Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts. 2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error. 2.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened 2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked. 2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 4 contracts
Sources: Online Banking Agreement, Online Banking Agreement, Online Banking Agreement
Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the Credentials is a portion of a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Credentials from time to time for security reasons. You should keep your Access Code Credentials in a secure location. Any person having access to your Access Code (or just your Access Code) Credentials will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCredentials. Providing your these Access Code Credentials to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.12.3.1. You agree to comply with any of the Security Procedures. You further Procedures and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including includes (without limitation) any the Access CodeCredentials, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure of the person gaining access to the Service, established from time to time by Bank (collectively “Security DevicesProcedures”), . You agree that the Security Procedures constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has Access Credentials have been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 3 contracts
Sources: Mytrustmark® Agreement, Mytrustmark® Agreement, Mytrustmark® Agreement
Security Procedure. The use of the Access CodeCode(s), as well as other Security Devices, as defined below, and any other procedures which the Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is Security Procedures are not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code Codes (or just your Access CodeCodes) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Devices have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Access Code, Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold the Bank harmless from any loss, damages, or expenses, including but not limited to attorneys’ fees, caused by you, your employees’, or agents’ failure to keep the Security Procedures or Security Device confidential and secure.
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 3 contracts
Sources: Digital Banking Agreement, Digital Banking Agreement, Digital Banking Agreement
Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are solely responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. You acknowledge that the Financial Institution has no liability whatsoever for any unauthorized use of your Access Code.
2.2.11.2.1. You agree to comply with the all security procedures Financial Institution directs you to use (collectively, “Security Procedures. You further ”), and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by usus from time to time, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.21.2.2. For Business Online Banking, you agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent Access Codes and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service (each, a “User”), and providing new and subsequent Security Devices to those Users. Financial Institution will provide Client’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a Company ID, Company Password, User ID and User Password, and any tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Client understands that the Administrator has the capability of providing administrative privileges identical to that of the Administrator to any User, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Client acknowledges that any Administrator shall have the ability to control security levels such as Service access and Service transaction limits, including without limitation the ability to assign dollar amount limits to ACH origination. You also agree that the Administrator or any User shall also have the authority on behalf of Client to electronically accept and approve any and all agreements and amendments to agreements by and between Financial Institution and Client, including but not limited to this Agreement.
1.2.3. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Namean Access Code), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by usus from time to time, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees and court costs, directly or indirectly caused by you, any User or Subuser, or your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure.
2.2.31.2.4. You agree to notify us immediately, according to notification procedures prescribed by usus from time to time, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.41.2.5. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 2 contracts
Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are solely responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. You acknowledge that the Financial Institution has no liability whatsoever for any unauthorized use of your Access Code.
2.2.11.2.1. You agree to comply with the all security procedures Financial Institution directs you to use (collectively, “Security Procedures. You further ”), and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by usus from time to time, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.21.2.2. You For Business Online Banking, you agree to keep all Security Procedures protectedappoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent Access Codes and tokens on your behalf, secureincluding assigning and revoking access privileges for persons to use the Service (each, a “User”), and strictly confidential providing new and subsequent Security Devices to those Users. Financial Institution will provide Client’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a Company ID, Company Password, User ID and User Password, and any tokens to be distributed by the Administrator to each User with respect to one or make available more of the same only Services. Client understands that the Administrator has the capability of providing administrative privileges identical to your authorized representative(s). You agree not to disclose or provide any Security Procedures that of the Administrator to any unauthorized personUser, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. Where you If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Client acknowledges that any Administrator shall have the ability to change or modify a Security Device from time control security levels such as Service access and Service transaction limits, including without limitation the ability to time (e.g., a password or User Name), you agree assign dollar amount limits to change Security Devices frequently in order to ensure the security of the Security DeviceACH origination. You also agree to notify us immediately, according to notification procedures prescribed by us, if you believe that the Administrator or any Security Procedures User shall also have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority on behalf of Client to electronically accept and approve any authorized representative(s) shall change or be revoked. You shall recover and return all agreements and amendments to us any Security Devices in the possession of any of your authorized representative(s) whose authority agreements by and between Financial Institution and Client, including but not limited to have the Security Device has been revokedthis Agreement.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 2 contracts
Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are solely responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. You acknowledge that the Financial Institution has no liability whatsoever for any unauthorized use of your Access Code.
2.2.11.2.1. You agree to comply with the all security procedures Financial Institution directs you to use (collectively, “Security Procedures. You further ”), and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by usus from time to time, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.21.2.2. You For Business Online Banking, you agree to keep all Security Procedures protectedappoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent Access Codes and tokens on your behalf, secureincluding assigning and revoking access privileges for persons to use the Service (each, a “User”), and strictly confidential providing new and subsequent Security Devices to those Users. Financial Institution will provide Client’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a Company ID, Company Password, User ID and User Password, and any tokens to be distributed by the Administrator to each User with respect to one or make available more of the same only Services. Client understands that the Administrator has the capability of providing administrative privileges identical to your authorized representative(s). You agree not to disclose or provide any Security Procedures that of the Administrator to any unauthorized personUser, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. Where you If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Client acknowledges that any Administrator shall have the ability to change or modify a Security Device from time control security levels such as Service access and Service transaction limits, including without limitation the ability to time (e.g., a password or User Name), you agree assign dollar amount limits to change Security Devices frequently in order to ensure the security of the Security DeviceACH origination. You also agree to notify us immediately, according to notification procedures prescribed by us, if you believe that the Administrator or any Security Procedures User shall also have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority on behalf of Client to electronically accept and approve any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.all agreements and
Appears in 2 contracts
Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are solely responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts. You acknowledge that the Financial Institution has no liability whatsoever for any unauthorized use of your Access Code.
2.2.11.2.1. You agree to comply with the all security procedures Financial Institution directs you to use (collectively, “Security Procedures. You further ”), and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by usus from time to time, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.21.2.2. You For Online Banking, you agree to keep all Security Procedures protectedappoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent Access Codes and tokens on your behalf, secureincluding assigning and revoking access privileges for persons to use the Service (each, a “User”), and strictly confidential providing new and subsequent Security Devices to those Users. Financial Institution will provide Client’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a Company ID, Company Password, User ID and User Password, and any tokens to be distributed by the Administrator to each User with respect to one or make available more of the same only Services. Client understands that the Administrator has the capability of providing administrative privileges identical to your authorized representative(s). You agree not to disclose or provide any Security Procedures that of the Administrator to any unauthorized personUser, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. Where you If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Client acknowledges that any Administrator shall have the ability to change or modify a Security Device from time control security levels such as Service access and Service transaction limits, including without limitation the ability to time (e.g., a password or User Name), you agree assign dollar amount limits to change Security Devices frequently in order to ensure the security of the Security DeviceACH origination. You also agree to notify us immediately, according to notification procedures prescribed by us, if you believe that the Administrator or any Security Procedures User shall also have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority on behalf of Client to electronically accept and approve any authorized representative(s) shall change or be revoked. You shall recover and return all agreements and amendments to us any Security Devices in the possession of any of your authorized representative(s) whose authority agreements by and between Financial Institution and Client, including but not limited to have the Security Device has been revokedthis Agreement.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Online Banking Agreement
Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Financial Institution directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent User Ids, Passwords and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service, (“User”) and providing new and subsequent Security Devises to those Users. Financial Institution will provide Customer’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a User ID number and Password, and tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Customer understands that the Administrator has the capability of providing administrative privileges identical to that of the Administrator to any User, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Customer will be required to use the Security Device each time it accesses the Services. Customer acknowledges that any Administrator shall have the ability to control security levels such as Service access and Service transaction limits, including without limitation the ability to assign dollar amount limits to transfers of funds. You also agree that the Administrator or any User shall also have the authority on behalf of Customer to electronically accept and approve any and all agreements and amendments to agreements by and between Financial Institution and Customer, including but not limited to this Master Agreement.
2.2.3. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure.
2.2.32.2.4. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.42.2.5. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Business Online Banking and Master Cash Management Agreement
Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the Credentials is a portion of a security procedures procedure established by Bank us to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Credentials from time to time for security reasons. You should keep your Access Code Credentials in a secure location. Any person having access to your Access Code (or just your Access Code) Credentials will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other personsinformation. You are responsible for safeguarding the Access CodeCredentials. Providing your these Access Code Credentials to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1Accounts. You agree to comply with any of the Security Procedures. You further Procedures and any other Security Procedures we direct you to use, and you acknowledge and agree that the Security Procedures, including include (without limitation) any the Access CodeCredentials, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure of the person gaining access to the Service, established from time to time by us (collectively “Security DevicesProcedures”), . You agree that the Security Procedures constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has Access Credentials have been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes constitute sufficient authorization for Bank us to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Account maintained with Bankus, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructioninstructions. You acknowledge and agree that you shall be bound by any and all transactions instructions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Authorized representatives should be trained on the Security Procedures as they relate to their job function. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device Access Credentials from time to time (e.g., a password or User Name), you agree to change Security Devices Access Credentials frequently in order to ensure the security of the Security DeviceAccess Credentials. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened
2.2.3threatened breach of security, we may issue you new Access Credentials or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are an entity, you agree to indemnify, defend all claims, and hold us harmless from any loss, damages, or expenses, including, but not limited to attorneys’ fees, caused by your, your employees’, or agents’ failure to keep the Security Procedures or Access Credentials confidential and secure. In addition to protecting your Access Credentials, you should also take precautions to protect your personal identification information, such as your driver’s license, Tax Identification Number, etc. This information by itself or together with other information may allow unauthorized access to your Service Accounts. You also are solely responsible for providing for and maintaining the physical, electronic, procedural, administrative, and technical security of data and systems in your possession or under your control and for protecting, securing, and backing up all information and data stored in or on your devices. For additional guidance on information security, please visit our website at ▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover Access granted to data sent to and return from the Service should be sufficient to us any Security Devices in the possession of any of your determine that authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4representatives and methods are completing transactions. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any device used in conjunction with the Security DevicesProcedure, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Access Agreement
Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Financial Institution directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained account
2.2.2. You agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent User Ids, Passwords and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service, (“User”) and providing new and subsequent Security Devises to those Users. Financial Institution will provide Customer’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with Banka User ID number and Password, and you agree and intend tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Customer understands that the submission Administrator has the capability of transactions providing administrative privileges identical to that of the Administrator to any User, including the ability to create and instructions using maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Customer will be required to use the Security Procedures Devise each time it accesses the Services. Customer acknowledges that any Administrator shall be considered have the same ability to control security levels such as your authorized written signature in authorizing us Service access and Service transaction limits, including without limitation the ability to execute such transaction or instructionassign dollar amount limits to transfers of funds. You acknowledge and also agree that you the Administrator or any User shall be bound by also have the authority on behalf of Customer to electronically accept and approve any and all transactions initiated through the use of such Security Proceduresagreements and amendments to agreements by and between Financial Institution and Customer, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, including but not limited to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such errorthis Master Agreement.
2.2.22.2.3. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure.
2.2.32.2.4. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.42.2.5. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Business Online Banking and Master Cash Management Agreement
Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by the Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for the Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with the Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Online Banking Agreement
Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts.attempting
2.2.1. a. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. b. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device, and in any event no less frequently than every six months. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold Bank harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by your, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure.
2.2.3. c. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. d. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Online Banking Agreement
Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions.
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Consumer Online Banking Agreement
Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a very secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to appoint and designate, in the enrollment form for online banking, an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent Access Codes, including assigning and revoking access privileges for persons to use the Service, (“User”) and providing new and subsequent Security Devices to those Users. Bank will provide Customer’s designated Administrator, through United States postal mail, e-mail and/or other delivery service selected by Bank at Bank’s option, with an Access Code to be distributed by the Administrator to each User with respect to one or more of the Services. Customer understands the Administrator has the capability of providing administrative privileges identical to the Administrator to any User, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Customer shall review and confirm all administrative privileges granted to the Administrator and each User to ensure that only the administrative privileges intended by Customer are granted to the Administrator and User. Bank shall have no liability for administrative privileges granted by the Administrator to any User or Administrator and Customer will indemnify and hold Bank harmless from any losses, damages, costs, claims or demands arising from or in any way related to such a grant of administrative privileges by ay Administrator. Customer will be required to use the Security Device each time it accesses the Services. Customer acknowledges any Administrator shall have the ability to control security levels such as Service access and Service transaction limits, including without limitation the ability to assign dollar amount limits to transfers of funds. You also agree the Administrator or any User shall also have the authority on behalf of Customer to electronically accept and approve any and all agreements and amendments to agreements by and between Bank and Customer, including but not limited to this Agreement.
2.2.3. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device, and in any event no less frequently than every six months. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Bank harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by your, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure.
2.2.32.2.4. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.42.2.5. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Business Online Banking Agreement
Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Financial Institution directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security DevicesDevice(s)”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.1. You agree to notify the Financial Institution of any additions, changes or removal of persons authorized to use the Service. You also agree that any Authorized User shall also have the authority on behalf of Customer to electronically accept and approve any and all agreements and amendments to agreements by and between Financial Institution and Customer, including but not limited to this Master Agreement.
2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure.
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Security Procedure. The use of the Access CodeCode(s), as well as other Security Devices, as defined below, and any other procedures which the Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is Security Procedures are not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code Codes (or just your Access CodeCodes) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. (a) You agree to comply with the Security Procedures. You further , and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2(b) If you are a business, you agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent User Names, Passwords and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service, (“User”) and providing new and subsequent Security Devices to those Users. Bank will provide Customer’s designated Administrator, through United States postal mail and/or other delivery service selected by Bank at Bank’s option, with a User ID number and Password, and tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Customer understands that the Administrator has the capability of providing administrative privileges identical to that of the Administrator to any User, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Customer will be required to use the Security Device each time it accesses the Services. Customer acknowledges that any Administrator shall have the ability to control security levels such as Service access and Service transaction limits, including without limitation the ability to assign dollar amount limits to transfers of funds. You also agree that the Administrator or any User shall also have the authority on behalf of customer to electronically accept and approve any and all agreements, notices, and amendments to agreements by and between Bank and Customer, including but not limited to this Agreement.
(c) You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. If you are a business customer, you represent and warrant that no User(s) will share any Security Devices or Access Codes with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Devices have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Access Code, Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold the Bank harmless from any loss, damages, or expenses, including but not limited to attorneys’ fees, caused by you, your employees’, or agents’ failure to keep the Security Procedures or Security Device confidential and secure.
2.2.3. (d) You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s), Administrator(s) or User(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. (e) We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Combined Business and Consumer Online Banking Agreement
Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device, and in any event no less frequently than every six months. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Bank harmless from any loss, damages, or expenses, including but
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Business Online Banking Agreement
Security Procedure. The Security Codes must be entered on the appropriate pages of the Bank Site to initiate a secure AuburnBank Online banking session. Customer will be issued a temporary Security Code and will be required to change the Security Code upon initial log-in. Customer agrees that the use of the Access Security Codes along with other security processes or procedures required by the Bank or otherwise recommended and offered by the Bank for the purpose of verifying that communications, orders, instructions or inquiries regarding a Service transaction or other Service activity are those of Customer, and/or for the purpose of authenticating Customer or its Authorized Users in connection with Customer’s use of the Services, and/or for the purpose of authorizing transactions and other activities through the use of the Services, which processes or procedures may or may not involve the use of a Security Code, as well as other Security Devicesconstitutes a “commercially reasonable” security procedure for Customer’s use of AuburnBank Online and the Services hereunder (including, as defined belowwithout limitation, bill pay payment requests, person-to-person payment requests, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service stop payment orders) (collectively, the “Security Procedures”). The Access Code is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree Customer acknowledges that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method purpose of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) is for the verification of authenticity and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect an error in the transmission or content of communications any communication, transfer, or transactions payment order. No Security Procedure for the detection of any such error has been agreed upon between the Bank and Customer and, to the extent any instruction initiated under Customer’s subscription to AuburnBank Online and accepted by you and that you bear the sole responsibility for detecting and preventing such Bank in compliance with this Security Procedure contains any error.
2.2.2. You agree , to keep all Security Procedures protectedthe full extent allowed by law, secureCustomer shall be liable for, and shall indemnify the Bank against any claims, losses and expenses the Bank may incur that arise from or relate to the erroneous instructions. Customer is strictly confidential responsible to establish and maintain procedures to provide safeguard against unauthorized transmissions, and agrees to be bound by all requests, communications, or make available other instructions to the same only Bank that are initiated under Customer’s subscription to your AuburnBank Online and accepted by Bank in compliance with the Security Procedure selected by the Customer, regardless of whether or not Customer or any Authorized User actually authorized representative(s)the instruction. You agree not Customer warrants that no individual will be allowed to disclose or provide any Security Procedures initiate transfers in the absence of proper supervision and safeguards, and agrees to any unauthorized person. Where you have take reasonable steps to maintain the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security confidentiality of the Security DeviceProcedures and the Security Codes. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe Customer agrees that any request received by Bank in compliance with the Security Procedures have been stolen, compromised, required by Bank or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In recommended by Bank and selected by the event of any actual or threatened
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) Customer shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change irrefutably presumed to be necessary or desirable to protect the security from an Authorized User of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intendedCustomer.
Appears in 1 contract
Sources: Cash Management Services Agreement
Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank Financial Institution to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Financial Institution directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank Financial Institution to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit share account maintained with BankFinancial Institution, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructionauthorized
2.2.2. You acknowledge agree to appoint and designate an administrator (the “Administrator”) who will be authorized and responsible for creating and maintaining subsequent User Ids, Passwords and tokens on your behalf, including assigning and revoking access privileges for persons to use the Service, (“User”) and providing new and subsequent Security Devises to those Users. Financial Institution will provide Member’s designated Administrator, through United States postal mail and/or other delivery service selected by Financial Institution at Financial Institution’s option, with a User ID number and Password, and tokens to be distributed by the Administrator to each User with respect to one or more of the Services. Member understands that the Administrator has the capability of providing administrative privileges identical to that of the Administrator to any User, including the ability to create and maintain subsequent User accounts and assigning and revoking access privileges. If these privileges are granted by the Administrator to a User, that User will also be considered an Administrator. Member will be required to use the Security Devise each time it accesses the Services. Member acknowledges that any Administrator shall have the ability to control security levels such as Service access and Service transaction limits, including without limitation the ability to assign dollar amount limits to transfers of funds. You also agree that you the Administrator or any User shall be bound by also have the authority on behalf of Member to electronically accept and approve any and all transactions initiated through the use of such Security Proceduresagreements and amendments to agreements by and between Financial Institution and Member, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, including but not limited to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such errorthis Master Agreement.
2.2.22.2.3. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. You also agree that Users shall not share Security Devices with each other. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You agree to indemnify, defend all claims, and hold Financial Institution harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security procedures or Security Device confidential and secure.
2.2.32.2.4. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.42.2.5. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.our
Appears in 1 contract
Sources: Master Cash Management Agreement
Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by the Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for the Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with the Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold the Bank harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security Procedures or Security Device confidential and secure.
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Online Banking Agreement
Security Procedure. The use of the Access CodeCodes, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code Codes from time to time for security reasons. You should keep your Access Code Codes in a secure location. Any person having access to your Access Code (or just your Access Code) Codes will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. If you forget your Access Code you must contact us to have a new Access Code issued to you. It may take several days before you receive this new Access Code. If you have forgotten your Password, you may request a reset online or contact us to have a new Password reissued. You are responsible for safeguarding the Access CodeCodes. Providing your these Access Code Codes to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. 2.3.1 You agree to comply with the “Security Procedures. You further ” and any other security procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error.or
2.2.2. 2.3.2 You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device, and in any event no less frequently than every six months. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions.
2.2.3. 2.3.3 You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. 2.3.4 We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that agreement
2.3.5 Additional Security Procedures are provided for your protection and meet or exceed the applicable standards for multifactor authentication. Please refer to our Security Procedures, as changed, are commercially reasonable and adequate for the purposes intendedStatement which may be obtained through Business Online.
Appears in 1 contract
Sources: Online Banking Agreement
Security Procedure. The use of the Access CodeLogin Credentials, as well as other Security Devicessecurity procedures, as defined belowincluding (without limitation) any user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a security procedure, and any other procedures which the Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “"Security Procedures”"). The Access Code is Security Procedures are not designed for the detection of errors. We may require you to change your Access Code Login Credentials from time to time for security reasons. You should keep your Access Code Login Credentials in a secure location. Any person having access to your Access Code (or just your Access Code) Login Credentials will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Codethis information. Providing your Access Code this to another person effectively constitutes a grant of authority to access or make transactions on your accountsAccounts. You may also have the ability to add authorized users who, after establishing their own Login Credentials, will be able to access these Services as to your Accounts and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons.
2.2.11. II.2.1. You agree to comply with the Security Procedures. You further , and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), Procedures constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, us that the Security Procedures or any Security Device has have been stolen, compromised, or otherwise become known to persons other than you or your representative(sauthorized user(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account Accounts maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error errors in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such errorerrors.
2.2.22. II.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Where you have the ability to change or modify a Security Device Procedure from time to time (e.g., a password or User Nameyour Login Credentials), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, immediately if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened
2.2.3threatened breach of security, we may require you to establish new Login Credentials or Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. You If you are a business, you agree to notify us immediatelyindemnify, according defend all claims, and hold the Bank harmless from any loss, damages, or expenses, including but not limited to notification procedures prescribed attorneys’ fees, caused by usyou, if the authority of any authorized representative(s) shall change your employees’, or be revoked. You shall recover and return agents’ failure to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have keep the Security Device has been revokedProcedures confidential and secure.
2.2.43. II.2.3. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, Procedures at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Online and Mobile Banking Agreement
Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the security procedures established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”). The Access Code is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts.
2.2.1. You agree to comply with the Security Procedures. You further acknowledge and agree that the Security Procedures, including (without limitation) any Access Code, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers transactions and access to confidential information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instruction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. You agree to keep all Security Procedures protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedmake
2.2.3. You agree to notify us immediately, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.4. We reserve the right to modify, amend, supplement, or cancel the Security Procedures, and/or to cancel or replace any Security Devices, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Digital Banking Agreement
Security Procedure. The use of the Access Code, as well as other Security Devices, as defined below, Code and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the your Mobile Device is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errorserrors and we make no representation or warranty as to the security of the information. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding using the Access Code. Providing your Access Code to another person effectively constitutes a grant of authority to access or make transactions on your accounts.Bill Pay
2.2.1. (a) You agree to comply with the “Security Procedures. You further ” and any other Security Procedures Bank directs you to use, and you acknowledge and agree that the Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security Devices”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential customer information. You authorize us to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructiontransaction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you and that you bear the sole responsibility for detecting and preventing such error.
2.2.2. (b) You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password or User Name), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediately, according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatened
2.2.3. You agree to notify us immediatelythreatened breach of security, according to notification procedures prescribed by us, if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the we may issue you a new Security Device has been revokedor establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions.
2.2.4. (c) We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Online Banking Agreement
Security Procedure. The use of the Access Code, as well as in addition to other Security Devices, as defined authentication methods described below, and any other procedures which Bank directs you to use in this Agreement or the Operating Instructions, constitute the is a security procedures procedure established by Bank to authenticate the identity of the person attempting to gain access to the Service (collectively, the “Security Procedures”)Service. The Access Code security procedure is not designed for the detection of errors. We may require you to change your Access Code from time to time for security reasons. You should keep your Access Code in a secure location. Any person having access to your Access Code (or just your Access Code) will be able to access these Services and perform all transactions, including reviewing Account information and making Transfers to other Accounts and to other persons. You are responsible for safeguarding the Access CodeCodes, which are the “access devices” to your accounts and Internet Banking. Providing your Access Code these access devices to another person effectively constitutes a grant of authority to access or make transactions on your accountsaccounts under Consumer Financial Protection Bureau Regulation E (“REG E”).
2.2.11. You agree to comply with the “Security Procedures. You further ,” including any other Security Procedures that Bank directs you to use, either by written notice, by posting of Bank’s website or other electronic means, or any other way the Bank deems appropriate, and you acknowledge and agree that the such Security Procedures, including (without limitation) any Access Codecode, password, personal identification number, user identification technology, token, certificate, layered security, or other element, means, or method of authentication or identification used in connection with a Security Procedure (collectively “Security DevicesDevice(s)”), constitute commercially reasonable security procedures under applicable law for the initiation of the Services you utilize, including without limitation, transfers and access to confidential information. You authorize us Bank to follow any and all instructions entered and transactions initiated using applicable Security Procedures unless and until you have notified us, according to notification procedures prescribed by us, that the Security Procedures or any Security Device has been stolen, compromised, or otherwise become known to persons other than you or your representative(s) and until we have had a reasonable opportunity to act upon such notice. You agree that the initiation of a transaction transactions or instructions using applicable Security Procedures constitutes sufficient authorization for Bank to execute such transaction or instruction notwithstanding any particular designation by you of or authorized persons or signature requirements identified on any signature card or other documents relating to this Agreement or your deposit account maintained with Bank, and you agree and intend that the submission of transactions and instructions using the Security Procedures shall be considered the same as your authorized written signature in authorizing us to execute such transaction or instructiontransaction. You acknowledge and agree that you shall be bound by any and all transactions initiated through the use of such Security Procedures, whether authorized or unauthorized, and by any and all transactions and activity otherwise initiated by you, to the fullest extent allowed by law. You further acknowledge and agree that the Security Procedures are not designed to detect error in the transmission or content of communications or transactions transaction initiated by you hereunder and that you bear the sole responsibility for detecting and preventing such error.
2.2.22. You agree to keep all Security Procedures and Security Devices protected, secure, and strictly confidential and to provide or make available the same only to your authorized representative(s). You also agree that Users shall not share Security Devices with others or with and between your authorized representative(s). You agree not to disclose or provide any Security Procedures or Security Devices to any unauthorized person. Where you have the ability to change or modify a Security Device from time to time (e.g., a password Password or User NameID), you agree to change Security Devices frequently in order to ensure the security of the Security Device. You agree to notify us immediatelyimmediately by calling Customer Care (see Article X Section E), according to notification procedures prescribed by us, if you believe that any Security Procedures or Security Device have been stolen, compromised, or otherwise become known to persons other than you or your authorized representative(s) or if you believe that any transaction or activity is unauthorized or in error. In the event of any actual or threatenedthreatened breach of security, we may issue you a new Security Device or establish new Security Procedures as soon as reasonably practicable, but we shall not be liable to you or any third party for any delay in taking such actions. If you are a business, you agree to indemnify, defend all claims, and hold Bank harmless from any loss, damages, or expenses, including but not limited to attorney’s fees, caused by you, your employees’, or agents’ failure to keep the Security Procedures or Security Device confidential and secure. If you fail to comply with this paragraph, including the protection, safekeeping and confidentiality of any Security Procedures and/or Security Devices, you agree to indemnify and hold the Bank, its officers, directors, shareholders, agents, employees, and affiliates, and their respective officers, directors, agents and employees, harmless from and against any and all losses, costs, suits, damages, claims, liabilities and expenses (including reasonable attorneys’ fees) arising from or related in any way to Customer’s responsibilities hereunder.
2.2.33. You agree to notify us immediately, according to notification procedures prescribed immediately by us, calling Customer Care (see Article X Section E) if the authority of any authorized representative(s) shall change or be revoked. You shall recover and return to us any Security Devices in the possession of any of your authorized representative(s) whose authority to have the Security Device has been revoked.
2.2.44. We reserve the right to modify, amend, supplement, or cancel the any or all Security Procedures, and/or to cancel or replace any Security DevicesDevice, at any time and from time to time in our discretion. We will endeavor to give you reasonable notice of any change in Security Procedures; provided that we may make any change in Security Procedures without advance notice to you if we, in our judgment and discretion, believe such change to be necessary or desirable to protect the security of our systems and assets. Your implementation and use of any changed Security Procedures after any change in Security Procedures shall constitute your agreement to the change and your agreement that the applicable Security Procedures, as changed, are commercially reasonable and adequate for the purposes intended.
Appears in 1 contract
Sources: Internet Banking Agreement