Additional Security Procedures Sample Clauses

Additional Security Procedures. We may from time to time implement additional or alternative procedures to protect the security and confidentiality of your Online Banking transactions. Such procedures may include, without limitation, encryption, creating security firewalls in our computer systems and implementing other commercially reasonable security procedures. You agree to comply with all security procedures we may impose in connection with Online Banking, including any changes to such procedures that we might make from time to time. You agree that all security procedures used by us, our affiliates and agents in connection with Online Banking are commercially reasonable security procedures and, as a result, you assume all risk of loss for unauthorized transactions where we have followed our then-current security procedures. You acknowledge that we reserve the right to change the security procedures from time to time upon notice to you (if such notice is required by law). Your continued use of Online Banking constitutes your agreement to comply with such changed procedures and your acknowledgement that such changed procedures are commercially reasonable.
Additional Security Procedures. Enhanced Log-In/ Transaction Security. In addition to the above individual User IDs and individual Passwords, access to the Premier Business Connect Service includes a multi-factor or layered authentication security procedure at log-in or prior to initiating certain transactions for you, including your administrator and authorized users (hereinafter “Enhanced Log-in/ Transaction Security”). Enhanced Log-in Security may include, but is not limited to, additional log-in security features such as identification and verification of IP addresses. Enhanced Log- In Security will also require each User of the Premier Business Connect Service to establish and utilize, in addition to individual User IDs and passwords, his/her own individual authentication through the use of one time passwords as part of a multi-part credential. Enhanced Transaction Security may require each User of the Premier Business Connect Service to utilize a token generated One-Time-Password prior to initiating certain transactions. - You are responsible for providing security for your Systems and Account(s). Passwords must be kept private. You should make sure that no one is physically watching as Passwords are entered. It is important to remember to click “Log Off” after completing each Premier Business Connect Service session. This will deter unauthorized access to your Account(s) if your computer is shared or available to others. You should not leave your computer and/or mobile device unattended with the browser/app running and a valid User ID and Password cached as anyone can gain access to the Account(s). We recommend that you use a separate computer that is not utilized for e-mail or other Internet communications to establish and conduct transactions through the Services. (*) – These Security Procedures may / may not apply in every case, as they are subject to availability, connectivity and standard parameters set forth in our multi-factor product, as those parameters may be modified from time to time.
Additional Security Procedures. You agree that the following additional security procedures govern your use of the eBanking Services when accessing your accounts with us: • You are liable for all transactions that you or any of your Authorized Users make or authorize, even if that person exceeds his/her authority. You will also be liable for all transactions by an Authorized User until you have notified us of the revocation of the Authorized User's authority, and we have had a reasonable time to act on such notice to block the affected User ID, Password and/or security information. You are also liable for any and all unauthorized use that occurs before you have notified us that your User ID, Password and/or security information, or other access means in your possession or control have been lost or stolen or used without your authority and before we have had a reasonable opportunity to act. • Your use of eBanking constitutes your agreement that our security procedures are commercially reasonable. You acknowledge and agree that the security procedures are not designed to detect errors in the content of instructions or transactions. You also understand and agree that the security procedures, even when properly implemented by us and by you, do not provide a guarantee against unauthorized access to information or unauthorized transactions. Accordingly, you agree to assume risks in connection with the establishment and/or use of eBanking. Without limiting the generality of the foregoing, you agree that if account information is accessed, or if an instruction is made (such as a transfer or payment order), by a person using your User ID, Password and/or security information, we may treat that access request or instruction as being authorized by you (regardless of whether or not it was actually authorized by you), and you agree to be bound by any transactions implemented through those instructions. • You represent and warrant to us that you have taken all action necessary to access and use eBanking and that any resolutions, certifications, authorizations or other documents submitted to us in connection with the eBanking Services are true, accurate, completed and will be kept up to date. You, and each person you designate to use eBanking on your behalf during enrollment or on other documents for eBanking, as permitted by us, also represent and warrant to us that each person whose name is listed during the enrollment or on such other documents is duly authorized to bind the business in all transact...
Additional Security Procedures. We may from time to time use reasonable additional or alternative procedures to ensure the security and confidentiality of your financial records and transactions using Columbia OnLine for Business™. Such procedures may include, without limitation, encryption, creating security firewalls in our computer systems and implementing other commercially reasonable security procedures. At all times you agree to comply with all security procedures we may impose in connection with your use of Columbia OnLine for Business™. You agree that all security procedures used by us, our affiliates and agents in connection with Columbia OnLine for Business™ are commercially reasonable security procedures and, as a result, you assume all risk of loss for unauthorized transactions where we have followed our then current security procedures. You acknowledge that we reserve the right to change the security procedures from time to time upon notice to you (if such notice is required by law), and furthermore agree that your continued use of any such changed procedures evidences your acceptance of and agreement to the commercial reasonableness of such changed procedures.
Additional Security Procedures a. Additional Verification b. Dual Controls and T ransaction Limits The dual controls and transaction limits described in this ACH Services Agreement and its Schedules also constitute security procedures required to process ACH credit or debit transactions.
Additional Security Procedures. Notwithstanding other terms of this Agreement or any agreement between DISTRIBUTOR, ▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇ and any other party, both parties agree to follow appropriate procedures to protect the security of Cardholder Information received during the Term of this Agreement, including: (i) installing and maintaining a working network firewall to protect data accessible via the internet; (ii) using and regularly updating anti-virus software; (iii) ensuring security patches are current; (iv) encrypting stored data and data sent over open networks; (v) maintaining an information security policy for employees and contractors; (vi) storing all materials containing Cardholder Information in a restricted area; (vii) restricting access to Cardholder Information to those on a limitedneed to know” basis; (viii) retaining Cardholder Information only as is reasonably appropriate, and consistent with, each party’s authorized use and service; (ix) discarding Cardholder Information in a manner that ensures complete destruction; (x) assigning a unique ID to each person with computer access to Cardholder Information, and (xi) ensuring that unauthorized parties do not have access to any systems containing Cardholder Information.
Additional Security Procedures. We may, at our option, offer you additional Security Procedures to enhance the security of your Authorized Account(s) and Cash Management Service(s) We have the right to implement additional verification and identification steps, factors or procedures that we deem necessary or appropriate in our discretion. These may be implemented as an amendment to the Security Procedures selected by you or as an additional Security Procedure available to you.

Related to Additional Security Procedures

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Additional Procedures (i) Once initiated by an Auction Notice, the Auction Party may not withdraw an Auction other than a Failed Auction. Furthermore, in connection with any Auction, upon submission by a Lender of a Qualifying Bid, such Lender (each, a “Qualifying Lender”) will be obligated to sell the entirety or its allocable portion of the Reply Amount, as the case may be, at the Applicable Price. (ii) To the extent not expressly provided for herein, each purchase of Term Loans pursuant to an Auction shall be consummated pursuant to procedures consistent with the provisions in this definition, established by the Auction Agent acting in its reasonable discretion and as reasonably agreed by the Borrower. (iii) In connection with any Auction, the Borrower and the Lenders acknowledge and agree that the Auction Agent may require as a condition to any Auction, the payment of customary fees and expenses by the Auction Party in connection therewith as agreed between the Auction Party and the Auction Agent. (iv) Notwithstanding anything in any Loan Document to the contrary, for purposes of this definition, each notice or other communication required to be delivered or otherwise provided to the Auction Agent (or its delegate) shall be deemed to have been given upon the Auction Agent’s (or its delegate’s) actual receipt during normal business hours of such notice or communication; provided that any notice or communication actually received outside of normal business hours shall be deemed to have been given as of the opening of business on the next Business Day. (v) The Borrower and the Lenders acknowledge and agree that the Auction Agent may perform any and all of its duties under this definition by itself or through any Affiliate of the Auction Agent and expressly consent to any such delegation of duties by the Auction Agent to such Affiliate and the performance of such delegated duties by such Affiliate. The exculpatory provisions pursuant to this Agreement shall apply to each Affiliate of the Auction Agent and its respective activities in connection with any purchase of Term Loans provided for in this definition as well as activities of the Auction Agent.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each JBE Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such JBE Work Location.

  • Important Information About Procedures for Opening a New Account To help the government fight the funding of terrorism and money laundering activities, federal law requires all financial organizations to obtain, verify, and record information that identifies each person who opens an account. Therefore, when you open a ▇▇▇▇ ▇▇▇, you are required to provide your name, residential address, date of birth, and identification number. We may require other information that will allow us to identify you.