The Customer acknowledges that Security Procedures are designed to verify the authenticity of, and not detect errors in, instructions. For the avoidance of doubt, the parties agree that a SWIFT message issued in the name of the Customer through any third party utility agreed upon by the parties as being a method for providing Instructions and authenticated in accordance with that utility’s 's customary procedures, shall be deemed to be an authorised authorized Instruction.

Appears in 2 contracts

Samples: Master Global Custody Agreement (Riversource International Managers Series, Inc.), Master Global Custody Agreement (Riversource Global Series Inc)

Verification and Security Procedures. (a) Bank and Customer shall from time to time agree upon security procedures to be followed by Customer upon the issuance of an instruction and/or by Bank upon the receipt of an instruction, so as to enable Bank to verify that such instruction is authorized (“Security Procedures”). A Security Procedure may, without limitation, involve the use of algorithms, codes, passwords, encryption and telephone call backs. The Customer acknowledges that Security Procedures are designed to verify the authenticity of, and not detect errors in, instructions. For the avoidance of doubt, the parties agree that a SWIFT message issued in the name of the Customer through any third party utility agreed upon by the parties as being a method for providing Instructions and authenticated in accordance with that utility’s customary procedures, shall be deemed to be an authorised authorized Instruction.

Appears in 2 contracts

Samples: Domestic Custody Agreement (Diamond Hill Funds), Domestic Custody Agreement (FBR Funds)

Verification and Security Procedures. (a) Bank and Customer shall from time to time agree upon security procedures to be followed by Customer upon the issuance of an instruction and/or by Bank upon the receipt of an instruction, so as to enable Bank to verify that such instruction is authorized ("Security Procedures"). A Security Procedure may, without limitation, involve the use of algorithms, codes, passwords, encryption and telephone call backs. The Customer acknowledges that Security Procedures are designed to verify the authenticity of, and not detect errors in, instructions. For the avoidance of doubt, the parties agree that a SWIFT message issued in the name of the Customer through any third party utility agreed upon by the parties as being a method for providing Instructions and authenticated in accordance with that utility’s 's customary procedures, shall be deemed to be an authorised Instruction.

Appears in 2 contracts

Samples: Global Custody Agreement (Aberdeen Funds), Master Global Custody Agreement (JNL Series Trust)

AutoNDA by SimpleDocs

Verification and Security Procedures. (a) Bank and Customer shall from time to time agree upon security procedures to be followed by Customer upon the issuance of an instruction and/or by Bank upon the receipt of an instruction, so as to enable Bank to verify that such instruction is authorized (“Security Procedures”). A Security Procedure may, without limitation, involve the use of algorithms, codes, passwords, encryption and telephone call backs. The Customer acknowledges that Security Procedures are designed to verify the authenticity of, and not detect errors in, instructions. For the avoidance of doubt, the parties agree that a SWIFT message issued in the name of the Customer through any third party utility agreed upon by the parties as being a method for providing Instructions and authenticated in accordance with that utility’s customary procedures, shall be deemed to be an authorised authorized Instruction.

Appears in 1 contract

Samples: Master Global Custody Agreement (Seligman Premium Technology Growth Fund, Inc.)

Time is Money Join Law Insider Premium to draft better contracts faster.