Browser Security Sample Clauses

Browser Security. HFCU requires the use of a secure browser to protect you while you access your account online. Secure browsers have a high level or protection, allowing your information to be encrypted when passed through the website to HFCU. For these reasons, only more recent browser versions of the following are permitted to be used when logging into eBranch: • Google Chrome • Firefox • Safari (macOS only) • Edge (Windows only) Hours of Access eBranch is available for member convenience twenty-four hours per day. Members will be notified of planned and unplanned maintenance/downtime as soon as practical. Account Opening When an account is applied for online, it is important for each member, as well as HFCU, to make sure that we have correct and complete information, and that the information is verified and protected. We take protecting your information very seriously. Increased regulatory procedures have added information-gathering requirements for financial institutions. These are set in order to protect everyone and keep the financial system safe and secure. Ongoing advances in technology mean that we are constantly upgrading systems and securities to keep member information safe and secure. User IDs & Passwords In order to access certain systems, as well as all functionalities on eBranch, you will need to use a user name and password. This information may either be provided for you or you will be allowed to choose your own. There are rules in place about the length and allowable characters for both of these items in order to make both your user name and password difficult to guess. The use of a user ID and password are designed to protect you by confirming your identity, and should be kept confidential. HFCU employees do not have access to your password, nor can they manually create a password for you. When resetting a password, HFCU employees will be sending you notification of a temporary password that is system generated. After logging in with that temporary password, you will be prompted to reset your password. It is very important that you do not share your password with anyone or allow a computer to save or remember your password, especially if you are utilizing a computer with public or shared access. You will be prompted every (# timeframe) to update/reset your password. This is for your protection and security.
AutoNDA by SimpleDocs
Browser Security. Our Online Banking Service transmits data Using SSL (Secure Socket Layer) technology that supports 128‐bit key encryption. It is important to verify that a secure connection between your browser and the Online Banking server has been established before transmitting any confidential account information over the Internet. An indicator on your web browser can verify this. For example, Microsoft Internet Explorer has a lock symbol that appears when data is being encrypted. When this symbol does not appear, a session is not secure.
Browser Security. Our Digital Service transmits data Using SSL (Secure Socket Layer) technology that supports 128-bit key encryption. It is important to verify that a secure connection between your browser and the Digital Services server has been established before transmitting any confidential account information over the Internet. An indicator on your web browser can verify this. For example, Microsoft Internet Explorer has a lock symbol that appears when data is being encrypted. When this symbol does not appear, a session is not secure.
Browser Security. Whilst it shall always be for the Supplier to ensure compliance with the above-mentioned legislation and HMG security requirements when providing Services under the Framework Agreement, the broad sets of controls that follow in the remainder of this document are considered the minimum that the Supplier shall have in place. Where information is deemed by the Contracting Authority and/or their client to be particularly sensitive, the Supplier may be required to enter into further consultation with the Contracting Authority and/or their client’s security personnel to agree additional minimum controls.
Browser Security. First Community Bank believes the safety and security of its customers’ accounts and personal information is of highest importance. For the highest level of security, you must access Online Banking via a personal computer or mobile device with up to date operating systems and browsers. Using the most current versions of browsers ensures better security for internet protection. Updates for browsers can be downloaded from the software provider’s websites.
Browser Security. Some internet browsers may save users names and passwords. This will automatically complete any login for you and may allow people at your computer or mobile device to use your logins without knowing your passwords. For your security, review your internet browsers “Help” section to clear cookies (cookies are small data files that stay on your computer or other mobile device by the web server when a site is visited) or contact their Customer Support to see is this option is available and how to disable this option. It is your responsibility to obtain and maintain your internet browser to ensure that your connectivity secure and is in accordance with applicable requirements, including any requirements of web server companies and authorities. You are responsible for obtaining, installing, maintaining and operating all hardware, software and Internet access services necessary for obtaining and securing our Online Banking service.
Browser Security. The Farmers Bank Internet Banking transmits data using SSL (Secure Socket Layer) technology that supports 128-bit key encryption. It is important to verify that a secure connection between your browser and the Internet Banking server has been established before transmitting any confidential account information over the Internet. This can be verified by an indicator on your web browser. Netscape Navigator has a key symbol that appears in the lower left corner of the screen. When the symbol appears "solid" transmitted data is being encrypted. When this symbol appears "broken", a secure session has not been established. Similarly, Microsoft Internet Explorer has a lock symbol that appears when data is being encrypted. When this symbol does not appear, a session is not secure.
AutoNDA by SimpleDocs

Related to Browser Security

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Insurer security Whilst we make every endeavour to place your insurances with insurers that are financially sound, we do not guarantee or otherwise warrant the solvency of any insurer we place your insurances with. If you have any concerns regarding any insurer chosen to meet your insurance requirements you should inform us as soon as possible and we will discuss them with you. A liability for the premium, whether in full or pro rata, may arise under policies where a participating insurer becomes insolvent.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

Time is Money Join Law Insider Premium to draft better contracts faster.