Protect Your Access Credentials Sample Clauses

Protect Your Access Credentials. Your Access Credentials are used to gain access to Digital Banking and must be kept confidential at all times. For your protection, we strongly recommend you change your Access Credentials regularly (at least every 60 days). It is recommended that you memorize your Access Credentials and do not write them down. You are responsible for keeping your Access Credentials, account numbers and other account data confidential. (For Business Customers, references to “your Access Credentials” include Access Credentials that are issued to or by your Authorized Users. Access Credentials issued to your Authorized Users belong to you, and their use and confidentiality are your responsibility.) If you have a consumer account that has been linked to a Business Online Banking profile, we may but have no duty to require you to enter Access Credentials for Business Online Banking plus separate Access Credentials (e.g., for Consumer Online Banking) before granting access to your consumer account in the Business Online Banking Channel. Note: some software may store Access Credentials to facilitate the future access to websites or mobile applications. For security reasons, you agree to disable those features. You may, however, store data required by biometric identification systems (e.g., fingerprint or facial recognition) that may be supported by our Digital Banking service. You warrant that you have not and will not (1) use any software, computer or Mobile Device whose security features have been modified or disabled (including using any “jail broken” mobile device), or (2) use any disposable mobile device (e.g., “burner phone”). Such use can cause security and other problems, and you agree to indemnify and hold us harmless from any damage or loss suffered by us, you or any third person that results from such use. If you use a third-party service to access Digital Banking on your behalf (e.g., a third-party aggregation service for downloading account data), and for which you share your Access Credentials, that third-party service shall be your agent (not ours). You and your agent shall be solely responsible for, and you shall indemnify and hold us harmless from, all use, misuse, loss or disclosure of your Access Credentials or personal data, and any transactions by that service, its employees or subagents or unauthorized persons.
AutoNDA by SimpleDocs
Protect Your Access Credentials. Your Access Credentials are used to gain access to Digital Banking and must be kept confidential at all times. For your protection, we strongly recommend you change your Access Credentials regularly (at least every 60 days). It is recommended that you memorize your Access Credentials and do not write them down. You are responsible for keeping your Access Credentials, account numbers and other account data confidential. (

Related to Protect Your Access Credentials

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Prevention Care Services and Early Detection Services See Prevention and Early Detection Services section for details. 0% Not Covered Private Duty Nursing Services* Must be performed by a certified home health care agency. 0% - After deductible Not Covered

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • Information About You and Your Visits to the Website All information we collect on this Website is subject to our Privacy Policy. By using the Website, you consent to all actions taken by us with respect to your information in compliance with the Privacy Policy.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • EU Access SAP will use only European Subprocessors to provide support requiring access to Personal Data in the Cloud Service and SAP shall not export Personal Data outside of the EEA or Switzerland unless expressly authorized by Customer in writing (e-mail permitted) on a case by case basis; or as excluded under Section 9.4.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

Time is Money Join Law Insider Premium to draft better contracts faster.