Authentication and Security Procedures. We reserve the right to deny access to the Service or reject a transaction on your account(s) without notice to you if we believe that there is risk of unauthorized, illegal, or fraudulent activity. You agree that we may, in our sole discretion, require verification of user identity, in a manner satisfactory to us, at any time before allowing access or login to the Service or before authorizing an online transaction from an account. Such verification may be in any form we determine appropriate and may include, without limitation: 1) verification of Username/Member Number, PIN or password; 2) verification of personal information contained in Credit Union records; 3) correct response to previously submitted personal questions, sometimes referred to as “security” or “challenge” questions; 4) correct response to questions devised from public records and consumer reporting agencies on subjects only the user likely would have personal knowledge, sometimes called “out of wallet” or “knowledge based authentication” questions; 5) verification of online activity by simultaneous contact through a non-online channel, sometimes
Appears in 2 contracts
Sources: Bill Payment Agreement, Bill Payment Agreement
Authentication and Security Procedures. We reserve the right to deny access to the Service or reject a transaction on your account(s) without notice to you if we believe that there is risk of unauthorized, illegal, or fraudulent activity. You agree that we may, in our sole discretion, require verification of user identity, in a manner satisfactory to us, at any time before allowing access or login to the Service or before authorizing an online transaction from an account. Such verification may be in any form we determine appropriate and may include, without limitation: 1) verification of Username/Member Number, PIN or password; 2) verification of personal information contained in Credit Union records; 3) correct response to previously submitted personal questions, sometimes referred to as “security” or “challenge” questions; 4) correct response to questions devised from public records and consumer reporting agencies on subjects only the user likely would have personal knowledge, sometimes called “out of wallet” or “knowledge based authentication” questions; 5) verification of online activity by simultaneous contact through a non-online channel, sometimessometimes called “verify by phone” or “out of band” authentication; or 6) any verification procedure that we may determine appropriate.
Appears in 1 contract
Sources: Bill Payment Agreement