Login security Clause Samples

Login security. The Customer must take all reasonable steps to ensure that each Login is only used by a single individual and is not shared. The Customer must ensure that the Personnel of the Customer Group or Customer: a) keep each Login secure at all times, including by not recording it in any form (electronic or otherwise) in clear text, except where recording the Login is strictly necessary, in which case it must be stored securely and in a manner such that somebody finding it cannot readily identify the details of the Login; and b) notify Kineo immediately upon becoming aware that a Login may be lost or stolen or becoming aware or suspecting that another person knows Admin Login, or has used the Admin Login, without the authority of Customer (although nothing in this paragraph limits Clause 7.2).
Login security. We will register or issue a user ID and corresponding password (together being a “Login”) for your use of the Platform. You must keep the Login secure and notify us immediately upon becoming aware that the Login may be lost or stolen, or becoming aware or suspecting that another person knows the Login, or has used the Login, without your authority. You are liable for, and we may rely upon, all instructions, requests, information and Content submitted to the Platform using of the Login, even if the information or request is submitted by a person using the Login fraudulently or without authority. Without limiting the above, we are entitled to treat all use of the Platform made using the Login as use that you have authorised and you are responsible for the payment of all amounts or fees that become payable in relation to such use.
Login security. Security is very important to Peoples Bank of Graceville. When you log in to the service for the first time, you will use your account number, Social Security Number (personal accounts) or Taxpayer Identification Number (businesses), and email address. You will then be prompted to select a new “Username” and “Password” that you are will thereafter use to gain access to your accounts. Your session time limit is limited to 60 minutes, but to help prevent unauthorized access and ensure the security of your accounts, we will end your online session if we have detected no activity for 20 minutes. This is to protect you in case you accidentally leave your computer unattended after you log on. When you return to your computer, you will be prompted to re-enter your username and password to continue. Because your password is used to access your accounts, you should treat it as you would any other sensitive personal data. You should carefully select a password that is hard to guess. Keep your password safe. Memorize your password and never tell it to anyone. You may consider changing your password occasionally, such as every 90 days. This can be done at any time, after you are logged in, from the “Profile” menu.
Login security.  If you change your mobile device and/or change your mobile telephone number, it is your responsibility to access your Internet banking system and enter the appropriate information in the Options/ Mobile Setting section.  You will use the same Internet Banking ID and password to access Mobile banking. Keep your password safe. Memorize your password and never tell it to anyone. We will never ask you to email your personal information such as your Social Security Number or account number.
Login security. Security is very important to Security State Bank. When you login to the service for the first time, you will use your account number and the last four digits of your social security number (personal accounts) or taxpayer identification number (businesses). You will then be prompted to select a new "Access ID" and "Password" that you will thereafter use to gain access to your accounts. Your session time limit is limited to 60 minutes, but to help prevent unauthorized access and ensure the security of your accounts, we will end your online session if we have detected no activity for 20 minutes. This is to protect you in case you accidentally leave your computer unattended after you log on. When you return to your computer, you will be prompted to re-enter your password and your session will continue where you left off. Because your password is used to access your accounts, you should treat it as you would any other sensitive personal data. You should carefully select a password that is hard to guess. Keep your password safe. Memorize your password and never tell it to anyone. You may consider changing your password occasionally, such as every 90 days. This can be done at any time, after you are logged in, from the "options" menu. You may use Security State Bank On-line Banking to check the balance of your accounts, transfer funds between your accounts and pay bills from your eligible accounts. Balances in your accounts may differ from your records due to deposits in progress, outstanding checks or other withdrawals, payments or charges. If you have further questions, contact us at ▇▇▇-▇▇▇-▇▇▇▇. If urgent action is required, we recommend that you contact Security State Bank directly by telephone at ▇▇▇-▇▇▇-▇▇▇▇ between 9:00 a.m. and 5:00 p.m., Monday – Friday or in person at any Security State Bank location. The Bill Payment service lets you schedule bill payments through On-line Banking and also allows you to see a history of all the payments made from your accounts. You must designate a specific checking account as your bill payment account. Accountholders that require two (2) signatures for withdrawal purposes will be unable to access the On-line Bill Payment Service.
Login security. It is important that you take precautions to protect your Digital Services password(s) and account information and keep them confidential at all times. For your protection, the Bank recommends that password(s) be changed at least every 12 months. The Bank reserves the right to require a password change at any time, and as deemed necessary by the Bank. For your protection, it is recommended that you memorize your password(s) and not write them down. Any person having access to your Online Banking access ID and password will be able to access your account and perform all transactions, including reviewing account information and making transfers to other accounts that have mutual ownership. Passwords and Login IDs are case sensitive. Passwords require 8-25 characters – alpha and numeric and special character required. For security reasons, the Bank recommends that you do not allow your Windows program to remember any password or Login information. For assistance with access to your accounts, contact the Digital Support Department at ▇▇▇-▇▇▇-▇▇▇▇.
Login security. You understand that you cannot use Telephone Banking or Online and Mobile Banking without login security information, i.e., an identification number or Password, which we refer to as PIN for Telephone Banking and Password for Online and Mobile Banking. You will select your own PIN for Telephone Banking or password for Online and Mobile Banking. You are responsible for the safekeeping of your PIN and Password. • You agree not to give or make available login security information to any unauthorized individual. All transactions affected by the use of the services contemplated hereunder that would otherwise require your actual signature, or other authorization, will be valid and effective as if actually signed by you when accomplished by use of your PIN and Password or as otherwise authorized under this Agreement and Disclosure. We are entitled to act on all transaction instructions received using your PIN and Password. Unless otherwise provided for by applicable law, you are financially responsible for all uses of the services by you and those who are authorized by you to use the services, including without limitation, providing your Password, PIN, login information, verification information, and/or account information to others. If you believe your login information has been lost or stolen, someone has attempted to use your online or mobile banking access without your consent, your account(s) or loan accounts have been accessed, or someone has transferred money without your permission, you must notify the Credit Union immediately. • You further understand that your PIN and Password are not transferable. • For your protection, we recommend that you regularly change your PIN and Password used to access the services. • You understand that if you disclose your account and/or login information to any person, you have given such person access to your account via the services, including the ability to review all of your personal and financial information and to engage in account transactions. Such transactions are deemed authorized transactions unless otherwise provided for by applicable law. Unless provided for by applicable law, you assume all risks and losses associated with such disclosure and you agree to be responsible for any transaction and activities performed from your account and for use of any of your personal, account, and/or login information by such person even if such transactions were not intended by you or exceed your intended authority. You are r...
Login security. Access to AMD Accelerator Cloud will require use of passwords, authentication keys or other security credentials (“Login Credentials”). You must store Login Credentials in a safe and secure manner, keep them strictly confidential, and not share them with any unauthorized person or third party. If you experience or suspect any issues or unauthorized use with AMD Accelerator Cloud or if your Login Credentials have been exposed to non- permitted users at any time, you must immediately notify AMD.

Related to Login security

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Supply Chain Security Supplier shall implement and maintain a written security program that consists of physical and procedural controls: to (a) prevent unauthorized access to Supplier’s facilities; (b) prevent finished goods or equipment from being tampered with, stolen or damaged prior to Supplier’s delivery in accordance with the terms of this Order; and (c) detect when malicious activity has occurred (the “Supply Chain Security Program”). Supplier’s Supply Chain Security Program shall align to the World Customs Organization’s SAFE Framework of Standards to Secure and Facilitate Global Trade (“SAFE Framework”) or other global security programs recognized by the World Customs Organization. Supplier shall flow down and verify the requirements of its Supply Chain Security Program to its sub-tier suppliers, if applicable. Supplier shall test its Supply Chain Security Program at least annually or whenever there are material changes in Supplier’s operations, risks or business practices. Upon Buyer’s written and reasonable request, Supplier shall provide Buyer with: (i) a copy of Supplier’s Supply Chain Security Program; (ii) an executive summary of test results and a report of corrective actions (including the timing for implementation) to be taken to remedy any deficiencies identified by such testing; and (iii) any audit results or findings resulting from Supplier’s periodic audit or testing of its sub-tier suppliers’ security programs.

  • Aviation Security 1. In accordance with their rights and obligations under international law, the Parties reaffirm that their obligation to each other to protect the security of civil aviation against acts of unlawful interference forms an integral part of this Agreement. Without limiting the generality of their rights and obligations under international law, the Parties shall in particular act in conformity with the provisions of the Convention on Offenses and Certain Other Acts Committed on Board Aircraft, done at Tokyo September 14, 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, done at The Hague December 16, 1970, the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, done at Montreal September 23, 1971, and the Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, done at Montreal February 24, 1988. 2. The Parties shall provide upon request all necessary assistance to each other to prevent acts of unlawful seizure of civil aircraft and other unlawful acts against the safety of such aircraft, of their passengers and crew, and of airports and air navigation facilities, and to address any other threat to the security of civil air navigation. 3. The Parties shall, in their mutual relations, act in conformity with the aviation security standards and appropriate recommended practices established by the International Civil Aviation Organization and designated as Annexes to the Convention; they shall require that operators of aircraft of their registry, operators of aircraft who have their principal place of business or permanent residence in their territory, and the operators of airports in their territory act in conformity with such aviation security provisions. 4. Each Party agrees to observe the security provisions required by the other Party for entry into, for departure from, and while within the territory of that other Party and to take adequate measures to protect aircraft and to inspect passengers, crew, and their baggage and carry-on items, as well as cargo and aircraft stores, prior to and during boarding or loading. Each Party shall also give positive consideration to any request from the other Party for special security measures to meet a particular threat. 5. When an incident or threat of an incident of unlawful seizure of aircraft or other unlawful acts against the safety of passengers, crew, aircraft, airports or air navigation facilities occurs, the Parties shall assist each other by facilitating communications and other appropriate measures intended to terminate rapidly and safely such incident or threat. 6. When a Party has reasonable grounds to believe that the other Party has departed from the aviation security provisions of this Article, the aeronautical authorities of that Party may request immediate consultations with the aeronautical authorities of the other Party. Failure to reach a satisfactory agreement within 15 days from the date of such request shall constitute grounds to withhold, revoke, limit, or impose conditions on the operating authorization and technical permissions of an airline or airlines of that Party. When required by an emergency, a Party may take interim action prior to the expiry of 15 days.

  • UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues. 7.02 The Employer shall provide the Union with a list showing the first and last names and Social Insurance Numbers of all employees from whom deductions have been made. The report will identify the name of the facility and the month from which the dues are remitted. The Employer will also identify job classification (where the bargaining unit includes classifications, employees paid less than RNs) and status (i.e. full-time, part-time) of the employees, all terminations, newly hired employees (including start date, where the existing system allows for the information without cost), and employees on Leaves of Absence. On a quarterly basis, the Home will also provide the members’ current addresses and phone numbers, shown on the Employer’s personnel records. The Employer will endeavour to provide information in electronic format if the Employer has the technology. The Union may forward any questions with respect to individual employees in writing (or e-mail) to the Administrator (or designate). The employer will respond to such requests with any information it has which is readily available, within two weeks. 7.03 The Employer shall provide each employee with a T4 Supplementary slip showing the dues deducted in the previous year for income tax purposes where such information is or becomes readily available through the employer's payroll system. 7.04 The Union shall indemnify and save the Employer harmless with respect to dues so deducted and remitted.

  • Password Security Any password we provide to you may be used only during the Term to access Seller Central (or other tools we provide) to use the Services, electronically accept Your Transactions, and review your completed Transactions. You are solely responsible for maintaining the security of your password. You may not disclose your password to any third party (other than third parties authorized by you to use your account or Seller Central in accordance with this Agreement) and are solely responsible for any use of or action taken under your password. If your password is compromised, you must immediately change your password.