User Passwords Sample Clauses

User Passwords. If your Application runs as a "client" on a computer or mobile device owned by an Direct Transfer user, you: (i) may not store the user's password on that device without consent from the user; (ii) may not transmit or store that password to any system other than the Direct Transfer service; (iii) must protect the password using the standard protection mechanism for the platform (the password MUST NOT be stored in cleartext); and (iv) must provide a mechanism for the user to log out, which must completely remove the username and password from your application and its persistent storage. If your Application runs as an Internet service on a multi-user server, you must not ask for, view, store or cache the sign-in name or password of Direct Transfer user accounts. Authorization to access the user's account is only permitted via the "web service" authentication scheme in the API.
AutoNDA by SimpleDocs
User Passwords. The Subscriber shall communicate any claims of non-receipt of User password(s) to Blue J Legal within 14 days of signing of this Agreement.
User Passwords. Customer shall ensure that its Users protect their unique user identification name and not make them available to persons or entities not authorized to use the Services. Linkfluence will only store User’s passwords in encrypted form. Linkfluence personnel will not be able to read User’s passwords.
User Passwords. Delta Fiber Users will have a user name and password, which allows them to gain access to the Delta Fiber Services.
User Passwords. You acknowledge that changing your user password on a regular basis is helpful in the effort to prevent unauthorized access to your personal account. You are responsible for protecting the confidentiality of your username and password and are exclusively responsible for all activities and conduct that occur under your user name and password. You are responsible for notifying Xxxxx Telephone immediately upon learning that your user name and password have been used or may be used without your authorization. At the end of each Internet session, you are responsible for logging out and terminating the session. You are solely liable for any loss, damage, additional service charges and/or third party charges associated with or as a result of failure to comply with section 5.3 or any other section of this Agreement.
User Passwords. WAVE RURAL CONNECT Users will have a user name and password, which allows them to gain access to the WAVE RURAL CONNECT Services.
User Passwords. 5.1. If you register for an account with the App, you will be asked to choose a password. You shall be responsible to maintain the confidentiality of your password and shall be responsible for all uses via your registration and/or login, whether authorized or unauthorized by you. You agree to immediately notify us of any unauthorized use or your registration, user account or password.
AutoNDA by SimpleDocs
User Passwords. Passwords are case sensitive and support any visible extended characters. The Customer can configure: • The minimum password length • The required mixture of character types that Authorised Users must adhere to • The password expiry interval All passwords are encrypted in storage; hashed and salted with SHA2_512. Authorised Users may choose to authenticate via third parties (Facebook, Azure AD) by setting up a "OneFile Keychain". In these cases, a token provided by that third-party is stored to authenticate the Authorised User. User Roles A single superuser account is initially created for the Customer to create the different accounts it requires for its Authorised Users. Some Authorised Users will have different roles to fulfil in the Software so these are designated when the user accounts are created. For more details on what the different roles are, what their functions, permissions and restrictions are, please consult the relevant Documentation for the Software that you have subscribed to. Activity Trail Our Software keeps an audit trail of Authorised Users logging in and how they interact with certain functions. These audit trails can be accessed online and through reports. Hosting Environment Our Software is hosted at two physically different data centres. The primary centre hosts the live, production Software that is used by everyone under normal circumstances. The secondary centre is used as a disaster recovery centre that constantly receives backups from the first centre, enabling us to elevate the second centre should the first centre become inoperable. Each centre uses a different Active Directory domain to keep them isolated from other networks. There is no Virtual Private Network (VPN) to the secondary centre, and multi-factor authentication is used by our administrators for management. Business Continuity A business continuity plan is maintained that provides guidance on when and how to elevate our secondary centre. We currently work to a recovery point objective (RPO) of 30 minutes and a recovery time objective (RTO) of 30 minutes.
User Passwords. If you are granted access to information by email via a secure user password, you agree that you will keep your user password confidential. You may not disclose your user password to any other party except for those designated related parties listed in Section 3 of this Encrypted Email Registration Form. You agree to implement security policies and procedures intended to protect the confidentiality of your user password. You shall promptly notify BNY MELLON in the event that you become aware of any actual or potential disclosure of your user password to any other unauthorised party. You agree to accept responsibility for all activities occurring under your password that are due to your conduct, inaction, or negligence.
User Passwords. SR Connect Users may have a user name and password, which allows them to gain access to the SR Connect Services.
Time is Money Join Law Insider Premium to draft better contracts faster.