Security Procedures and Instructions Sample Clauses

Security Procedures and Instructions. If your Account is an account used primarily for business or commercial purposes, the following provisions are applicable: You agree that your use of Account Number or Online User ID, together with your Online PIN, constitutes our Security Procedures. You confirm that you have assessed the Security Procedures for Business Online and Mobile Banking and have determined that these features, in combination with your own security measures, are adequate for your Account(s). You acknowledge that the primary purpose of the Security Procedures for Business Online and Mobile Banking is to verify the authenticity of instructions we receive through or in connection with the Service, and whether such Instructions are submitted by your authorized representatives or otherwise on your behalf. Unless we permit you to establish a different security procedure, you agree that the Security Procedures for Business Online and Mobile Banking are commercially reasonable verification of instructions, payment orders and other electronic funds transfers. If we permit you to establish a different security procedure, you agree that procedure is a commercially reasonable method of verifying instructions, payment orders and other electronic funds transfers. You agree that, if we accept an instruction, payment order or other electronic funds transfer in good faith and in compliance with our Security Procedures for Business Online and Mobile Banking, the instruction, payment order or other electronic funds transfer is effective as your order or transfer, as the case may be, whether or not authorized by you. The Security Procedures do not detect and are not intended to detect errors in the content of any instructions, payment orders, or other electronic funds transfers and you acknowledge that no procedure for the detection of errors in the content of instructions, payment orders, or other electronic funds transfers has been agreed upon by you or us. You acknowledge that you are solely responsible for the content, accuracy, and completeness of all instructions, payment orders, or other electronic funds transfers. Joint Accounts We do not have joint agreements for our Service. If you are an individual or sole proprietor, you are the only member under this Agreement. However, any of the Accounts to which you have access through our Service may be jointly owned with, or joint obligations with, others. When your Service is linked to one or more joint Accounts, we may act on the verbal, written ...
AutoNDA by SimpleDocs
Security Procedures and Instructions 

Related to Security Procedures and Instructions

  • Background and Instructions History of Agreement- This agreement has been drafted by the Texas Student Privacy Alliance (TXSPA). The Alliance is a collaborative group of Texas school districts that share common concerns around student and data privacy. The Texas K-12 CTO Council is the organization that sponsors the TXSPAand the TXSPA is the Texas affiliate of the national Student Data Privacy Consortium (SDPC). The SDPC works with other state alliances by helping establish common data privacy agreements unique to the jurisdiction of each state. This Texas agreement was drafted specifically for K-12 education institutions and included broad stakeholder input from Texas school districts, statewide associations such as TASB, TASA, and TASBO, and the Texas Education Agency. The purpose of this agreement is to set standards of both practice and expectations around data privacy such that all parties involved have a common understanding of expectations. This agreement also provides a mechanism (Exhibit E- General Offer of Terms) that would allow an Operator to extend the ability of other Texas school districts to be covered under the terms of the agreement should an Operator sign Exhibit E. This mechanism is intended to create efficiencies for both Operators and LEAs and generally enhance privacy practices and expectations for K-12 institutions and for companies providing services to K-12 institutions.

  • Security Procedures The Fund shall comply with data access operating standards and procedures and with user identification or other password control requirements and other security procedures as may be issued from time to time by State Street for use of the System on a remote basis and to access the Data Access Services. The Fund shall have access only to the Fund Data and authorized transactions agreed upon from time to time by State Street and, upon notice from State Street, the Fund shall discontinue remote use of the System and access to Data Access Services for any security reasons cited by State Street; provided, that, in such event, State Street shall, for a period not less than 180 days (or such other shorter period specified by the Fund) after such discontinuance, assume responsibility to provide accounting services under the terms of the Custodian Agreement.

  • Billing Instructions Enter name and mailing address of nominating Agency Finance Office for billing purposes.

  • Curriculum and Instruction 7.1 The Board and the Association recognize the importance of adequate teaching reference materials and adequate and appropriate instructional materials and equipment in maintaining a high level of professional performance in the educational process.

  • Security Procedure The Client acknowledges that the Security Procedure it has designated on the Selection Form was selected by the Client from Security Procedures offered by State Street. The Client agrees that the Security Procedures are reasonable and adequate for its wire transfer transactions and agrees to be bound by any payment orders, amendments and cancellations, whether or not authorized, issued in its name and accepted by State Street after being confirmed by any of the selected Security Procedures. The Client also agrees to be bound by any other valid and authorized payment order accepted by State Street. The Client shall restrict access to confidential information relating to the Security Procedure to authorized persons as communicated in writing to State Street. The Client must notify State Street immediately if it has reason to believe unauthorized persons may have obtained access to such information or of any change in the Client’s authorized personnel. State Street shall verify the authenticity of all instructions according to the Security Procedure.

  • Form instructions 1. This form does not mandate the use of a specific font size or style but the font must be legible.

  • INVOICING INSTRUCTIONS The A-E will provide an invoice on the A-E’s letterhead. Each invoice will have a unique number and will include the following information:

  • Instructions from Customer Processing on Legal Requirement. 28(3) (b) 3.3 Personnel. 28(3) (c) and 32 2 and Appendix 2 Security of Processing and Appendix 2, Technical and Organizational Measures. 28(3) (e) 3.4 Cooperation. 28(3) (f) and 32-36 2 and Appendix 2, 3.5, 3.6 Security of Processing and Appendix 2, Technical and Organizational Measures. Personal Data Breach Notification. Data Protection Impact Assessment. 28(3) (g) 4 Data export and Deletion 28(3) (h) 5 CERTIFICATIONS AND AUDITS

  • Customer’s Instructions Customer instructs Google to process Customer Personal Data only in accordance with applicable law: (a) to provide the Services and TSS; (b) as further specified via Customer’s and End Users’ use of the Services (including the Admin Console and other functionality of the Services) and TSS; (c) as documented in the form of the applicable Agreement, including this Data Processing Amendment; and (d) as further documented in any other written instructions given by Customer and acknowledged by Google as constituting instructions for purposes of this Data Processing Amendment.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

Time is Money Join Law Insider Premium to draft better contracts faster.