Agreed Security Procedure Sample Clauses

Agreed Security Procedure. You agree that Digital Banking’s requirement for entry of valid Access Credentials, consisting of either (1) your company ID (for business Channels), user ID and password, or (2) your biometric identification (e.g., fingerprint or facial recognition) in a Mobile Banking Channel, is a commercially reasonable
AutoNDA by SimpleDocs
Agreed Security Procedure. You agree that Digital Banking’s requirement for entry of valid Access Credentials, consisting of either (1) your company ID (for business Channels), user ID and password, or (2) your biometric identification (e.g., fingerprint or facial recognition) in a Mobile Banking Channel, is a commercially reasonable “security procedure” for verifying the identity and authority of a person accessing or using Digital Banking, and verifying the authenticity and authorization of Communications made in your name to Digital Banking (the “Agreed Security Procedure”). By entering into Related Documents for specific functions (e.g., Online Wires), you and we may establish additional or alternate Agreed Security Procedures for those specific functions. Your assent to Digital Banking security procedures is for purposes that include, but are not limited to, Uniform Commercial Code Article 4A, Funds Transfers, Part 2. “Communications” include any electronic communication between us using the Digital Banking service itself (including but not limited to submitting or acknowledging Orders for payments, amendments and cancellations of Orders, electronic messages to Digital Banking’s messaging center, your customer profile updates, entering into and accepting Related Documents, and a business Channel CSA performing self-administration functions).
Agreed Security Procedure. You agree that Digital Banking’s requirement for entry of valid Access Credentials, consisting of either (1) your company ID (for business Channels), user ID and password, or (2) your biometric identification (e.g., fingerprint or facial recognition) in a Mobile Banking Channel, is a commercially reasonable “security procedure” for verifying the identity and authority of a person accessing or using Digital Banking, and verifying the authenticity and authorization of Communications made in your name to Digital Banking (the “Agreed Security Procedure”). By entering into Related Documents for specific functions (e.g., Online Wires), you and we may establish additional or alternate Agreed Security Procedures for those specific functions. Your assent to Digital Banking security procedures is for purposes that include, but are not limited to, Uniform Commercial Code

Related to Agreed Security Procedure

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Provisions Order 1600.72A, Contractor and Industrial Security Program applies to all Contractors, subcontractors, consultants, or any other persons (not visitors) who have access to FAA facilities, sensitive unclassified information, and resources. See Security Guidelines (Attachment J-9) for more details. The Government will update the document periodically to reflect the current FAA security policy. The Government designates all eFAST labor categories as enumerated in Attachment J-3 as low risk for the Risk/Sensitivity Level. Program office CORs will review labor category designations and indicate changes to the contractually designated default Risk/Sensitivity Level Designations as appropriate for their specific contracts or task orders. This would require a submission of a “Contractor Position Risk/Sensitivity Level Designation Record” form (FAA Form 1600-77).

  • Indemnity Procedure A party or parties hereto agreeing to be responsible for or to indemnify against any matter pursuant to this Agreement is referred to herein as the “Indemnifying Party” and the other party or parties claiming indemnity is referred to as the “Indemnified Party”. An Indemnified Party under this Agreement shall, with respect to claims asserted against such party by any third party, give written notice to the Indemnifying Party of any liability which might give rise to a claim for indemnity under this Agreement within sixty (60) Business Days of the receipt of any written claim from any such third party, but not later than twenty (20) days prior to the date any answer or responsive pleading is due, and with respect to other matters for which the Indemnified Party may seek indemnification, give prompt written notice to the Indemnifying Party of any liability which might give rise to a claim for indemnity; provided, however, that any failure to give such notice will not waive any rights of the Indemnified Party except to the extent the rights of the Indemnifying Party are materially prejudiced. The Indemnifying Party shall have the right, at its election, to take over the defense or settlement of such claim by giving written notice to the Indemnified Party at least fifteen (15) days prior to the time when an answer or other responsive pleading or notice with respect thereto is required. If the Indemnifying Party makes such election, it may conduct the defense of such claim through counsel of its choosing (subject to the Indemnified Party’s approval of such counsel, which approval shall not be unreasonably withheld or delayed), shall be solely responsible for the expenses of such defense and shall be bound by the results of its defense or settlement of the claim. The Indemnifying Party shall not settle any such claim without prior notice to and consultation with the Indemnified Party, and no such settlement involving any equitable relief or which might have an adverse effect on the Indemnified Party may be agreed to without the written consent of the Indemnified Party (which consent shall not be unreasonably withheld or delayed). So long as the Indemnifying Party is diligently contesting any such claim in good faith, the Indemnified Party may pay or settle such claim only at its own expense and the Indemnifying Party will not be responsible for the fees of separate legal counsel to the Indemnified Party, unless the named parties to any proceeding include both parties or representation of both parties by the same counsel would be inappropriate in the reasonable opinion of counsel to the Indemnified Party, due to conflicts of interest or otherwise. If the Indemnifying Party does not make such election, or having made such election does not, in the reasonable opinion of the Indemnified Party proceed diligently to defend such claim, then the Indemnified Party may (after written notice to the Indemnifying Party), at the expense of the Indemnifying Party, elect to take over the defense of and proceed to handle such claim in its discretion and the Indemnifying Party shall be bound by any defense or settlement that the Indemnified Party may make in good faith with respect to such claim. In connection therewith, the Indemnifying Party will fully cooperate with the Indemnified Party should the Indemnified Party elect to take over the defense of any such claim. The parties agree to cooperate in defending such third party claims and the Indemnified Party shall provide such cooperation and such access to its books, records and properties (subject to the execution of appropriate non-disclosure agreements) as the Indemnifying Party shall reasonably request with respect to any matter for which indemnification is sought hereunder; and the parties hereto agree to cooperate with each other in order to ensure the proper and adequate defense thereof. With regard to claims of third parties for which indemnification is payable hereunder, such indemnification shall be paid by the Indemnifying Party upon the earlier to occur of: (i) the entry of a judgment against the Indemnified Party and the expiration of any applicable appeal period, or if earlier, five (5) days prior to the date that the judgment creditor has the right to execute the judgment; (ii) the entry of an unappealable judgment or final appellate decision against the Indemnified Party; or (iii) a settlement of the claim. Notwithstanding the foregoing, the reasonable expenses of counsel to the Indemnified Party shall be reimbursed on a current basis by the Indemnifying Party. With regard to other claims for which indemnification is payable hereunder, such indemnification shall be paid promptly by the Indemnifying Party upon demand by the Indemnified Party.

  • Contractor and Employee Security Precautions A. The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • UNION SECURITY AND CHECKOFF 5:01 It shall be a condition of continued employment for all employees including probationary employees, as defined in Article 2, to become members and maintain membership in good standing in the Union.

Time is Money Join Law Insider Premium to draft better contracts faster.