Our Security Procedures definition

Our Security Procedures. We restrict access to nonpublic personal information about You to those employees with whom We determine have a legitimate business purpose to access such information in connection with the offering of products or services to You. We employ security techniques designed to protect Our customer data. We provide training and communications programs to educate employees about the meaning and requirements of Our strict standards for data security and confidentiality.

Examples of Our Security Procedures in a sentence

  • We consider all public and nonpublic personal Information we gather about you as “private personal information”, Our Security Procedures We take steps to safeguard customer information.

  • Our Security Procedures are not designed for the detection of errors (e.g., duplicate payments or errors in your fund transfer instructions).

  • Our Security Procedures are not designed for the detection of errors (e.g., duplicate payments or errors in your instructions).

  • Our Security Procedures may include an e-mail or telephone call to the Authorized Persons listed on your Enrollment Form to verify an ACH Entry that has been submitted or to verify the Entry scheduled for that day as indicated by you.

  • Our Security Procedures may also require you to provide certain account information, login information, or PIN numbers to access Voice Banking Services.

  • Our Security Procedures are contained in this Agreement and in other written procedures we may provide to you.

  • Our Security Procedures may also require you to provide certain account information, login information, four (4) character Display Name, mobile authorization code or PIN numbers to access Mobile Banking Services, which you agree and understand shall remain confidential.

  • Since the wealth of southern women “was more or less fixed, regardless of what economic activities they undertook”, they were much less motivated to undertake any economic activity at all.

  • Our Security Procedures are designed to assure the authenticity of Payments issued to us.

  • Our Security Procedures are described in the Online Banking Terms and Conditions unless otherwise provided in the Service Terms and Conditions or Documentation applicable to certain Services.

Related to Our Security Procedures

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Computer Security Procedures means procedures for prevention of unauthorized computer access and use and administration of computer access and use as provided in writing to the Underwriter.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Social Engineering Security Procedures means security procedures intended to prevent Social Engineering Fraud as set forth in the Application and/or as otherwise provided in writing to the Underwriter.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Staff Vetting Procedures means the Authority’s procedures for the vetting of personnel and as advised to the Contractor by the Authority.

  • Administrative Safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic PHI and to manage the conduct of Contractor’s workforce in relation to the protection of that information.

  • AML/KYC Procedures means the customer due diligence procedures of a Reporting Finnish Financial Institution pursuant to the anti-money laundering or similar requirements of Finland to which such Reporting Finnish Financial Institution is subject.

  • Bidding Procedures means the procedures governing the Auction and sale of all or substantially all of the Debtors’ assets, as approved by the Bankruptcy Court and as may be amended from time to time in accordance with their terms.

  • HMG Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division) as updated from time to time.

  • Depositary Procedures means, with respect to any conversion, transfer, exchange or transaction involving a Global Note or any beneficial interest therein, the rules and procedures of the Depositary applicable to such conversion, transfer, exchange or transaction.

  • Auction Procedures means the auction procedures constituting Part II of the form of Statement as of the filing thereof.

  • Administrative Procedures means the Administrative Procedures of Minnesota Management & Budget developed in accord with M.S. 43A.04, subdivision 4.

  • Sale Procedures Unless otherwise specified in the Supplement, shall mean that, with respect to any sale of one or more Underlying Securities or Related Assets, the Market Agent, on behalf of the Trust, shall sell such Underlying Securities or Related Assets to the highest bidders among not less than two solicited bidders for such Underlying Securities or Related Assets (one of which bidders may include Merrill Lynch & Co. or any Affiliate thereof; provided, however, that xxxxxxr Xxxxill Lynch & Co. nor any of its Affiliates will be under any obligxxxxx xo xxx, and which bidders need not be limited to recognized broker dealers). In the sole judgment of the Market Agent, bids may be evaluated on the basis of bids for a single Underlying Security or Related Asset, a portion of the Underlying Securities or Related Assets, or all of the Underlying Securities or Related Assets being sold or any other basis selected in good faith by the Market Agent.

  • Remarketing Procedures means the procedures for conducting Remarketings set forth in Part II of these Articles Supplementary.

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Operation Procedures means the procedures contained in Annexure A hereto which the Contractor is obliged to follow when performing work on behalf of the company

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • customs procedures means the treatment applied by the customs administration of each Party to goods which are subject to customs control.

  • appropriate procedures means procedures reasonably designed to prevent and detect errors and omissions. In determining the reasonableness of such procedures, weight will be given to such factors as are appropriate, including the prior occurrence of any similar errors or omissions when such procedures were in place and transfer agent industry standards in place at the time of the occurrence.

  • Security Property means all right, title and interest in, to and under any Security Document, including:

  • Applicable Depositary Procedures means, with respect to any transfer or transaction involving a Global Security or beneficial interest therein, the rules and procedures of the Depositary for such Security, in each case to the extent applicable to such transaction and as in effect from time to time.

  • Security Provider means a person which, in accordance with the provisions of this Agreement, provides or is to provide any guarantee or other surety or security in respect of that Party’s obligations under this Agreement;