Security Procedure Sample Clauses

Security Procedure. The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.
AutoNDA by SimpleDocs
Security Procedure. The Fund acknowledges that the Security Procedure it has designated on the Fund Selection Form was selected by the Fund from security procedures offered by the Transfer Agent. The Fund shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated to the Transfer Agent in writing. The Fund must notify the Transfer Agent immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Fund's authorized personnel. The Transfer Agent shall verify the authenticity of all Fund instructions according to the Security Procedure.
Security Procedure. The Company hereby elects to use the procedure selected below as its security procedure (the Security Procedure). The Security Procedure will be used by the Custodian to verify the authenticity of a payment order or a communication amending or canceling a payment order. The Custodian will act on instructions received provided the instruction is authenticated by the Security Procedure. The Company agrees and acknowledges in connection with (i) the size, type and frequency of payment orders normally issued or expected to be issued by the Company to the Custodian, (ii) all of the security procedures offered to the Company by the Custodian, and (iii) the usual security procedures used by customers and receiving banks similarly situated, that authentication through the Security Procedure shall be deemed commercially reasonable for the authentication of all payment orders submitted to the Custodian. The Company hereby elects (PLEASE CHOOSE ONE) the following Security Procedure as described below: [ ] BIDS AND BIDS WORLDVIEW PAYMENT PRODUCTS. BIDS and BIDS Worldview Payment Products, are on-line payment order authorization facilities with built-in authentication procedures. The Custodian and the Company shall each be responsible for maintaining the confidentiality of passwords or other codes to be used by them in connection with BIDS. The Custodian will act on instructions received through BIDS without duty of further confirmation unless the Company notifies the Custodian that its password is not secure. [X] SWIFT. Primary Method the Custodian and the Company shall comply with SWIFT's authentication procedures. The Custodian will act on instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. [ ] TESTED TELEX. The Custodian will accept payment orders sent by tested telex, provided the test key matches the algorithmic key the Custodian and Company have agreed to use.
Security Procedure. The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client's authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.
Security Procedure. The Trust must notify ALPS immediately of any change in the Trust’s authorized personnel with respect to the Security Procedure. ALPS shall verify the authenticity of all Trust instructions according to the Security Procedure. For purposes of this Section 13 only, instructions received from representatives of a Fund’s investment adviser will be considered to be instructions from the Trust.
Security Procedure. The Fund must notify ALPS immediately of any change in the Fund’s authorized personnel with respect to the Security Procedure. ALPS shall verify the authenticity of all Fund instructions according to the Security Procedure. ALPS is authorized to make exceptions to the Security Procedure if instructed by the Fund. For purposes of this Section 13 only, instructions received from representatives of the Fund’s investment adviser will be considered to be instructions from the Fund.
Security Procedure. The Fund hereby elects to use the procedure selected below as its security procedure (the Security Procedure). The Security Procedure will be used by the Custodian to verify the authenticity of a payment order or a communication amending or canceling a payment order. The Custodian will act on instructions received provided the instruction is authenticated by the Security Procedure. The Fund agrees and acknowledges in connection with (i) the size, type and frequency of payment orders normally issued or expected to be issued by the Fund to the Custodian, (ii) all of the security procedures offered to the Fund by the Custodian, and (iii) the usual security procedures used by customers and receiving banks similarly situated, that authentication through the Security Procedure shall be deemed commercially reasonable for the authentication of all payment orders submitted to the Custodian. The Fund hereby elects (please choose one) the following Security Procedure as described below:
AutoNDA by SimpleDocs
Security Procedure. The Fund acknowledges that the Security Procedure it has designated on the Fund Selection Form, attached hereto as Schedule C, was selected by the Fund. The Fund must notify the Transfer Agent immediately of any change in the Fund’s authorized personnel. The Transfer Agent shall verify the authenticity of all Fund instructions according to the Security Procedure. The Transfer Agent is authorized to make exceptions to the Security Procedures if instructed by the Fund. For purposes of this section only, instructions received from representatives of the Fund’s Investment Adviser, will be considered to be instructions from the Fund.
Security Procedure. The Trust on behalf of the Funds acknowledges that the Security Procedure it has designated on the Funds Transfer Addendum was selected by the Trust from security procedures offered. The Trust shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated to the Transfer Agent in writing. The Trust must notify the Transfer Agent immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Trust’s authorized personnel. The Transfer Agent shall verify the authenticity of all instructions received from the Trust according to the Security Procedure.
Security Procedure. The Administrator on behalf of the Trust and the Portfolios acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Administrator from security procedures offered by the Transfer Agent. The Administrator shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated to the Transfer Agent in writing. The Administrator must notify the Transfer Agent immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Administrator’s authorized personnel. The Transfer Agent shall verify the authenticity of all Administrator instructions according to the Security Procedure.
Time is Money Join Law Insider Premium to draft better contracts faster.