General Security Procedures Sample Clauses

General Security Procedures. You need a username and password, to access your Eligible Accounts and Online Financial Services through the Service. We may set standards for your username and password. We recommend that you change your password regularly, and select a unique username and password combination for use only with the Service. We may also require additional security procedures for certain transactions. These additional security procedures may require special hardware, software or third-party services. To enhance the security of your Eligible Accounts and Online Financial Services, we may also offer you additional, optional security procedures. These could include personal reference questions and answers, random number generators or one-time passwords. We may also require the use or activation of specific applications, Internet browser software features, plug-ins and add-ons, to use the Service. These could include JavaScript support and "cookies." To enable and enhance secure access to the Service, we may also access detailed information about the computers and Mobile Devices you use to access the Service. This could include telephone numbers and unique internal and network identifiers for your computers and Mobile Devices. We also use cookies and other technology for information security and other purposes, as described in our Privacy Policy, available at xxxxxxxxxx.xxx.
AutoNDA by SimpleDocs
General Security Procedures. 1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Processor, if any, comply with all of the foregoing. Processor will designate an individual to be responsible for the information security program. Such individual shall respond to Controller inquiries regarding computer security and to be responsible for notifying Controller-designated contact(s) if a breach or an incident occurs, as further described herein.
General Security Procedures. Company agrees to abide by the security procedures set forth in this Agreement ("Security Procedures"). Both parties agree that the services described and provided by Bank will be subject to the terms and conditions set forth below:
General Security Procedures. Each individual who has access to Bank’s Online Banking system, including each individual named on joint accounts, must designate an online password and an Online ID. Your password must be a minimum of eight characters, which must consist of at least one numeric characters, plus alpha characters. For example, your password may be: 123signup. You may be required to change your password periodically to enhance security. All accounts you maintain with Bank will be displayed through online with account numbers, except for the last four digits, masked (your account numbers will still appear in your online statements). This provides additional level of security by ensuring that your actual account numbers will never be displayed.
General Security Procedures. 1.1 Processor shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Processor, if any, comply with all of the foregoing.
General Security Procedures. 1.1 SunGard shall be responsible for establishing and maintaining an information security program based on the Industry Standards Organization ISO 27001:2 that contains appropriate administrative, technical and physical safeguards designed to: (i) ensure the security and confidentiality of Customer Sensitive Information; (ii) protect against any anticipated threats or hazards to the security, integrity or availability of the Customer Sensitive Information; (iii) protect against unauthorized access to, or use of, the Customer Sensitive Information that could result in substantial harm or inconvenience to Customer’s customers; (iv) ensure the proper disposal of Customer Sensitive Information, as further defined herein;
General Security Procedures. (a)(i) Introduction - The following general security procedure requirements apply to any Services provided. Certain Services require special security procedure requirements. The User Materials outline in detail the security safeguards that allow you to determine the holder of the security system for your company, authorized users, authorized transaction types and dollar limits on all transactions. For certain Services, you will be responsible for the administration, including the deletion of authorized users.
AutoNDA by SimpleDocs
General Security Procedures. Each individual who has access to Bank’s Online Banking system, including each individual named on joint accounts, must designate a Password and an Access ID. Your Password must be a minimum of 8 characters, which must consist of at least one (1) numeric characters, plus alpha characters. For example, your Password may be: 123signup. You may be required to change your Password periodically to enhance security.
General Security Procedures. You agree to the following Security Procedures which are applicable to all Cash Management Service(s) (collectively and individually, “User Information”). The Bank recommends each Authorized Person have his/her own User Information, and You agree that You will not have a single set of Authorized Persons and User Information for Your Accounts unless You executed an Addendum for Shared Services to this Cash Management Services Agreement.
General Security Procedures. 1.1 Data Importer shall be responsible for establishing and maintaining an information security program that is designed to: (i) protect the security and confidentiality of Personal Data; (ii) protect against anticipated threats or hazards to the security or integrity of the Personal Data; (iii) protect against unauthorized access to or use of the Personal Data; (iv) ensure the proper disposal of Personal Data, as further defined herein; and, (v) ensure that all employees and subcontractors of Data Importer, if any, comply with all of the foregoing. Data Importer shall designate an individual to be responsible for the information security program. Such individual shall respond to Data Exporter inquiries regarding computer security and to be responsible for notifying Data Exporter-designated contact(s) if a breach or an incident occurs, as further described herein.
Time is Money Join Law Insider Premium to draft better contracts faster.