Security; Reliance; Unauthorized Use; Funds Transfers Clause Samples

This clause establishes the responsibilities and procedures related to the security of funds transfers, the parties' reliance on provided information, and the handling of unauthorized use. It typically outlines the measures both parties must take to safeguard account credentials and details the process for reporting and addressing unauthorized transactions, such as requiring prompt notification if suspicious activity is detected. The core function of this clause is to allocate risk and clarify liability in the event of unauthorized transfers, ensuring both parties understand their obligations to prevent and respond to security breaches.
Security; Reliance; Unauthorized Use; Funds Transfers. Custodian will establish security procedures to be followed in connection with the use of the Electronic Services, and the Fund agrees to comply with the security procedures. The Fund understands and agrees that the security procedures are intended to determine whether instructions received by Custodian through the Electronic Services are authorized but are not (unless otherwise specified in writing) intended to detect any errors contained in such instructions. The Fund will cause all persons utilizing the Electronic Services to treat any user and authorization codes, passwords, authentication keys and other security devices with the highest degree of care and confidentiality. Upon termination of the Fund’s use of the Electronic Services, the Fund shall return to Custodian any security devices (e.g., token cards) provided by Custodian. Custodian is hereby irrevocably authorized to comply with and rely upon on Written Instructions and other communications, whether or not authorized, received by it through the Electronic Services. The Fund acknowledges that it has sole responsibility for ensuring that only Authorized Persons use the Electronic Services and that to the fullest extent permitted by applicable law Custodian shall not be responsible nor liable for any unauthorized use thereof or for any losses sustained by the Fund arising from or in connection with the use of the Electronic Services or Custodian’s reliance upon and compliance with Written Instructions and other communications received through the Electronic Services. With respect to instructions for a transfer of funds issued through the Electronic Services, when instructed to credit or pay a party by both name and a unique numeric or alpha-numeric identifier (e.g. ABA number or account number), the Custodian, its affiliates, and any other bank participating in the funds transfer, may rely solely on the unique identifier, even if it identifies a party different than the party named. Such reliance on a unique identifier shall apply to beneficiaries named in such instructions as well as any financial institution which is designated in such instructions to act as an intermediary in a funds transfer. It is understood and agreed that unless otherwise specifically provided herein, and to the extent permitted by applicable law, the parties hereto shall be bound by the rules of any funds transfer system utilized to effect a funds transfer hereunder.
Security; Reliance; Unauthorized Use; Funds Transfers. BNY will establish security procedures to be followed in connection with the use of the Electronic Services, and Customer agrees to comply with the security procedures. Customer understands and agrees that the security procedures are intended to determine whether instructions received by BNY through the Electronic Services are authorized but are not (unless otherwise specified in writing) intended to detect any errors contained in such instructions. Customer will cause all persons utilizing the Electronic Services to treat any user and authorization codes, passwords, authentication keys and other security devices with the highest degree of care and confidentiality. Upon termination of Customer’s use of the Electronic Services, Customer shall return to BNY any security devices (e.g., token cards) provided by BNY. BNY is hereby irrevocably authorized to comply with and rely upon on
Security; Reliance; Unauthorized Use; Funds Transfers. Custodian will establish security procedures to be followed in connection with the use of the Electronic Services, and the Fund agrees to comply with the security procedures. The Fund understands and agrees that the security procedures are intended to determine whether instructions received by Custodian through the Electronic Services are authorized but are not (unless otherwise specified in writing) intended to detect any errors contained in such instructions. The Fund will cause all persons utilizing the Electronic Services to treat any user and authorization codes, passwords, authentication keys and other security devices with the highest degree of care and confidentiality. Upon termination of the Fund’s use of the Electronic Services, the Fund shall return to Custodian any security devices (e.g., token cards) provided by Custodian. Custodian is hereby irrevocably authorized to comply with and rely upon on Written Instructions and other communications, whether or not authorized, received by it through the Electronic Services. The Fund acknowledges

Related to Security; Reliance; Unauthorized Use; Funds Transfers

  • Security; Reliance; Unauthorized Use The Fund will cause all persons utilizing the Software and System to treat all applicable user and authorization codes, passwords and authentication keys with extreme care, and it will establish internal control and safekeeping procedures to restrict the availability of the same to persons duly authorized to give Instructions. Custodian is hereby irrevocably authorized to act in accordance with and rely on Instructions received by it through the System. The Fund acknowledges that it is its sole responsibility to assure that only persons duly authorized use the System and that Custodian shall not be responsible nor liable for any unauthorized use thereof.

  • No Reliance on Administrative Agent’s Customer Identification Program Each Lender acknowledges and agrees that neither such Lender, nor any of its Affiliates, participants or assignees, may rely on the Administrative Agent to carry out such Lender’s, Affiliate’s, participant’s or assignee’s customer identification program, or other obligations required or imposed under or pursuant to the USA Patriot Act or the regulations thereunder, including the regulations contained in 31 CFR 103.121 (as hereafter amended or replaced, the “CIP Regulations”), or any other Anti-Terrorism Law, including any programs involving any of the following items relating to or in connection with any of the Loan Parties, their Affiliates or their agents, the Loan Documents or the transactions hereunder or contemplated hereby: (i) any identity verification procedures, (ii) any recordkeeping, (iii) comparisons with government lists, (iv) customer notices or (v) other procedures required under the CIP Regulations or such other Laws.

  • No Reliance on Agent’s Customer Identification Program Each Lender acknowledges and agrees that neither such Lender, nor any of its Affiliates, participants or assignees, may rely on the Agent to carry out such Lender’s, Affiliate’s, participant’s or assignee’s customer identification program, or other obligations required or imposed under or pursuant to the USA PATRIOT Act or the regulations thereunder, including the regulations contained in 31 CFR 103.121 (as hereafter amended or replaced, the “CIP Regulations”), or any other Anti-Terrorism Law, including any programs involving any of the following items relating to or in connection with any Borrower, its Affiliates or its agents, this Agreement, the Other Documents or the transactions hereunder or contemplated hereby: (1) any identity verification procedures, (2) any record-keeping, (3) comparisons with government lists, (4) customer notices or (5) other procedures required under the CIP Regulations or such other laws.

  • Reliance on Electronic Instructions If the Trust has the ability to originate electronic instructions to GFS in order to (i) effect the transfer or movement of cash or Shares or (ii) transmit Shareholder information or other information, then in such event GFS shall be entitled to rely on the validity and authenticity of such instruction without undertaking any further inquiry as long as such instruction is undertaken in conformity with security procedures established and agreed upon by GFS and the Fund’s investment adviser.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy