Additional Security Guidelines. All Authorized Users should sign-off after every Legacy Online session; however, online sessions will automatically end after ten (10) minutes of inactivity. This is to protect you in case you accidentally leave your computer unattended after you log-in. The security of public computers (e.g. in a library, or Internet café) cannot be assured; therefore we recommend that you refrain from accessing Legacy Online on a public computer. Routinely scan your computer, servers, and electronic media using reliable virus detection and anti-spyware products. Undetected or un-repaired viruses or spyware may affect the performance of your computer, corrupt and destroy your programs, files, and even your hardware. Additionally, you may unintentionally transmit sensitive data to another third party or transmit a virus to other computers. Use a firewall product (hardware and/or software). Keep your computer’s operating system and browser fully patched for critical security issues. We recommend use of the most current, fully patched, versions of Internet browsers for accessing the Service. In addition to the security features described above, there may be other security related notices posted on our website or within Legacy Online from time-to-time. It is your responsibility to read all security notices.
Appears in 1 contract
Sources: Legacy Online Service Agreement
Additional Security Guidelines. All Authorized Users should sign-off sign -off after every Legacy Online Service session; however, online sessions will automatically end after ten (10) minutes of inactivity. • This additional security is to protect you in case you accidentally leave your computer unattended after you log-in. • The security of public computers (e.g. in a library, or Internet café) cannot be assured; therefore therefore, we recommend that you refrain from accessing Legacy Online the Service on a public computercomputer or from public WIFI. However, if you attempt to access the Service from a public computer additional security such as a supplying the correct answer to your verification question may be required. • Routinely scan your computer, servers, and electronic media using a reliable virus detection and anti-spyware productsproduct. Undetected or un-repaired unrepaired viruses or spyware may affect the performance of your computer, corrupt and destroy your programs, files, and even your hardware. Additionally, you may unintentionally transmit sensitive data to another third party or transmit a virus to other computers. • Use a firewall product (hardware and/or software). Keep , • Periodically update your computer’s computer operating system and browser fully patched for critical security issuesrelated patches. We recommend use of the most current, fully patched, versions of Internet browsers for accessing the Service. In addition to the security features described above, there may be other security related notices posted on our website ▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇, or within Legacy Online the Service from time-to-timeto -time. It is your responsibility to read all security notices.
Appears in 1 contract
Sources: Internet Banking Agreement