Security of Data in Transition and Storage Sample Clauses

Security of Data in Transition and Storage. You expressly acknowledge that any wireless access to your accounts may not be secure and, as such, you assume the risk associated with unauthorized access to Mobile Banking and any information contained therein, resulting from such wireless connectivity. You assume all risk that any information you download or otherwise stored on your Wireless Access Device may be accessed by unauthorized third parties. Without limiting the foregoing, you acknowledge that your Wireless Access Device may become subject to unauthorized tracking, "hacking" or other manipulation by spyware, viruses or other malicious code ("malware"). We are not responsible for advising you of the existence or potential effect of any malware. Your use of your hardware and software is at your own risk. We are not responsible for the security and confidentiality of information when you: (i) use wireless connections to download your account information, in which case you acknowledge such connection may permit other persons to access the information being downloaded, or (ii) allow other persons access to your Wireless Access Device. You agree that any account information that you download is done at your own risk, and you are solely responsible for Treasury Management Services FM 299 ONLINE BANKING ACCESS AGREEMENT & ELECTRONIC FUND TRANSFER ACT DISCLOSURE any damage that might occur to the electronic device to which you download any information, or any loss or corruption of data that might occur as a result of the downloading or its storage on an electronic device. YOU AGREE TO NOTIFY THE BANK IN THE EVENT YOUR REGISTERED DEVICE BECOMES LOST, STOLEN OR IS NO LONGER IN USE BY YOU.
AutoNDA by SimpleDocs
Security of Data in Transition and Storage. You expressly acknowledge that any wireless access to your Accounts may not be secure and, as such, you assume the risk associated with unauthorized access to the RDC and any information contained therein resulting from such wireless connectivity. You assume all risk that any information you download or otherwise store on your wireless access device may be accessed by unauthorized third parties. Without limiting the foregoing, you acknowledge that your wireless access device may become subject to unauthorized tracking, “hacking” or other manipulation by spyware, viruses or other malicious code (“malware”). We are not responsible for advising you of the existence or potential effect of any malware. Your use of your hardware and software is at your own risk. We are not responsible for the security and confidentiality of information when you:
Time is Money Join Law Insider Premium to draft better contracts faster.