Security Notifications Sample Clauses

Security Notifications. 4.1. If and as soon as Customer and/or Authorized Person know, believe or suspect (i) Any loss or theft of his Security and Authentication credentials or instruments and/or any personalized access and security elements and any personalized/authentication means are at risk of becoming known or have become known to an unauthorized person (including any loss/compromise of his device, email or other details) and/or that his access or means of access to Internet banking/User Interface or Security and Authentication Credentials may be subject to misuse or similar circumstances;
Security Notifications. 4.1. If and as soon as Customer and/or Authorized Person know, believe or suspect (i) Any loss or theft of his Security and Authentication credentials or instruments and/or any personalized access and security elements and any personalized/authentication means are at risk of becoming known or have become known to an unauthorized person (including any loss/compromise of his device, email or other details) and/or that his access or means of access to Internet banking/User Interface or Security and Authentication Credentials may be subject to misuse or similar circumstances; (ii) Any malfunction or error in the operation of his Account(s); (iii) Unauthorized transactions on Account(s). 4.1.1. Authorized Person and/or Customer shall immediately undertake all necessary actions as to changing and/or blocking their Security and Authentication Credentials to Internet banking/User Interface (instruments, devices, means etc.) according to functionality. In case the preceding action is not possible, Customer/Authorized Person shall immediately notify and instruct The Company or the Partner (as the case may be) in written form to block the Security and Authentication Credentials and any accesses (providing all necessary information and details, including Account number(s), Customerʼs name and details) in accordance with The Companyʼs procedures. 4.1.2. Customer and/or Authorized Person shall notify The Company or the Partner (as the case may be) of the circumstances of actual or suspected theft/loss/unauthorized access via customer communication functions via customer communication channels (such as User Interface, mail, email address provided, or dedicated contact form/means as The Company may from time to time make available for this purpose, using relevant channel depending on the circumstance/security matter), but in any case immediately. If Customer notifies in any other way, including by telephone during working hours, then following such communication, Customer shall submit the respective written notification under all circumstances to The Company or the Partner without delay thereafter, from Customerʼs and/or Authorized Personʼs details and email address registered with The Company or the Partner (depending on the circumstance) and written notification shall bear effect accordingly. 4.1.3. In case Customer/Authorized Person are unable to undertake the above actions and/or are unable to notify The Company or the Partner (as the case may be) via above- mentioned...
Security Notifications. Weathergram’s data centers and third-party service providers are SSAE 16 compliant, and the security of Customer Content is a high priority. Weathergram will report any breaches of security that affects Subscriber’s instance of the Services. If it is discovered that such breach is the result of gross negligence or malfeasance on the part of Weathergram, its employees, contractors or agents, Weathergram will provide Subscriber with a recovery and communications plan for End Users of the Service. Weathergram’s liability for such a breach shall be limited according to Section 13 of this Agreement.
Security Notifications. Notification of ▇▇▇▇ Voting and Voter Management Systems login or access errors, file access errors, and physical violations of security as they occur, and a summary record of these events after processing. This information shall be stored on a non- volatile medium such that this information will survive the “crash” of the ▇▇▇▇ Voting and Voter Management Systems.