Personalised Security Data definition

Personalised Security Data means the personalised data provided by the Platform to the Account Holder for Authentication purposes. They include Identification Data, and possibly any other data related to the Authentication or Strong Authentication procedures.
Personalised Security Data. Means personalised data provided to a User by CashSentinel for the purposes of Authentication. Personal Space: the Submerchant’s dedicated environment on the CashSentinel Portal. The Submerchant can access it by using his Login Information, and consult there his Payment Account and related information, such as statements of Operations. Reimbursement/Refund: Means a refunding operation to a Customer ordered by the Submerchant. Solution: Means the Payment Solution provided by CashSentinel to the Submerchant for use of Payment Services. Strong authentication: Means authentication based on the use of two or more elements belonging to the categories “knowledge” (something that only the User knows), “possession” (something that only the User has) and “inherence” (something that only the User is). Elements are independent in the sense that should one of them be compromised the reliability of the others will not be called into question. Strong authentication is designed to protect the confidentiality of Login Information.

Examples of Personalised Security Data in a sentence

  • They also undertake to educate the Authorised Persons regarding the confidentiality and security of their own Personalised Security Data.

  • The Account Holder must inform the Platform of the loss or theft of their Personalised Security Data, of any misuse or unauthorised use of their Personal Online Area or data relating to them as soon as they become aware of this and request that it be blocked.

  • The Account Holder must take all reasonable measures to maintain the confidentiality and security of their Personalised Security Data.

  • In the event Personalised Security Data is stolen or there is fraudulent use of the Personal Online Area, the Service Provider is authorised to request from the Platform, a statement or copy of the complaint of the Account Holder and undertakes to respond to it as quickly as possible.

  • The Account Holder (and each Authorised Person) accepts to not communicate their Personalised Security Data to third parties.

  • The Account Holder must ensure that this Third-Party PSP is authorised for the above-mentioned services and that it accesses the Personalised Security Data in a secured environment.

  • The Account Holder recognises that the Service Provider may bring an end or postpone at any time the use of Personalised Security Data, access to an Account or the execution of an Operation in the absence of sufficient elements regarding their purpose or nature.

  • In the event of an unauthorised Payment Operation following the loss or theft of Personalised Security Data, the Account Holder is responsible for the losses related to the use of Personalised Security Data before it is contested, up to a threshold of fifty (50) euros.

  • The Service Provider will return the Account to the state it was in before the unauthorised Payment Operation took place In the event of the loss or theft of Personalised Security Data, unauthorised Operations carried out before they are contested are the Account Holder’s responsibility.

  • The Account Holder is also not held responsible:- if the unauthorised Payment Operation is carried out by diverting the Personalised Security Data, without the Account Holder’s knowledge;- in the event of counterfeiting the Personalised Security Data, if, at the time of the unauthorised Payment Operation, the Account Holder is in possession of this Data.

Related to Personalised Security Data

  • Quasi-Security means an arrangement or transaction described in paragraph (b) below.

  • Information Security (GSN GISN 5) is all the means and functions ensuring the accessibility, confidentiality or integrity of information or communications, excluding the means and functions intended to safeguard against malfunctions. This includes "cryptography", "cryptographic activation", 'cryptanalysis', protection against compromising emanations and computer security.

  • Permitted Security means any Security:

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Relevant Personal Data means Personal Data in respect of which we are the Controller.

  • Coupon Security means any Bearer Security authenticated and delivered with one or more Coupons appertaining thereto.

  • LCR Security means any commercial paper or security (other than equity securities issued to Parent or any Originator that is a consolidated subsidiary of Parent under GAAP) within the meaning of Paragraph .32(e)(viii) of the final rules titled Liquidity Coverage Ratio: Liquidity Risk Measurement Standards, 79 Fed. Reg. 197, 61440 et seq. (October 10, 2014).

  • Client Money means the provisions of the FCA’s Client Assets Sourcebook relating to client money.

  • Client Data means all data or records of whatever nature in whatever form relating to the Client, its operations, facilities, assets, employees, students or otherwise relating to its business, whether subsisting at the date of this Agreement, or created or processed in connection with the Services or as provided by the Client to the Supplier in connection with the Services. Client Data shall include all Client Personal Data

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Patient Data means any electronic data, information or material about a Patient entered into the Software.

  • Sensitive property means property potentially dangerous to the public safety or security if stolen, lost, or misplaced, or that shall be subject to exceptional physical security, protection, control, and accountability. Examples include weapons, ammunition, explosives, controlled substances, radioactive materials, hazardous materials or wastes, or precious metals.

  • Customer Data means any content, materials, data and information that Authorized Users enter into the production system of a Cloud Service or that Customer derives from its use of and stores in the Cloud Service (e.g. Customer-specific reports). Customer Data and its derivatives will not include SAP’s Confidential Information.

  • Customer Personal Data means the personal data contained within the Customer Data.

  • Noxious weeds means weeds that are difficult to control effectively, such as Johnson Grass, Kudzu, and multiflora rose.

  • Noxious weed means a weed defined in 7-22-2101.

  • Contractor attributional/proprietary information means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company.

  • Government data means any information, document, media, or machine readable material regardless of physical form or characteristics, that is created or obtained by the Government in the course of official Government business.

  • Transaction Security means the Security created or expressed to be created in favour of the Security Agent pursuant to the Transaction Security Documents.

  • Client Personal Data means any personal data provided to us by you, or on your behalf, for the purpose of providing our services to you, pursuant to our engagement letter with you;

  • Loaned Security means any “security” which is delivered as a Loan under a Securities Loan Agreement; provided that, if any new or different security shall be exchanged for any Loaned Security by recapitalization, merger, consolidation, or other corporate action, such new or different security shall, effective upon such exchange, be deemed to become a Loaned Security in substitution for the former Loaned Security for which such exchange was made.

  • Controlled technical information means technical information with military or space application that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. Controlled technical information would meet the criteria, if disseminated, for distribution statements B through F using the criteria set forth in DoD Instruction 5230.24, Distribution Statements on Technical Documents. The term does not include information that is lawfully publicly available without restrictions.

  • Phone/Electronic Transaction Security Procedures means security procedures for Phone/ Electronic Transactions as provided in writing to the Underwriter.

  • Third Party Data has the meaning set forth in Section 9.3(a).

  • Student Personal Information means information collected through a school service that personally identifies an individual student or other information collected and maintained about an individual student that is linked to information that identifies an individual student, as identified by Washington Compact Provision 28A.604.010. For purposes of this DPA, Student Personal Information is referred to as Student Data.

  • Accessory dwelling unit means an attached or a detached residential dwelling unit that provides complete independent living facilities for one or more persons and is located on a lot with a proposed or existing primary residence. It shall include permanent provisions for living, sleeping, eating, cooking, and sanitation on the same parcel as the single-family or multifamily dwelling is or will be situated. An accessory dwelling unit also includes the following: