User Identifications and Passwords Clause Samples

The 'User Identifications and Passwords' clause establishes the rules and responsibilities regarding the creation, use, and protection of login credentials for accessing a system or service. Typically, it requires users to keep their usernames and passwords confidential, prohibits sharing credentials with others, and may outline procedures for reporting unauthorized access or password compromise. This clause is essential for maintaining the security and integrity of the system by preventing unauthorized access and protecting sensitive information.
User Identifications and Passwords. Each User may be provided with a specific user identification and password combination solely for use by such User in accessing the Services. Customer and each User will: (i) be responsible for the security and/or use of his or her user identification and password; (ii) not disclose such user identification and password to any third person or entity; and (iii) not permit any other person or entity to use his or her user identification and password. Customer will be responsible for: (i) advising each User of his or her obligations under this Agreement and of the restrictions set forth in this Agreement; and (ii) each User's use of his or her user identification and password and the Alert Logic Technology, including, without limitation, failure to comply with the terms of this Agreement (including but not limited to any Order Form). Further Customer shall: (i) have sole responsibility for the accuracy, quality, integrity, legality, reliability, and appropriateness of all Customer Data; (ii) use commercially reasonable efforts to prevent unauthorized control or tampering or any other unauthorized access to, or use of, the Services and notify Alert Logic immediately of any unauthorized use or security breach; (iii) comply with all applicable laws, rules, regulations and guidelines (including laws regarding privacy and protection of personal data) in using the Services; (iv) obtain and maintain all computer hardware, software and communications equipment needed to access the Services and pay all access charges (e.g., ISP fees) incurred in connection with its use of the Services.
User Identifications and Passwords. Each User may be provided with a specific user identification and password combination solely for the use by such User of the applicable Recurring Service and Alert Logic Technology. Customer and each User will: (i) be responsible for the security and/or use of his or her user identification and password; (ii) not disclose such user identification and password to any third person or entity; and (iii) not permit any other person or entity to use his or her user identification and password. Customer will be responsible for: (i) advising each User of his or her obligations under this SA and of the restrictions set forth in this SA; and (ii) each User's use of his or her user identification and password, the Recurring Services and Alert Logic Technology, including, without limitation, failure to comply with the terms of this SA (including but not limited to any Order Form) or any of Alert Logic 's other policies regarding use of any of the Recurring Services and Alert Logic Technology. Alert Logic reserves the right to deny or revoke access to any of the Recurring Services and Alert Logic Technology if Alert Logic believes Customer and/or its Users are in breach of this SA (including but not limited to any Order Form) or are otherwise engaged in unauthorized or unlawful use of any of the Recurring Services and Alert Logic Technology. Customer will be responsible solely for any damages to any of the Recurring Services and Alert Logic Technology caused by Customer and/or its Users.
User Identifications and Passwords. Each User may be provided with a specific user identification and password combination solely for the use by such User of the applicable Service. End User and each User will: (i) be responsible for the security and/or use of his or her user identification and password; (ii) not disclose such user identification and password to any third person or entity; and

Related to User Identifications and Passwords

  • Customer Identification Unless Elastic has first obtained Customer's prior written consent, Elastic shall not identify Customer as a user of the Products, on its website, through a press release issued by Elastic and in other promotional materials.

  • Non-Identification Approved Users agree not to use the requested datasets, either alone or in concert with any other information, to identify or contact individual participants from whom data and/or samples were collected. Approved Users also agree not to generate information (e.g., facial images or comparable representations) that could allow the identities of research participants to be readily ascertained. These provisions do not apply to research investigators operating with specific IRB approval, pursuant to 45 CFR 46, to contact individuals within datasets or to obtain and use identifying information under an 2 The project anniversary date can be found in “My Projects” after logging in to the dbGaP authorized-access portal. IRB-approved research protocol. All investigators including any Approved User conducting “human subjects research” within the scope of 45 CFR 46 must comply with the requirements contained therein.

  • Your Member Identification Card Your BCBSRI member ID card is your key to getting healthcare coverage. It shows your healthcare provider that you’re part of the nation’s most trusted health plan. All BCBSRI members receive ID cards, which provide important information about your coverage. This card is for identification only, and you must show it whenever you receive healthcare services. Please note you must be a current member to receive covered services. Tips for keeping your card safe: • Carry it with you at all times. • Keep it in a safe location, just as you would with a credit card or money. • Let BCBSRI know right away if it is lost or stolen.

  • Customer Identification Program (A) To assist the Fund in complying with requirements regarding a customer identification program in accordance with applicable regulations promulgated by U.S. Department of Treasury under Section 326 of the USA PATRIOT Act ("CIP Regulations"), BNYM will do the following: (i) Implement procedures which require that prior to establishing a new account in the Fund BNYM obtain the name, date of birth (for natural persons only), address and government-issued identification number (collectively, the "Data Elements") for the "Customer" (defined for purposes of this Agreement as provided in 31 CFR 1024.100(c)) associated with the new account. (ii) Use collected Data Elements to attempt to reasonably verify the identity of each new Customer promptly before or after each corresponding new account is opened. Methods of verification may consist of non-documentary methods (for which BNYM may use unaffiliated information vendors to assist with such verifications) and documentary methods (as permitted by 31 CFR 1024.220), and may include procedures under which BNYM personnel perform enhanced due diligence to verify the identities of Customers the identities of whom were not successfully verified through the first- level (which will typically be reliance on results obtained from an information vendor) verification process(es). (iii) Record the Data Elements and maintain records relating to verification of new Customers consistent with 31 CFR 1024.220(a)(3). (iv) Regularly report to the Fund about measures taken under (i)-(iii) above. (v) If BNYM provides services by which prospective Customers may subscribe for shares in the Fund via the Internet or telephone, BNYM will work with the Fund to notify prospective Customers, consistent with 31 CFR 1024.220(a)(5), about the program conducted by the Fund in accordance with the CIP Regulations. (B) To assist the Fund in complying with the Customer Due Diligence Requirements for Financial Institutions promulgated by FinCEN (31 CFR § 1020.230) pursuant to the Bank Secrecy Act ("CDD Rule"), BNYM will maintain and implement written procedures that are reasonably designed to: (i) Obtain information of a nature and in a manner permitted or required by the CCD Rule in order to identify each natural person who is a "beneficial owner" (as that term is defined in the CDD Rule) of a legal entity at the time that such legal entity seeks to open an account as a shareholder of the Fund, unless that legal entity is excluded from the CDD Rule or an exemption provided for in the CDD Rule applies; and (ii) Verify the identity of each beneficial owner so identified according to risk based procedures to the extent reasonable and practicable, in accordance with the minimum requirements of the CDD Rule. (C) Nothing in Section (3) shall be construed to require BNYM to perform any course of conduct that is not required for Fund compliance with the CIP Regulations or CDD Rule, including by way of illustration not limitation the collection of Data Elements or verification of identity for individuals opening Fund accounts through financial intermediaries which use the facilities of the NSCC. (D) BNYM agrees to permit inspections relating to the CIP services provided hereunder by U.S. Federal departments or regulatory' agencies with appropriate jurisdiction and to make available to examiners from such departments or regulatory agencies such information and records relating to the CIP services provided hereunder as such examiners shall reasonably request.

  • Customer Identification Program Notice To help the U.S. government fight the funding of terrorism and money laundering activities, U.S. Federal law requires each financial institution to obtain, verify, and record certain information that identifies each person who initially opens an account with that financial institution on or after October 1, 2003. Consistent with this requirement, PFPC Trust may request (or may have already requested) the Fund's name, address and taxpayer identification number or other government-issued identification number, and, if such party is a natural person, that party's date of birth. PFPC Trust may also ask (and may have already asked) for additional identifying information, and PFPC Trust may take steps (and may have already taken steps) to verify the authenticity and accuracy of these data elements.