Login ID And Password Sample Clauses

Login ID And Password. User shall forward an original of this completed, signed and dated Agreement to the attention of Xxxxxxxx Xxxxxx, Office Manager for the Trustee, at the address set forth below. Upon receipt, the Trustee will review the Agreement and, if appropriate, promptly execute the Agreement and send User a copy of the signature page containing User’s assigned Login ID and Password (see last page). REQUIRED INFORMATION: COMPANY NAME: USER NAME: TITLE: ADDRESS: CITY/STATE/ZIP: PHONE NUMBER: FAX NUMBER: E-MAIL ADDRESS: DATE: USER SIGNATURE: Mail to: Office Chapter 13 Trustee ATTN: Xxxxxxxx Xxxxxx 000 Xxxxx 000 Xxxx, Xxxxx 000 Xxxx Xxxx Xxxx, Xxxx 00000 Authorized and dated by: Chapter 13 Trustee Internet Website: xxx.00xxxxxxx.xxx
AutoNDA by SimpleDocs
Login ID And Password. User shall forward an original of this completed, signed and dated Agreement to the attention of Xxx Xxxxxxx, Systems Manager for the Trustee, at the address set forth below. Upon receipt, the Trustee will review the Agreement and, if appropriate, promptly execute the Agreement and send User a copy of the signature page containing User's assigned Login ID and Password (see last page).
Login ID And Password. After successful registration with Worldline, the Merchant shall receive an email with a link to open a Merchant Account on Worldline Platform. The mobile number of Merchant will be Login id which was provided by the Merchant during registration and password will be set by the Merchant . The Merchant shall receive an intimation regarding approval of the Merchant Application Form. The Merchant are responsible for maintaining the confidentiality of the password and the Merchant Account, and are fully responsible for all activities that occur under the Merchant Account. The Merchant agree to (a) immediately notify Worldline of any unauthorized use of the Merchant password or the Merchant Account or any other breach of security, and (b) ensure that the Merchant exit from the Merchant Account at the end of each session. Worldline cannot and will not be liable for any loss, damage or other liability arising from the Merchant failure to comply with this Clause or from any unauthorized access to or use of the Merchant Account.

Related to Login ID And Password

  • Password To enable you, and only you, to use the Service, you will be asked to choose a password when you register and are accepted as a customer of the Service. This password is stored in encrypted form by us. You are responsible for maintaining the confidentiality of your Financial Institution customer number and password. No one at Sunmark Federal Credit Union has access to your Accounts passwords or user ID's. You are responsible for uses of the Service whether or not actually or expressly authorized by you. Therefore, it is important that you DO NOT SHARE YOUR ACCOUNT NUMBER OR PASSWORD WITH ANYONE FOR ANY REASON. No one at Sunmark Federal Credit Union will know or need to know your password, and Sunmark Federal Credit Union employees will never ask for your password. If you wish to make a transfer to an Account of another person, you will be asked to provide a separate code word or phrase (the "Shared Secret") that is known only to you and to the person to whom you are transferring the funds (the "Recipient"). We recommend that you do not use commonly used words, phrases or dates. In order to complete the transfer, the Recipient must provide the Shared Secret and certain other identifying information. YOU AGREE THAT YOU WILL NOT GIVE THE SHARED SECRET TO ANYONE EXCEPT THE RECIPIENT FOR ANY REASON. YOU FURTHER AGREE THAT YOU WILL INSTRUCT THE RECIPIENT NOT TO GIVE THE SHARED SECRET TO ANYONE ELSE FOR ANY REASON. In the Event of Unauthorized Transfer If you believe your password or Shared Secret has been lost or stolen, or that someone has transferred or may transfer money from your Account without your permission, contact us using the instructions on our site. Consumer Liability You agree to notify us AT ONCE if you believe your password has been lost or stolen. Telephoning us promptly is the best way to protect yourself from possible losses. If you never tell us, you could lose all of the money in your account (plus your maximum overdraft line of credit). However, if you tell us within 2 business days, you can lose no more than $50 if someone used your password without your permission. If you do NOT tell us within 2 business days after you learn of the loss or theft of your password, and we can prove we could have stopped someone from using your password without your permission if you had told us, you could lose as much as $500. You can see a complete statement of all your funds transfers effected or pending at any time by clicking on the History tab. If your statement shows transfers that you did not make, notify us AT ONCE. If you do not tell us within 60 days after the transfer was posted to your statement, you may not get back any money you lost after the 60 days, if we can prove that we could have stopped someone from taking the money if you had told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods. Business Days The Service will process requests for transfers on business days. Our business days are Monday through Friday. Holidays and Bank Holidays are not included. Transfer Types and Limitations Types of Transfers You may use your Sunmark Federal Credit Union password to access Funds Transfer within the Service to transfer funds between any two of your Accounts about which you have provided the necessary information to Sunmark Federal Credit Union. Transfers can be between Accounts within the same financial institution or at an unrelated financial institution (although transfers between Accounts at the same institution may be affected more quickly by contacting the institution directly). You may use your Sunmark Federal Credit Union password to access Popmoney within the Service to transfer funds from one of your Accounts to an account of a Recipient. You may send money to a Recipient using a mobile telephone number, an email address, or a routing and account number. Some of these services may not be available at all times. We may from time to time make available additional or new features to the Service, including but not limited to, a next day service and a higher limit service. You will be approved or declined for any such additional service at our sole discretion and additional terms and conditions may apply. Please ensure that you have sufficient funds to affect any funds transfers from your Accounts. We may at any time decline to effect any funds transfer that we believe may violate applicable law.

  • User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT.

  • Client identification 9.1. The Company has the right to require the Client to confirm his/her registration information specified when opening a trading account. To do so, the Company may ask the Client at its own discretion and at any time to provide a notarized electronic copy of his/her identification document, bank statement or public utilities xxxx as a proof of residence. In particular cases, the Company may ask the Client to provide a photo of him/her holding his/her ID near his/her face. The detailed client identification requirements are set out in the “AML policies” section on the Company’s official site.

Time is Money Join Law Insider Premium to draft better contracts faster.