Common use of Authentication Procedures Clause in Contracts

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance with an Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.

Appears in 49 contracts

Sources: Custody Agreement (Strategic Trust), Custodian Agreement (New Mountain Private Credit Fund), Custody Agreement (PGIM Private Credit Fund)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported instructions reasonably believed by the Custodian to be Proper Instruction received by the Custodian in accordance with an Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.

Appears in 3 contracts

Sources: Custody Agreement (MassMutual Access Pine Point Fund), Custody Agreement (MassMutual Access Pine Point Fund), Custody Agreement (MassMutual Access Pine Point Fund)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client Trust acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance with an Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.

Appears in 2 contracts

Sources: Custody Agreement (Litman Gregory Funds Trust), Custody Agreement (Litman Gregory Funds Trust)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance Information Classification: Limited Access with an Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.

Appears in 1 contract

Sources: Custody Agreement (Apollo Debt Solutions BDC)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Information Classification: Limited Access 13 GCA.US40ACT.20240823 Custodian in accordance with an Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.

Appears in 1 contract

Sources: Master Custody Agreement (Blue Owl Alternative Credit Fund)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain 13Information Classification: Limited Access types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance with an Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.

Appears in 1 contract

Sources: Custody Agreement (Lord Abbett Private Credit Fund S)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance with an appropriately implemented Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.. Information Classification: Limited Access

Appears in 1 contract

Sources: Custody Agreement (Partners Group Growth, LLC)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance with an Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.. Information Classification: Limited Access 13

Appears in 1 contract

Sources: Custody Agreement (Andalusian Credit Company, LLC)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance with an appropriately implemented Authentication Procedure will be taken to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.

Appears in 1 contract

Sources: Custody Agreement (Partners Group Next Generation Infrastructure LLC)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance with an Authentication Procedure will be taken Information Classification: Confidential Information Classification: Limited Access to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.

Appears in 1 contract

Sources: Custody Agreement (Diamond Hill Securitized Credit Fund)

Authentication Procedures. The Custodian will implement Authentication Procedures. The Client acknowledges that the Authentication Procedures are intended to provide a commercially reasonable degree of protection against unauthorized transactions of certain types and are not designed to detect errors. Any purported Proper Instruction received by the Custodian in accordance with an Authentication Procedure will be taken Information Classification: Limited Access 14 GCA.US40ACT.20210617 to have originated from an Authorized Person and will constitute a Proper Instruction under this Agreement for all purposes.

Appears in 1 contract

Sources: Custody Agreement (TCW Metropolitan West Funds)