Five Failed Log-Ons Clause Samples

Five Failed Log-Ons. Access is denied after five failed log-on attempts. The Company Administrator is responsible for resetting the password for all other company users. If a Company Administrator needs his/her password reset, the Company Administrator must call the Bank. The Bank can be contacted at ▇-▇▇▇-▇▇▇-▇▇▇▇, from 8 am to 10 pm Eastern time, Monday through Friday. Encrypted URL ensures that any account information that appears in the URL is not readable if intercepted. The URL addresses are encrypted on all transactions. TLS Protocol / Public key Cryptography protects by: To initiate a transaction, the company uses a browser to send a message via TLS (Transport Layer Security) to the bank’s web server, hosted by the bank’s chosen vendor. The bank’s web server responds by sending a certificate that contains the bank’s public key. The company’s browser authenticates the certificate, and then generates a session key, which is used to encrypt data traveling between the customer’s computer and the bank’s server. The session key is encrypted using the bank’s public key and is sent back to the web server. Exchanging messages using the public/private key pair ensures the communication is happening with the bank’s web server and not a third party trying to intercept the transaction request. The Company is responsible for maintaining its own policies related to physical and electronic security. The Bank retains the right to inquire about or assess the adequacy of the Company's practices related to these items as they may directly impact the safety and soundness of the Financial Institution's own systems.  Limited employee access to sensitive data including ACH and Wire related information. Such data may include: o Authorization forms o Checks used as part of authorizations including voided checks o Emails or other electronic correspondence with entry information o Electronic NACHA formatted files sent to the bank for processing o Paper files or entries sent to the Bank for processing o Other reports containing entry information from accounting software or other programs  Proper storage of sensitive data utilizing locked storage space Electronic security of data may include, but is not limited to the following:  Unique User IDs for each employee  Password controls: o “Strong” password requirements (length, character requirements, etc.) o Secure storage of passwords, including ensuring they are not posted at workstation o Required changes of passwords at regular intervals o Loc...