Verification and Security Procedures. (a) J.X. Xxxxxx and the Customer shall comply with any applicable Security Procedures to permit J.X. Xxxxxx to verify the authenticity of Instructions. (b) The Customer acknowledges that the Security Procedure is designed to verify the authenticity of, and not to detect errors in, Instructions. The Customer shall promptly notify J.X. Xxxxxx if it does not believe that any relevant Security Procedure is commercially reasonable, and its adherence to any Security Procedure without objection constitutes its agreement that it has determined the Security Procedure to be commercially reasonable. (c) The Customer and its Authorized Persons are solely responsible for ensuring that the User Codes are reasonably safeguarded and known to and used by only the respective Authorized Persons to whom such User Codes apply. If (i) the User Codes are (or the Customer or its relevant Authorized Person reasonably suspects that the User Codes may be) lost, stolen, damaged, altered, unduly disclosed, known in a manner inconsistent with its purposes or compromised, (ii) the Customer’s or any Authorized Persons’ access to J.X. Xxxxxx’x systems, applications or products, or any third party messaging platform through which the Instructions are transmitted, is revoked or suspended, or (iii) the Customer or an Authorized Person reasonably suspects any technical or security failure relating to any systems, applications or products of J.X. Xxxxxx or any third party messaging platform through which the Instructions are transmitted, the Customer shall immediately cease using such system, application, product or platform and promptly notify J.X. Xxxxxx. Global Custody Agreement - New York - General February 2018 version
Appears in 2 contracts
Samples: Global Custody Agreement (Aetos Distressed Investment Strategies Fund LLC), Global Custody Agreement (Aetos Long/Short Strategies Fund LLC)
Verification and Security Procedures. (a) J.X. Xxxxxx and the Customer shall comply with any applicable Security Procedures to permit J.X. Xxxxxx to verify the authenticity of Instructions.
(b) The Customer acknowledges that the Security Procedure is designed to verify the authenticity of, and not to detect errors in, Instructions. The Customer shall promptly notify J.X. Xxxxxx if it does not believe that any relevant Security Procedure is commercially reasonable, and its adherence to any Security Procedure without objection constitutes its agreement that it has determined the Security Procedure to be commercially reasonable.
(c) The Customer and its Authorized Persons are solely responsible for ensuring that the User Codes are reasonably safeguarded and known to and used by only the respective Authorized Persons to whom such User Codes apply. If (i) the User Codes are (or the Customer or its relevant Authorized Person reasonably suspects that the User Codes may be) lost, stolen, damaged, altered, unduly disclosed, known in a manner inconsistent with its purposes or compromised, (ii) the Customer’s or any Authorized Persons’ access to J.X. Xxxxxx’x systems, applications or products, or any third party messaging platform through which the Instructions are transmitted, is revoked or suspended, or (iii) the Customer or an Authorized Person reasonably suspects any technical or security failure relating to any systems, applications or products of J.X. Xxxxxx or any third party messaging platform through which the Instructions are transmitted, the Customer shall immediately cease using such system, application, product or platform and promptly notify J.X. Xxxxxx. Global Custody Agreement - New York - General February 2018 version.
Appears in 2 contracts
Samples: Global Custody Agreement (Brookfield Infrastructure Income Fund Inc.), Global Custody Agreement (Brookfield Infrastructure Income Fund Inc.)
Verification and Security Procedures. (a) J.X. X.X. Xxxxxx and the Customer Lender shall comply with any applicable Security Procedures to permit J.X. X.X. Xxxxxx to verify the authenticity of Instructions.
(b) The Customer Lender acknowledges that the Security Procedure is designed to verify the authenticity of, and not to detect errors in, Instructions. The Customer Lender shall promptly notify J.X. X.X. Xxxxxx if it does not believe that any relevant Security Procedure is commercially reasonable, and its adherence to any Security Procedure without objection constitutes its agreement that it has determined the Security Procedure to be commercially reasonable.
(c) The Customer Lender and its Authorized Persons are solely responsible for ensuring that the User Codes are reasonably safeguarded and known to and used by only the respective Authorized Persons to whom such User Codes apply. If (i) the User Codes are (or the Customer Lender or its relevant Authorized Person reasonably suspects that the User Codes may be) lost, stolen, damaged, altered, unduly disclosed, known in a manner inconsistent with its purposes or compromised, (ii) the CustomerSecurities Lending Agreement - JPMCB New York - General - June 2018 Version 19 Lender’s or any Authorized Persons’ access to J.X. X.X. Xxxxxx’x systems, applications or products, or any third party messaging platform through which the Instructions are transmitted, is revoked or suspended, or (iii) the Customer Lender or an Authorized Person reasonably suspects any technical or security failure relating to any systems, applications or products of J.X. X.X. Xxxxxx or any third party messaging platform through which the Instructions are transmitted, the Customer Lender shall immediately cease using such system, application, product or platform and promptly notify J.X. X.X. Xxxxxx. Global Custody Agreement - New York - General February 2018 version.
Appears in 1 contract
Verification and Security Procedures. (a) J.X. Xxxxxx and the Customer shall comply with any applicable Security Procedures to permit J.X. Xxxxxx to verify the authenticity of Instructions.
(b) The Customer acknowledges that the Security Procedure is designed to verify the authenticity of, and not to detect errors in, Instructions. The Customer shall promptly notify J.X. Xxxxxx if it does not believe that any relevant Security Procedure is commercially reasonable, and its adherence to any Security Procedure without objection constitutes its agreement that it has determined the Security Procedure to be commercially reasonable.. Global Custody Agreement - New York January 2022
(c) The Customer and its Authorized Persons are solely responsible for ensuring that the User Codes are reasonably safeguarded and known to and used by only the respective Authorized Persons to whom such User Codes apply. If (i) the User Codes are (or the Customer or its relevant Authorized Person reasonably suspects that the User Codes may be) lost, stolen, damaged, altered, unduly disclosed, known in a manner inconsistent with its purposes or compromised, (ii) the Customer’s or any Authorized Persons’ access to J.X. Xxxxxx’x systems, applications or products, or any third party messaging platform through which the Instructions are transmitted, is revoked or suspended, or (iii) the Customer or an Authorized Person reasonably suspects any technical or security failure relating to any systems, applications or products of J.X. Xxxxxx or any third party messaging platform through which the Instructions are transmitted, the Customer shall immediately cease using such system, application, product or platform and promptly notify J.X. Xxxxxx. Global Custody Agreement - New York - General February 2018 version.
Appears in 1 contract
Samples: Global Custody Agreement (Impax Funds Series Trust I)
Verification and Security Procedures. (a) J.X. Xxxxxx and the Customer shall comply with any applicable Security Procedures to permit J.X. Xxxxxx to verify the authenticity of Instructions.
(b) The Customer acknowledges that the Security Procedure is designed to verify the authenticity of, and not to detect errors in, Instructions. The Customer shall promptly notify J.X. Xxxxxx if it does not believe that any relevant Security Procedure is commercially reasonable, and its adherence to any Security Procedure without objection constitutes its agreement that it has determined the Security Procedure to be commercially reasonable.
(c) The Customer and its Authorized Persons are solely responsible for ensuring that the User Codes are reasonably safeguarded and known to and used by only the respective Authorized Persons to whom such User Codes apply. If (i) the User Codes are (or the Customer or its relevant Authorized Person reasonably suspects that the User Codes may be) lost, stolen, damaged, altered, unduly disclosed, known in a manner inconsistent with its purposes or compromised, (ii) the Customer’s or any Authorized Persons’ access to J.X. Xxxxxx’x systems, applications or products, or any third party messaging platform through which the Instructions are transmitted, is revoked or suspended, or (iii) the Customer or an Authorized Person reasonably suspects any technical or security failure relating to any systems, applications or products of J.X. Xxxxxx or any third party messaging platform through which the Instructions are transmitted, the Customer shall immediately cease using such system, application, product or platform and promptly notify J.X. Xxxxxx. Global Custody Agreement - New York - General - February 2018 version
Appears in 1 contract
Samples: Global Custody Agreement (Aetos Multi-Strategy Arbitrage Fund LLC)
Verification and Security Procedures. (a) J.X. X.X. Xxxxxx and the Customer shall comply with any applicable Security Procedures to permit J.X. X.X. Xxxxxx to verify the authenticity of Instructions.
(b) The Customer acknowledges that the Security Procedure is designed to verify the authenticity of, and not to detect errors in, Instructions. The Customer shall promptly notify J.X. X.X. Xxxxxx if it does not believe that any relevant Security Procedure is commercially reasonable, and its adherence to any Security Procedure without objection constitutes its agreement that it has determined the Security Procedure to be commercially reasonable.
(c) The Customer and its Authorized Persons are solely responsible for ensuring that the User Codes are reasonably safeguarded and known to and used by only the respective Authorized Persons to whom such User Codes apply. If (i) the User Codes are (or the Customer or its relevant Authorized Person reasonably suspects that the User Codes may be) lost, stolen, damaged, altered, unduly disclosed, known in a manner inconsistent with its purposes or compromised, (ii) the Customer’s or any Authorized Persons’ access to J.X. X.X. Xxxxxx’x systems, applications or products, or any third party messaging platform through which the Instructions are transmitted, is revoked or suspended, or (iii) the Customer or an Authorized Person reasonably suspects any technical or security failure relating to any systems, applications or products of J.X. X.X. Xxxxxx or any third party messaging platform through which the Instructions are transmitted, the Customer shall immediately cease using such system, application, product or platform and promptly notify J.X. X.X. Xxxxxx. Global Custody Agreement - – New York - General February 2018 version– January 2021
Appears in 1 contract