Login IDs and Passwords Sample Clauses

Login IDs and Passwords. One of the main security features protecting the Online Banking Services is the unique combination of your Login ID and Password. During the enrollment process, you will be asked to select a unique Login ID. For security purposes, do not use your account number or social security number as your Login ID. A Password will be created upon first logging in to your Online Banking account. Encryption and access controls are used to protect your Password within our database. If you need to reset your Password, you may use our online automated Password reset feature or you may contact Bank for assistance. Because your Password is used to access your accounts, you should treat it as you would any other sensitive personal data. You should carefully select a Password that is difficult to guess. You should not use words based on your name, address or other personal information. Special characters may be used to increase security. Do NOT use dictionary words. Keep your Password safe. Memorize your Password and do NOT write it down. You should also change your password occasionally, such as every 90 days. Passwords should not be shared with anyone, even Authorized Users. The "help" link within the Online Banking Services will offer tips on choosing a secure Password that you can remember. When you enroll for the Online Banking Services you agree to change your Password immediately if you suspect that your Password has been compromised. This can be done at any time from the “User Services” menu after you log on to the Online Banking Services. NEITHER BANK NOR ITS SERVICE PROVIDERS WILL CONTACT YOU BY TELEPHONE, EMAIL OR TEXT MESSAGING REQUESTING PERSONAL INFORMATION, SUCH AS YOUR LOGIN ID, PASSWORD, CREDIT CARD NUMBER, ATM CARD NUMBER OR ATM PIN. IF YOU ARE CONTACTED BY ANYONE REQUESTING THIS TYPE OF INFORMATION, DO NOT PROVIDE ANY INFORMATION AND CONTACT OUR ONLINE BANKING DEPARTMENT IMMEDIATELY. Encryption – The Online Banking Services use the Secure Socket Layer (SSL) encryption technology for everything you do while using Online Banking. Your browser automatically activates this technology when it attempts to connect to our Online Banking Services. The Online Banking Services require a browser that supports 128-bit encryption and we will warn you if your browser does not meet this requirement. Whenever SSL is securing your communications, the browser will typically indicate this secure session by changing the appearance of a small icon of a padlock at the bottom of t...
AutoNDA by SimpleDocs
Login IDs and Passwords. Customer is solely responsible for monitoring and protecting the confidentiality of all Login IDs and Passwords issued to it and its End Users.

Related to Login IDs and Passwords

  • Usernames and Passwords 1. Staff will not share usernames and passwords with anyone, including supervisors and technical support staff.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT.

  • Password To enable you, and only you, to use the Service, you will be asked to choose a password when you register and are accepted as a customer of the Service. This password is stored in encrypted form by us. You are responsible for maintaining the confidentiality of your Financial Institution customer number and password. No one at Financial Institution has access to your Accounts passwords or user ID's. You are responsible for uses of the Service whether or not actually or expressly authorized by you. Therefore, it is important that you DO NOT SHARE YOUR ACCOUNT NUMBER OR PASSWORD WITH ANYONE FOR ANY REASON. No one at Financial Institution will know or need to know your password, and Financial Institution employees will never ask for your password. If you wish to make a transfer to an Account of another person, you will be asked to provide a separate code word or phrase (the "Shared Secret") that is known only to you and to the person to whom you are transferring the funds (the "Recipient"). We recommend that you do not use commonly used words, phrases or dates. In order to complete the transfer, the Recipient must provide the Shared Secret and certain other identifying information. YOU AGREE THAT YOU WILL NOT GIVE THE SHARED SECRET TO ANYONE EXCEPT THE RECIPIENT FOR ANY REASON. YOU FURTHER AGREE THAT YOU WILL INSTRUCT THE RECIPIENT NOT TO GIVE THE SHARED SECRET TO ANYONE ELSE FOR ANY REASON. In the Event of Unauthorized Transfer If you believe your password or Shared Secret has been lost or stolen, or that someone has transferred or may transfer money from your Account without your permission, contact us using the instructions on our site. Consumer Liability You agree to notify us AT ONCE if you believe your password has been lost or stolen. Telephoning us promptly is the best way to protect yourself from possible losses. If you never tell us, you could lose all of the money in your account (plus your maximum overdraft line of credit). However, if you tell us within 2 business days, you can lose no more than $50 if someone used your password without your permission. If you do NOT tell us within 2 business days after you learn of the loss or theft of your password, and we can prove we could have stopped someone from using your password without your permission if you had told us, you could lose as much as $500. You can see a complete statement of all your funds transfers effected or pending at any time by clicking on the History tab. If your statement shows transfers that you did not make, notify us AT ONCE. If you do not tell us within 60 days after the transfer was posted to your statement, you may not get back any money you lost after the 60 days, if we can prove that we could have stopped someone from taking the money if you had told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods.

  • Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.

  • Identification Cards Identification (“ID”) cards are issued by Us for identification purposes only. Possession of any ID card confers no right to services or benefits under this Contract. To be entitled to such services or benefits, Your Premiums must be paid in full at the time that the services are sought to be received.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Training Materials Training Materials will be provided for each student. Training Materials may be used only for either (i) the individual student’s reference during Boeing provided training and for review thereafter or (ii) Customer’s provision of training to individuals directly employed by the Customer.

  • Mobile Subscriber Information You authorize your wireless carrier to disclose information about your account, such as subscriber status, payment method and device details, if available, to support identity verification, fraud avoidance and other uses in support of transactions for the duration of your business relationship with us. This information may also be shared with other companies to support your transactions with us and for identity verification and fraud avoidance purposes.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Subscriber Information Please print your individual or entity name and address. Joint subscribers should provide their respective names. Your name and address will be recorded exactly as printed below.

Time is Money Join Law Insider Premium to draft better contracts faster.