Secure tokens Sample Clauses

Secure tokens. Remote access to applications containing Customer Confidential Information shall require the use of security codes that are made available to users via a key fob or other token device issued by Computershare to each user.
AutoNDA by SimpleDocs
Secure tokens. Secure tokens provide our clients with an additional layer of Online Banking security. We may at any time require you to use Secure Token(s) as a condition to access our Online Banking service. We reserve the right to suspend or limit your access to our Online Banking service until such Secure Tokens are being used. You and your administrator(s) have the responsibility to ensure all appropriate users obtain a Secure Token. You agree to notify the Bank immediately of each loss or theft of a Secure Token, any unauthorized use of the Token, or any other breach of security. The Bank reserves the right to prevent your access to Online Banking should the Bank of reason to believe the confidentiality of your Token has been compromised. Spring Bank reserves the right to charge a fee for the replacement of a lost or stolen Token. We may dishonor or disable any Secure Token at any time and will inform you if we decide to do so. We may also issue additional or replacement Tokens from time to time and the Company, its Administrators and users shall follow the Bank’s instructions regarding the distribution, installation and use thereof.
Secure tokens. Customer acknowledges that the use of Secure Tokens are required to conduct the requested Online Banking services. Secure Tokens add an additional layer of security to the login process for each user. A separate Secure Token Request Form must be completed. Limits and Transactions. The Bank offers additional security procedures under Online Banking whereby the Customer and the Bank may establish dollar limits for transactions. The Bank and Customer agree that the aforementioned Security Procedures for the Online Banking Service are commercially reasonable, and the parties further agree that transactions conducted shall be deemed to be authentic payment orders binding on the Customer. Customer is responsible for all transactions made through Online Banking, regardless of whether such transaction was authorized. FEES 8 | DO NOT COPY OR DISTRIBUTE WITHOUT THE EXPRESS WRITTEN CONSENT OF SKOWHEGAN SAVINGS. The Customer authorizes the Bank to debit the following fees from the Customer’s approved offset account. • ACH Setup Fee (One-Time) $ 75.00 • ACH Monthly Access Fee $ 5.00 • Returned/Rejected Item Fee $ 30.00 Any other service fees will be charged according to Skowhegan Savings’ Service Charges and Common Fees brochure. LIMITS, DELIVERY AND PROCESSING SPECIFICATIONS Files will NOT be transmitted if established maximum dollar amounts stated below are exceeded except as may otherwise be prescribed in this Agreement. DAILY LIMITS Approved Offset Account(s) Enter the offset account(s). Maximum Daily Limit $Enter the maximum daily limit. Approved File (Transaction Type) Prearranged Payment & Deposit Entry – Direct Deposit Credit Only Delivery Method. This Agreement permits the Bank to accept ACH orders via Skowhegan Savings’ Online Banking. In the event that Online Banking is unavailable, the approved backup method of ACH requests includes a delivery of disk or file to a local branch with fees equivalent to those associated with Online Banking transmission. Standard ACH fees apply as outlined in Skowhegan Savings’ Service Charges and Common Fees brochure if the backup method of transmission is selected when Online Banking is functional. Returns and NOC will be delivered to the Customer via phone, electronic file, secure online message, fax or mail. Confirmation of Receipt. After the Bank accepts a file via internet transmission, the ACH batch status will change from “Initiated” to “Processed” on the batch viewing page of the Customer’s Online Banking.

Related to Secure tokens

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • TOOL STORAGE 1. A company shall provide on all construction jobs in towns and cities, and elsewhere where reasonably necessary and practicable (or if requested buy the employee), a suitable and secure waterproof lock-up solely for the purpose of storing employees’ tools, and on multi-storey and major projects the company shall provide, where possible, a suitable lock-up for employees’ tools within a reasonable distance of the work area of large groups of employees.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Equipment Procurement If responsibility for construction of the Connecting Transmission Owner’s Attachment Facilities or System Upgrade Facilities or System Deliverability Upgrades is to be borne by the Connecting Transmission Owner, then the Connecting Transmission Owner shall commence design of the Connecting Transmission Owner’s Attachment Facilities or System Upgrade Facilities or System Deliverability Upgrades and procure necessary equipment as soon as practicable after all of the following conditions are satisfied, unless the Developer and Connecting Transmission Owner otherwise agree in writing:

  • Cameras j) Portable music player, headphones.

  • Security Measures Lessee hereby acknowledges that the rental payable to Lessor hereunder does not include the cost of guard service or other security measures, and that Lessor shall have no obligation whatsoever to provide same. Lessee assumes all responsibility for the protection of the Premises, Lessee, its agents and invitees and their property from the acts of third parties.

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.

  • Vlastnictví Zdravotnické zařízení si ponechá a bude uchovávat Zdravotní záznamy. Zdravotnické zařízení a Zkoušející převedou na Zadavatele veškerá svá práva, nároky a tituly, včetně práv duševního vlastnictví k Důvěrným informacím (ve smyslu níže uvedeném) a k jakýmkoli jiným Studijním datům a údajům.

  • Other Methods of Procurement of Goods and Works The following table specifies the methods of procurement, other than International Competitive Bidding, which may be used for goods and works. The Procurement Plan shall specify the circumstances under which such methods may be used: Procurement Method

Time is Money Join Law Insider Premium to draft better contracts faster.