Security Procedure Limitations Sample Clauses

Security Procedure Limitations. Client acknowledges that the Security Procedures are used to verify the authenticity of, but not to detect errors in, any Order transmitted by Client or in Client’s name. From time to time Bank may at its option use additional procedures to verify or authenticate Orders. The Security Procedures do not verify the actual identity of the users of the Services and do not monitor the actions of the users to determine whether their Orders exceed the scope of their authority. The Security Procedures are in addition to, and do not limit, revoke, or affect the authority of any Authorized Individual to transmit Orders or any agreement now or hereafter existing between Client and Bank relating to Orders. Bank may continue to rely upon such authority and agreements and Bank is authorized to act upon Orders received from persons acting pursuant to such authority or agreements.
AutoNDA by SimpleDocs
Security Procedure Limitations. Client acknowledges that Except as otherwise provided herein or in any Service the Security Procedures are used to verify the authenticity Documentation, Bank will maintain the confidentiality of of, but not to detect errors in, any Order transmitted by the information Client provides to Bank in connection with Client or in Client’s name. From time to time Bank may the Services in accordance with its normal procedures for at its option use additional procedures to verify or safeguarding commercial customer information, and authenticate Orders. The Security Procedures do not Bank agrees to use such information only to provide the verify the actual identity of the users of the Services and Services to Client and as otherwise required by law or do not monitor the actions of the users to determine permitted in any agreement between Client and Bank. whether their Orders exceed the scope of their authority. Bank may disclose information (i) which is or becomes The Security Procedures are in addition to, and do not public other than as a result of disclosure by Bank in limit, revoke, or affect the authority of any Authorized violation of this Section, (ii) which was or becomes Individual to transmit Orders or any agreement now or available to Bank on a non-confidential basis from a third- hereafter existing between Client and Bank relating to party who is not known by Bank to be bound by a Orders. Bank may continue to rely upon such authority confidentiality agreement with Client with respect to such and agreements and Bank is authorized to act upon information, (iii) which is developed by Bank separate and Orders received from persons acting pursuant to such apart from any disclosure by Client, (iv) to Affiliates of authority or agreements. Bank, or to companies who provide services to Bank as described in Section 3(d), (v) as permitted under the 5. Confidentiality and Security. Account Agreement or any other agreement between Client and Bank, (vi) in connection with any litigation

Related to Security Procedure Limitations

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Provisions Order 1600.72A, Contractor and Industrial Security Program applies to all Contractors, subcontractors, consultants, or any other persons (not visitors) who have access to FAA facilities, sensitive unclassified information, and resources. See Security Guidelines (Attachment J-9) for more details. The Government will update the document periodically to reflect the current FAA security policy. The Government designates all eFAST labor categories as enumerated in Attachment J-3 as low risk for the Risk/Sensitivity Level. Program office CORs will review labor category designations and indicate changes to the contractually designated default Risk/Sensitivity Level Designations as appropriate for their specific contracts or task orders. This would require a submission of a “Contractor Position Risk/Sensitivity Level Designation Record” form (FAA Form 1600-77).

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • CONTRACTOR INTEGRITY PROVISIONS It is essential that those who seek to contract with the Commonwealth of Pennsylvania (“Commonwealth”) observe high standards of honesty and integrity. They must conduct themselves in a manner that fosters public confidence in the integrity of the Commonwealth contracting and procurement process.

  • Account Limitations Limitations are implemented to help protect PayPal, buyers and sellers when we notice restricted activities, an increased financial risk, or activity that appears to us as unusual or suspicious. Limitations also help us collect information necessary for keeping your PayPal account open. There are several reasons why your PayPal account could be limited, including: • If we suspect someone could be using your PayPal account without your knowledge, we’ll limit it for your protection and look into the fraudulent activity. • If your debit or credit card issuer alerts us that someone has used your card without your permission. Similarly, if your bank lets us know that there have been unauthorized transfers between your PayPal account and your bank account. • In order to comply with applicable law. • If we believe in our sole discretion that you have breached this agreement or violated the Acceptable Use Policy. • Seller performance indicating your PayPal account is high risk. Examples include: indications of poor selling performance because you’ve received an unusually high number of claims and chargebacks, selling an entirely new or high-cost product type, or if your typical sales volume increases rapidly. Unless a permanent limitation is placed on your account, you will need to resolve any issues with your account before a limitation can be removed. Normally, this is done after you provide us with the information we request. However, if we reasonably believe a risk still exists after you have provided us that information, we may take action to protect PayPal, our users, a third party, or you from reversals, fees, fines, penalties, legal and/or regulatory risks and any other liability.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Billing Limitations a. DSHS shall pay the Contractor only for authorized services provided in accordance with this Contract.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

Time is Money Join Law Insider Premium to draft better contracts faster.