Security Procedures and Communications Clause Samples

Security Procedures and Communications. Certain Security Procedures designed to verify the origination (but not errors in transmission or content) of instructions, orders and other communications sent by Financial Institution and Business might be used in connection with the Service. Business agrees that any such mutually agreed-upon Security Procedures shall be deemed commercially reasonable. Financial Institution shall not be obligated to act on a communication not transmitted in accordance with the Security Procedures and may refuse to act on any communication where Financial Institution reasonably doubts its authorization, contents, origination or compliance with the Security Procedures. Financial Institution shall have no duty to discover, and shall not be liable for, errors or omissions by Business. If Financial Institution complies with the Security Procedures with respect to a communication, Financial Institution shall be entitled to act on that communication and shall not be obligated to verify the content of such communication, establish the identity of the person giving it, or await any confirmation thereof, and Financial Institution shall not be liable for acting on, and Business shall be bound by, any communication sent in the name of Business, whether or not authorized. Financial Institution reserves the right to issue new Security Procedures and/or to cancel or change any Security Procedures from time to time. Whenever the Security Procedures include the assigning to Business of any confidential password, logon identification, identification code, personal or location identification number, repetitive code, or similar security device, Business shall not disclose such security device except to employees or agents authorized to act for Business in connection with the Service. Business shall implement such safeguards as are reasonably necessary to ensure the confidentiality and integrity of such security devices, and shall immediately notify Financial Institution if the confidentiality or integrity of any such security device is breached or threatened. Business shall be solely responsible for the security of the physical and electronic data in its possession. Business shall also be solely responsible for safekeeping of confidential password, log-on identification, identification code, personal or location identification number, repetitive code, or similar security device and assumes all risk of accidental disclosure or inadvertent use of such security devices by any party whatsoever,...
Security Procedures and Communications. Application of the procedures and Security Codes to authenticate a Communication will be collectively referred to as the “Security Proceduresin this Agreement. If we take any action that is not provided in the Security Procedures in connection with any Communication, such additional action should not be deemed to become a mandatory part of the continuing Security Procedures. You understand and agree that we will use the Security Procedures to verify the authenticity of Communications and that the Security Procedures are not designed to, and are not used for the purpose of, detecting errors in transmission or content of Communications, including discrepancies between account names and numbers. Before using a Service and before sending a Communication to us, you will review the Security Procedures and determine whether the Security Procedures will provide a commercially reasonable method for verifying whether a Communication is that of yours. As part of the review, you will consider the size, type and frequency of Communications you normally make or anticipate making, along with such other factors as you may deem relevant or appropriate. • Commercially Reasonable Procedures. If the size, type or frequency of Communications made by you changes such that the Security Procedures in use by you no longer provide a commercially reasonable method of providing security against unauthorized Communications, you shall immediately notify us.
Security Procedures and Communications. Certain procedures, including the use of identification codes, encryption, passwords, logon identifications, personal or location identification numbers, repetitive codes, tokens and other security devices, systems and software (the “Security Procedures”), designed to verify the origination (but not errors in transmission or content) of instructions, orders and other communications (each, a “Communication”) sent between Member and Landmark may be used in connection with Business eDeposit Services. Member agrees that any such mutually agreed-upon Security Procedures shall be deemed commercially reasonable. Landmark shall not be obligated to act on a Communication not transmitted in accordance with the Security Procedures and may refuse to act on any Communication where Landmark reasonably doubts its authorization, authenticity, contents, origination or compliance with the Security Procedures. Landmark shall have no duty to discover, and shall not be liable for, errors or omissions by Member. If Landmark complies with the Security Procedures in respect to a Communication, Landmark shall be entitled to act on that Communication and shall not be obligated to verify the content of such Communication, establish the identity of the person giving it, or await any confirmation thereof, and Landmark shall not be liable for acting on, and Member shall be bound by, any Communication sent in the name of Member, whether or not authorized. Whenever the Security Procedures include the
Security Procedures and Communications. You are responsible for (i) maintaining the confidentiality and security of your Mobile Devices, access number(s), password(s), security question(s) and answer(s), account number (s), login information, and any other security or access information, used by you to access the Mobile Remote Deposit Capture service (collectively, "Access Information"), and (ii) preventing unauthorized access to or use of the information, files or data that you store, transmit or use in or with the Mobile Remote Deposit Capture service (collectively, "Account Information"). You agree not to supply your Access Information to anyone. You will be responsible for all electronic communications, including image transmissions, email and other data ("Communications") entered using the Access Information. Any Communications received through the use of the Access Information will be deemed to be sent or authorized by you. You agree to immediately notify us if you become aware of any loss, theft or unauthorized use of any Access Information, including your Mobile Devices. We reserve the right to deny you access to the Mobile Remote Deposit Capture service (or any part thereof) if we believe that any loss, theft or unauthorized use of Access Information has occurred.
Security Procedures and Communications. Check Images transmitted via Bank’s Remote Deposit Capture Service must be made by Users named by the Administrator using assigned Security Tokens. Mobile Deposit Users must use the Mobile Device Security Procedures.
Security Procedures and Communications 

Related to Security Procedures and Communications

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Agreement Administration and Communications A. Under this Agreement, either of the representatives of the Judicial Council identified below will monitor the Work and act as the Judicial Council’s liaisons with the Contractor: i. The Meeting Planner will be MPname. B. The Judicial Council may reallocate funds between the estimated amounts set forth in Exhibit G, without an Amendment to this Agreement, as long as the total amount to be paid under this Agreement does not exceed the Contract Amount. C. All requests and communications about the Work to be performed under this Agreement, including signing of any BEO’s, shall be made through the Meeting Planner or his or her designee or successor. D. Any Notice from the Contractor to the Judicial Council shall be delivered to the following address: MP name, Meeting Planner Judicial Council of California ▇▇▇ ▇▇▇▇▇▇ ▇▇▇▇ ▇▇▇▇▇▇ ▇▇▇ ▇▇▇▇▇▇▇▇▇, ▇▇ ▇▇▇▇▇-▇▇▇▇ E. Notice to the Contractor shall be directed to the Contractor’s liaison, Attn, or his or her designee or successor, at the following address: Attn: Ktr DifferentAddress1 DifferentAddress2

  • Information and communication The Parties shall support the development of modern methods of information handling, including the media, and stimulate the effective mutual exchange of information. Priority shall be given to programmes aimed at providing the general public with basic information about the Community and the Republic of Azerbaijan, including, where possible, access to databases, in full respect of intellectual property rights.