Your Internal Security Sample Clauses

Your Internal Security. You bear sole responsibility for establishing, maintaining, implementing and updating policies, procedures, equipment and software (“Internal Security Controls”) that ensure the security and integrity of your processes, equipment (including telecommunications and computer systems) and information, protect them from any unauthorized use, intrusion, takeover or theft, and prevent your Access Credentials from any unauthorized discovery or use (collectively “Internal Security Breaches”). You bear all risk of fraudulent transfers and other losses or disclosures arising from your Internal Security Breaches or from the interception of your communications prior to their receipt by us (collectively “Internal Security Losses”). We will not reimburse your Internal Security Losses. You agree that we are authorized to execute, and it is commercially reasonable for us to execute, any instruction received by us and authenticated by your Access Credentials. You are encouraged to consider purchasing insurance to cover your Internal Security Losses. To protect your system from Internal Security Breaches, your Internal Security Controls should consider including: i. Limiting and controlling who has access to your computer systems; ii. Protecting and frequently changing your internal passcodes and Service Access Credentials; iii. Adopting dual authorization and/or transaction-based authentication procedures for financial transfers where available; iv. Employing up-to-date security software such as anti-virus, anti-malware and anti-spyware programs, as well as up-to-date software patches for all your software programs, internet browsers, email programs, and the like; v. Using effective, up-to-date firewalls; vi. Procedures to avoid infection by malicious software, such as: controlling what websites are visited by your computers; controlling the connection of other devices (e.g., flash drives) to your computers; controlling what documents, email attachments, programs and other files are opened or installed on your computers; and limiting which of your computers are used for online banking; vii. Reconciling all Accounts (including online monitoring) on a daily basis, and immediately reporting any discrepancies; viii. Prohibiting your Authorized Users from leaving computers unattended or from communicating or accessing sensitive information from insecure locations (e.g., terminals or networks at Internet cafes or airports); ix. Allowing Services to be accessed only from secure lo...
Your Internal Security. You agree to establish, implement, maintain and update (as appropriate) policies, procedures, equipment and software (“Internal Security Controls”) that, with respect to the initiation, processing and storage of ACH, wire and other transactions, will: (a) protect the confidentiality and integrity of non-public personal information, including financial information, of a natural person used to create or contained within an ACH or other Order and any related addenda record (“Protected Information”) until its destruction, (b) protect against anticipated threats or hazards to the security or integrity of Protected Information until its destruction, (c) protect against unauthorized use of Protected Information that could result in harm to a natural person, and (d) comply with all applicable regulatory guidelines on access to and security for the systems you use to initiate, process, and store ACH, wire and other transactions. Your Internal Security Controls must also safeguard the security and integrity of your computer system and information from unauthorized use, intrusion, takeover or theft, and prevent your Password from unauthorized discovery or use (collectively “Internal Security Breaches”). You bear all risk of fraudulent transfers and other losses arising from your Internal Security Breaches or from the interception of your communications prior to their receipt by us (collectively “Internal Security Losses”). We will not reimburse you in connection with Internal Security Losses. You agree that we are authorized to execute, and it is commercially reasonable for us to execute, any instruction received by us with your Password. You are encouraged to consider purchasing insurance to cover your Internal Security Losses. To protect your system from Internal Security Breaches, your Internal Security Controls should consider including: a. Limiting and controlling who has access to your computer systems; b. Protecting and frequently changing your internal passcodes and Service Access Credentials; c. Adopting default setting of “return” for Payee Positive Pay and ACH Positive Pay exception items; d. Adopting Dual Control and/or transaction-based authentication procedures for financial transfers and templates where available; e. Employing up-to-date security software such as anti-virus, anti-malware and anti-spyware programs, as well as up-to-date software patches for all your software programs, internet browsers, email programs, and the like; f. Using effective, ...

Related to Your Internal Security

  • National Security 28.01 The Canadian government, either directly or through its agencies, may instruct the Employer with respect to the security of information and materials and the personnel permitted to do certain work. The Union recognizes that the Employer is obliged to meet such instructions and that for such reason the Employer may refuse certain Employees access to the work or may transfer Employees covered by such instructions.

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

  • Organizational Security It is the responsibility of the individuals across the organization to comply with these practices and standards. To facilitate the corporate adherence to these practices and standards, the function of information security provides:

  • Additional Securities If such Pledgor shall receive by virtue of its being, becoming or having been the owner of any Pledged Collateral, any (i) certificate, including without limitation, any certificate representing a dividend or distribution in connection with any increase or reduction of capital, reclassification, merger, consolidation, sale of assets, combination of shares or membership or equity interests, stock splits, spin-off or split-off, promissory notes or other instrument; (ii) option or right, whether as an addition to, substitution for, or an exchange for, any Pledged Collateral or otherwise; (iii) dividends payable in securities; or (iv) distributions of securities or other equity interests in connection with a partial or total liquidation, dissolution or reduction of capital, capital surplus or paid-in surplus, such Pledgor shall receive such certificate, instrument, option, right or distribution in trust for the benefit of the Administrative Agent, shall segregate it from such Pledgor’s other property and shall deliver it forthwith to the Administrative Agent in the exact form received together with any necessary endorsement and/or appropriate stock power duly executed in blank, substantially in the form provided in Exhibit 4(a), to be held by the Administrative Agent as Pledged Collateral and as further collateral security for the Secured Obligations.

  • Transfer and Exchange of Global Securities (i) The transfer and exchange of Global Securities or beneficial interests therein shall be effected through the Depository, in accordance with this Indenture (including applicable restrictions on transfer set forth herein, if any) and the procedures of the Depository therefor. A transferor of a beneficial interest in a Global Security shall deliver a written order given in accordance with the Depository’s procedures containing information regarding the participant account of the Depository to be credited with a beneficial interest in the Global Security and such account shall be credited in accordance with such instructions with a beneficial interest in the Global Security and the account of the Person making the transfer shall be debited by an amount equal to the beneficial interest in the Global Security being transferred. (ii) If the proposed transfer is a transfer of a beneficial interest in one Global Security to a beneficial interest in another Global Security, the Security Registrar shall reflect on its books and records the date and an increase in the principal amount of the Global Security to which such interest is being transferred in an amount equal to the principal amount of the interest to be so transferred, and the Security Registrar shall reflect on its books and records the date and a corresponding decrease in the principal amount of the Global Security from which such interest is being transferred. (iii) Notwithstanding any other provisions of this Appendix A (other than the provisions set forth in Section 2.4), a Global Security may not be transferred as a whole except by the Depository to a nominee of the Depository or by a nominee of the Depository to the Depository or another nominee of the Depository or by the Depository or any such nominee to a successor Depository or a nominee of such successor Depository. (iv) In the event that a Global Security is exchanged for Definitive Securities pursuant to Section 2.4 prior to the consummation of a Registered Exchange Offer or the effectiveness of a Shelf Registration Statement with respect to such Securities, such Securities may be exchanged only in accordance with such procedures as are substantially consistent with the provisions of this Section 2.3 (including the certification requirements set forth on the reverse of the Initial Securities intended to ensure that such transfers comply with Rule 144A, Regulation S or such other applicable exemption from registration under the Securities Act, as the case may be) and such other procedures as may from time to time be adopted by the Issuer.