ATM Security Sample Clauses

ATM Security a. Do not lend your ATM card to anyone.
AutoNDA by SimpleDocs
ATM Security. The following information is a list of safety precautions regarding the use of Automated Teller Machines (ATM) and Night Deposit Facilities: • Be aware of your surroundings, particularly at night. • Consider having someone accompany you when the ATM or night deposit facility is used after dark. • If another person is uncomfortably close to you at the time of your transaction, ask the person to step back before you complete your transaction. • Refrain from displaying your cash at the ATM or night deposit facility. As soon as your transaction is completed, place your money in your purse or wallet. Count the cash later in the safety of your car or home. • If you notice anything suspicious at the ATM or night deposit facility, consider using another ATM or night deposit facility or coming back later. If you are in the middle of a transaction and you notice something suspicious, cancel the transaction, take your Card or deposit envelope and leave. • If you are followed after making a transaction, go to the nearest public area where people are located. • Do no write your PIN or code on your Card. • Report all crimes to law enforcement officials immediately.
ATM Security. Automated Teller Machines provide quick, convenient access to your Accounts, but there are some safety precautions you should always take when visiting an ATM. Keeping your ATM/Debit card secure: • Protect your ATM/Debit card as if it were cash. Report a lost or stolen CUTX card immediately-call 000-000-0000 or 000-000-0000. Safeguard your Personal Identification Number (PIN). Never leave your receipt behind-even with an incomplete transaction. Do not give out any information about your ATM/Debit card over the telephone. • Check receipts against your monthly statement to guard against fraud. • If your card has an embedded chip, please keep the card in a safety envelope to avoid undetected and unauthorized scanning. • If your card is lost or stolen, immediately call us to reduce the chance that it will be used improperly. Immediate notice of a lost or stolen card will also limit your potential liability for unauthorized transactions. • Never disclose information about your card in response to an unsolicited e-mail, internet, or phone request. E-mail is a common channel for fraud perpetration. Never provide your debit or credit card number, PIN or any other non-public personal information to anyone, unless to a trusted merchant in a call or transaction initiated by you. CUTX will never ask you for your PIN. • Review your Account statements for unauthorized transactions. Promptly report any errors to us. • ATM transactions and PIN debit purchases require the use of a secret code known as a personal identification number or PIN. Memorize your PIN; NEVER write it on your card or store it with your card. Never let anyone else enter your PIN for you. If making a purchase online, end transactions by logging out of the website instead of just closing the web browser. Security at Walk-Up and Drive-Up ATMs/ITMs: • Always observe your surroundings before conducting a transaction. Minimize your time at the ATM/ITM, have your card out and ready to use. Give people ahead of you space to conduct their transactions. Block the view of others when using the ATM/ITM. If an ATM/ITM is obstructed from view or poorly lit, go to another ATM/ITM. • If you see anyone or anything suspicious while conducting a transaction, cancel your transaction and leave immediately. • Inspect ATM/ITM machines before use for possible tampering, or for the presence of an unauthorized attachment that could capture information from the card or your PIN. • Refrain from displaying cash by putting it awa...
ATM Security. The following information is a list of safety night deposit facility is used after dark of your transaction, ask the person to step back deposit facility facility, consider using another A or coming back later tak

Related to ATM Security

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Aviation Security (1) Each Contracting Party reaffirms that its obligation to the other Contracting Party to protect the security of civil aviation against unlawful interference forms an integral part of this Agreement. Each Contracting Party shall in particular act in conformity with the aviation security provisions of the Convention on Offences and Certain Other Acts Committed on Board Aircraft, signed at Tokyo on 14 September 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, signed at The Hague on 16 December 1970 and the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, signed at Montreal on 23 September 1971.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues.

Time is Money Join Law Insider Premium to draft better contracts faster.