Common use of Additional Security Procedures Clause in Contracts

Additional Security Procedures. Enhanced Log-In/ Transaction Security. In addition to the above individual User IDs and individual Passwords, access to the Premier Business Connect Service includes a multi-factor or layered authentication security procedure at log-in or prior to initiating certain transactions for you, including your administrator and authorized users (hereinafter “Enhanced Log-in/ Transaction Security”). Enhanced Log-in Security may include, but is not limited to, additional log-in security features such as identification and verification of IP addresses. Enhanced Log- In Security will also require each User of the Premier Business Connect Service to establish and utilize, in addition to individual User IDs and passwords, his/her own individual authentication through the use of one time passwords as part of a multi-part credential. Enhanced Transaction Security may require each User of the Premier Business Connect Service to utilize a token generated One-Time-Password prior to initiating certain transactions. - You are responsible for providing security for your Systems and Account(s). Passwords must be kept private. You should make sure that no one is physically watching as Passwords are entered. It is important to remember to click “Log Off” after completing each Premier Business Connect Service session. This will deter unauthorized access to your Account(s) if your computer is shared or available to others. You should not leave your computer and/or mobile device unattended with the browser/app running and a valid User ID and Password cached as anyone can gain access to the Account(s). We recommend that you use a separate computer that is not utilized for e-mail or other Internet communications to establish and conduct transactions through the Services. (*) – These Security Procedures may / may not apply in every case, as they are subject to availability, connectivity and standard parameters set forth in our multi-factor product, as those parameters may be modified from time to time.

Appears in 1 contract

Sources: Premier Business Connect Access and User Agreement

Additional Security Procedures. Enhanced Log-In/ Transaction Security. In addition to the above individual User IDs and individual Passwords, access to the Premier Business Connect Online Service includes a multi-factor or layered authentication security procedure at log-in or prior to initiating certain transactions for you, including your administrator and authorized users (hereinafter “Enhanced Log-in/ Transaction Security”). Enhanced Log-in Security may include, but is not limited to, additional log-in security features such as identification and verification of IP addresses. Enhanced Log- Log-In Security will also require each User of the Premier Business Connect Online Service to establish and utilize, in addition to individual User IDs and passwords, his/her own individual authentication through the use of one time passwords personal identifying questions and image verification as part of a multi-part credential. Enhanced Transaction Security may require each User of the Premier Business Connect Online Service to establish and utilize a token generated One-Time-Password his/her own individual authentication through the use of personal identifying questions prior to initiating certain transactions. - You are responsible for providing security for your Systems and Account(s). Passwords must be kept private. You should make sure that no one is physically watching as Passwords are entered. It is important to remember to click “Log Off” after completing each Premier Business Connect Online Service session. This will deter unauthorized access to your Account(s) if your computer is shared or available to others. You should not leave your computer and/or mobile device unattended with the browser/app browser running and a valid User ID and Password cached as anyone can gain access to the Account(s). We recommend that you use a separate computer that is not utilized for e-e- mail or other Internet communications to establish and conduct transactions through the Services. (*) – These Security Procedures may / may not apply in every case, as they are subject to availability, connectivity and standard parameters set forth in our multi-factor product, as those parameters may be modified from time to time.

Appears in 1 contract

Sources: Business Online User and Access Agreement