SECURITY PROCEDURES; COMMUNICATIONS. (a) Client and Bank may agree to certain procedures and security devices, which may include without limitation, codes, encryption, passwords, and other security devices, systems and Software (referred to individually and collectively, “Security Device(s)”) designed to verify the authenticity of information (including without limitation transaction information), instructions, orders (including without limitation payment orders) and other communications relating to a Service (each a “Communication”). The term “payment order(s)” includes payment orders, as defined in Division 11 of the California Commercial Code. In this regard, application of the procedures and Security Devices to authenticate a Communication will be collectively referred to as the “Security Procedures” in the Master Agreement. If Bank takes any action not provided in the Security Procedures in connection with any Communication, such additional action shall not be deemed to become a mandatory part of the continuing Security Procedures. Client understands and agrees that Bank will use the Security Procedures to verify the authenticity of Communications and that the Security Procedures are not designed to, and are not used for the purpose of, detecting errors in transmission or content of Communications, including discrepancies between account names and numbers. (b) Before using a Service and before sending a Communication to Bank, Client will review the Security Procedures and determine whether the Security Procedures will provide a commercially reasonable method for verifying whether a Communication is that of Client. As part of the review, Client will consider the size, type, and frequency of Communications Client normally makes or anticipates making, along with such other factors as Client may deem relevant or appropriate.
Appears in 1 contract
SECURITY PROCEDURES; COMMUNICATIONS. (a) Client and Bank may agree to certain procedures and security devices, which may include without limitation, codes, encryption, passwords, security tokens, and other security devices, systems and Software (referred to individually and collectively, “Security Device(s)”) designed to verify the authenticity of information (including without limitation transaction information), instructions, orders (including without limitation payment orders) and other communications relating to a Service (each a “Communication”). The term “payment order(s)” includes payment orders, as defined in Division 11 of the California Commercial Code. In this regard, application of the procedures and Security Devices to authenticate a Communication will be collectively referred to as the “Security Procedures” in the Master Agreement”. If Bank takes any action not provided in the Security Procedures in connection with any Communication, such additional action shall not be deemed to become a mandatory part of the continuing Security Procedures. Client understands and agrees that Bank will use the Security Procedures to verify the authenticity of Communications and that the Security Procedures are not designed to, and are not used for the purpose of, detecting errors in transmission or content of Communications, including discrepancies between account names and numbers.
(b) Before using a Service and before sending a Communication to Bank, Client will review the Security Procedures and determine whether the Security Procedures will provide a commercially reasonable method for verifying whether a Communication is that of Client. As part of the review, Client will consider the size, type, and frequency of Communications Client normally makes or anticipates making, along with such other factors as Client may deem relevant or appropriate.
Appears in 1 contract
Sources: Master Cash Management Agreement