Security of Card and Access Codes Sample Clauses

Security of Card and Access Codes. The access codes issued to you are for security purposes and any codes issued to you are confidential and should not be disclosed to anyone else or recorded on or with the card. You agree to safeguard the codes and agree not to disclose or otherwise make available your cards or codes to anyone not authorized to sign on your accounts. If you authorize someone to use your access codes, that authority shall remain in place until you specifically revoke that authority by notifying the Credit Union.
AutoNDA by SimpleDocs
Security of Card and Access Codes. You may use one or more access codes with your electronic funds transfers. The access codes are issued to you for your security purposes. Any codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the Card. You agree to safeguard the codes and agree not to disclose or otherwise make available your cards or codes to anyone not authorized to sign on your accounts. If you permit someone else to use an EFT service, your Card or your access code, you are responsible for any transactions they authorize or conduct on any of your accounts. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these codes and the credit union suffers a loss, we may terminate your EFT services immediately.
Security of Card and Access Codes. The access codes issued to you are for security purposes and any codes issued to you are confidential and should not be disclosed to anyone else or recorded on or with the card. You agree to safeguard the codes and agree not to disclose or otherwise make available your cards or codes to anyone not authorized to sign on your accounts. If you authorize someone to use your access codes, that authority shall remain in place until you specifically revoke that authority by notifying us. We maintain the right to monitor ATM and Debit Card transaction activity as a method to deter fraudulent transactions. If any transaction appears to be unusual activity, we may attempt to contact you to confirm the authenticity of the activity. However, if we are unable to contact you, we may, at our sole discretion, block your Card in an effort to prevent potentially fraudulent transactions. In the event that you confirm the transaction activity as authentic, we may, at our discretion, unblock your Card. We reserve the right to terminate all rights to use your Card if we have reason to believe that there has been an unauthorized use of your Card or PIN. It is your responsibility to update us of any change in contact information, name, address, and phone number(s) in a timely manner. Our right to monitor your Card transaction activity does not replace your responsibility to review your account activity or change your liability regarding reporting unauthorized activity to us. It is your responsibility to update us of any change in contact information, including address and phone number(s), in a timely manner.

Related to Security of Card and Access Codes

  • Security and Access The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.

  • Security of Access Code You may use one (1) or more access codes with your electronic fund transfers. The access codes issued to you are for your security purposes. Any access codes issued to you are confidential and should not be disclosed to third parties or recorded on or with the card. You are responsible for safekeeping your access codes. You agree not to disclose or otherwise make your access codes available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access codes, that authority shall continue until you specifically revoke such authority by notifying the Credit Union. You understand that any joint owner you authorize to use an access code may withdraw or transfer funds from any of your accounts. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your EFT services immediately.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • RETENTION AND ACCESS REQUIREMENTS FOR RECORDS The County shall retain all records pertinent to this agreement for a period of no less than 3 years from the expiration or termination date. As used in this provision, records includes books, documents, accounting procedures and practice, and other data, regardless of the type or format. The County shall provide access and the right to examine all records related to this agreement to the U.S. Forest Service Inspector General, or Comptroller General or their authorized representative. The rights of access in this section must not be limited to the required retention period but must last as long as the records are kept. If any litigation, claim, negotiation, audit, or other action involving the records has been started before the end of the 3-year period, the records must be kept until all issues are resolved, or until the end of the regular 3-year period, whichever is later. Records for nonexpendable property acquired in whole or in part, with Federal funds must be retained for 3 years after its final disposition.

  • Inclusion and accessibility The institution will provide support to incoming mobile participants with fewer opportunities, according to the requirements of the Erasmus Charter for Higher Education. Information and assistance can be provided by the following contact points and information sources: Country Available infrastructure adjusted for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- xxxx://xxx.xxxxxxxxx.xxxx.xx/?la ng=en Country Available support services for people with Description of infrastructure Contact e-mail and phone Website for information FROM TO CZ PL --- --- --- PL CZ --- --- ---

  • Control and Access to Information The Financial Mechanism Committee, the EFTA Board of Auditors and their representatives have the right to carry out any technical or financial mission or review they consider necessary to follow the planning, implementation and monitoring of programmes and projects as well as the use of funds. The Beneficiary State shall provide all necessary assistance, information and documentation.

Time is Money Join Law Insider Premium to draft better contracts faster.