User Passwords Clause Samples
User Passwords. If your Application runs as a "client" on a computer or mobile device owned by an Direct Transfer user, you: (i) may not store the user's password on that device without consent from the user; (ii) may not transmit or store that password to any system other than the Direct Transfer service; (iii) must protect the password using the standard protection mechanism for the platform (the password MUST NOT be stored in cleartext); and (iv) must provide a mechanism for the user to log out, which must completely remove the username and password from your application and its persistent storage. If your Application runs as an Internet service on a multi-user server, you must not ask for, view, store or cache the sign-in name or password of Direct Transfer user accounts. Authorization to access the user's account is only permitted via the "web service" authentication scheme in the API.
User Passwords. The Subscriber shall communicate any claims of non-receipt of User password(s) to Blue J Legal within 14 days of signing of this Agreement.
User Passwords. Customer shall ensure that its Users protect their unique user identification name and not make them available to persons or entities not authorized to use the Services. Linkfluence will only store User’s passwords in encrypted form. Linkfluence personnel will not be able to read User’s passwords.
User Passwords. Delta Fiber Users will have a user name and password, which allows them to gain access to the Delta Fiber Services.
User Passwords. Passwords are case sensitive and support any visible extended characters. The Customer can configure: • The minimum password length • The required mixture of character types that Authorised Users and Learners must adhere to • The password expiry interval All passwords are encrypted in storage; hashed and salted with SHA2_512. Authorised Users and Learners may choose to authenticate via third parties (Facebook, Azure AD) by setting up a "OneFile Keychain". In these cases, a token provided by that third-party is stored to authenticate the Authorised User or Learner. A single superuser account is initially created for the Customer to create the different accounts it requires for its Authorised Users and Learners. Some Authorised Users will have different roles to fulfil in the Software so these are designated when the user accounts are created. For more details on what the different roles are, what their functions, permissions and restrictions are, please consult the relevant Documentation for the Software that you have subscribed to. Our Software keeps an audit trail of Authorised Users and Learners logging in and how they interact with certain functions. These audit trails can be accessed online and through reports. Our Software is hosted at two physically different data centres. The primary centre hosts the live, production Software that is used by everyone under normal circumstances. The secondary centre is used as a disaster recovery centre that constantly receives backups from the first centre, enabling us to elevate the second centre should the first centre become inoperable. Each centre uses a different Active Directory domain to keep them isolated from other networks. There is no Virtual Private Network (VPN) to the secondary centre, and multi-factor authentication is used by our administrators for management. A business continuity plan is maintained that provides guidance on when and how to elevate our secondary centre. We currently work to a recovery point objective (RPO) of 30 minutes and a recovery time objective (RTO) of 30 minutes.
User Passwords. PearlComm Users may have a user name and password, which allows them to gain access to the PearlComm Services.
User Passwords. WAVE RURAL CONNECT Users will have a user name and password, which allows them to gain access to the WAVE RURAL CONNECT Services.
User Passwords. SR Connect Users may have a user name and password, which allows them to gain access to the SR Connect Services.
User Passwords. NH BROADBAND Users will have a user name and password, which allows them to gain access to the NH BROADBAND Services.
User Passwords. If you are granted access to information by email via a secure user password, you agree that you will keep your user password confidential. You may not disclose your user password to any other party except for those designated related parties listed in Section 3 of this Encrypted Email Registration Form. You agree to implement security policies and procedures intended to protect the confidentiality of your user password. You shall promptly notify BNY MELLON in the event that you become aware of any actual or potential disclosure of your user password to any other unauthorised party. You agree to accept responsibility for all activities occurring under your password that are due to your conduct, inaction, or negligence.