Security of Mobile Device Sample Clauses

Security of Mobile Device. Mobile Text Message Banking will not be encrypted and at some point, may include personal or confidential information about you, such as your Account activity or status. You agree to protect your Mobile Device and not to let any unauthorized person have access to the information we provide to you through this Service.
AutoNDA by SimpleDocs

Related to Security of Mobile Device

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Mobile Devices Mobile devices which are issued by and belonging to the Contractor for purposes of processing Personal Data should have access control measures and remote wipe capability turned on. Procedures should be in place to report and wipe data off lost mobile devices immediately after detection of loss.

  • Security of Data a. Each of the parties shall:

  • Removal of Equipment and Materials Within 30 days after completion of the requirements of this contract, PURCHASER shall remove from the areas of operations, and other property owned or controlled by STATE, all equipment, materials, and other property PURCHASER has placed or caused to be placed thereon that is not to become the property of STATE. It is agreed that any such equipment, materials, and other property that are not removed within 30 days, shall become the property of STATE and may be used or otherwise disposed of by STATE without notice or obligation to PURCHASER or to any party to whom PURCHASER may transfer title. Nothing in this section shall be construed as relieving PURCHASER from an obligation to clean up and to burn, remove, or dispose of debris, waste materials, and such, in accordance with the provisions of this contract. PURCHASER shall indemnify STATE for expenses as a result of cleanup, removal or disposal of debris, waste materials, and such.

  • Stored equipment We accept no responsibility for any stored equipment or other property brought on to or left at the premises, and all liability for loss or damage is hereby excluded. All equipment and other property (other than stored equipment) must be removed at the end of each hiring or we will charge fees each day or part of a day at the hire fee per hiring until the same is removed. We may, in our discretion, dispose of any items referred to below by sale or otherwise on such terms and conditions as we think fit, and charge you any costs we incur in storing and selling or otherwise disposing of the same, in any of the following circumstances:

  • EQUIPMENT AND TOOLS 40.01 The Employer will make available all necessary tools and equipment it requires for the performance of work assignments at no cost to the employees. Such tools and equipment will remain the property of the Employer and the employees will be required to take reasonable care of this property and may be required to sign out certain equipment and tools.

  • Equipment and Software To use the Mobile Remote Deposit Services, you must obtain and maintain at your expense, compatible equipment and software that we may specify from time to time.

  • Removal of Materials If you decide you would like to remove your Materials from the Service, you may provide written notice to Prime Publishing by either deleting the image through the Prime Publishing interface or by contacting Prime Publishing customer service, and Prime Publishing will remove such Materials from the Service within a reasonable period of time. 5) License for Name, Trademarks and Likenesses. You hereby grant to Prime Publishing, its Affiliates and sublicensees a nonexclusive, worldwide, royalty-free license to use all trademarks, trade names, and the names and likenesses of any individuals that appear in the Materials. You grant Prime Publishing, its Affiliates and sublicensees the right to use the name that you submit in connection with the Materials. 6) Specifications and Guidelines. You agree to submit Materials to us in accordance with all guidelines for use of the Service posted on the Prime Publishing web site or of which you are otherwise notified ("Guidelines"), as these Guidelines may be changed in the future. 7)

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.