Security Recommendations Sample Clauses

Security Recommendations. The following recommendations non exhaustively set forth security recommendations that Fuzer's Client must take into account when using the Services or Equipment. Failing to comply with those recommendations will discharge Fuzer of any liability. General recommendations The Client must ensure that all employees, consultants, subcontractors, agents and other representatives are informed of those recommendations, so that they are able to comply with them. The Client will take all reasonable measures to prevent his equipment, employees, consultants, subcontractors, agents and other representatives to cause any damage to Fuzer assets (including hardware, software, data and brand image). This includes data losses, data corruptions and services interruptions due to: ● wrong configurations, errors, misconduct, false-operations and voluntary data alterations; ● spreading of viruses, Trojans, backdoors, or any other type of malicious code. Network Segregation Recommendation The Client must implement segregation between the voice and data network. The technical rules to be implemented by the Client for such purpose can be asked to Fuzer. The Client may not expose any service on the SOP(s) or any other Fuzer Equipment directly to the public Internet.
AutoNDA by SimpleDocs
Security Recommendations. We require an alpha-numeric password that is a minimum of 8 characters in length. We recommend that you create a password that utilizes numbers, special characters and both upper and lower case alpha characters. We require you to change your password periodically and do not allow you to use one of your previous four (4) passwords. Your password should not be associated with any commonly known or easily accessible personal identification, such as social security numbers, address, date of birth, names of children, and should be memorized rather than written down First Volunteer Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your access devices using a continually updated virus protection product that also scans Internet and e-mail files.
Security Recommendations. The upward trend of more and more customers using online channels for banking and financial services has expanded the opportunities for criminals and cyber-crime. Cybercriminals using malware, keystroke loggers and/or Trojan viruses can capture customer information such as login credentials and Multi-Factor Authentication challenge questions/answers and can highjack the user’s computer using their IP address so that the criminal will appear to be the end-user. Some of the most common approaches for criminals to compromise end-user data is to take advantage of end- users signing on to unsecured networks, not having up to date virus protection and security patches, visiting compromised web sites or opening attachments with embedded malware or Trojan software. Due to the sophisticated nature of this crime, there is not one single solution for online security. The best approach is a multi-layered approach. The Bank recommends the use of a stand-alone computer to perform Cash Management activities ensuring that the computer is hardened, is not used for web-surfing or email, and that anti-virus software and security patches are installed and kept current. The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a continually updated virus protection product that also scans Internet and e-mail files. An undetected virus may corrupt and destroy programs, files, and your hardware, and may even affect portions of the software used for The Bank’s online banking. BANKING TRANSACTIONS WITH ONLINE BANKING Customer authorizes the Bank to take on the Customer’s behalf any action necessary to complete any transaction initiated through the Services. This authority includes, without limitation, the withdrawal of funds from any of Customer’s Accounts or the obtaining of a loan or new deposit account both of which are effective as though the Customer had signed a check or withdrawal form to make the withdrawal or signed a direct loan check to obtain the loan. New services may be introduced for Online Banking from time to time. The Bank will notify you of the existence of these new services. By using these services when they become available, you agree to be bound by the rules governing the use of such services, which will be made available to you concerning these services.
Security Recommendations. To help enhance your Online Services security, we recommend that you follow some general safety guidelines: ▪ When creating your Access ID, it must be unique and may not be used for other users that are authorized to access Online Services. ▪ If you are logged in to your Online Services using a public computer, do not walk away from the computer unless you have successfully logged out. ▪ Memorize your Password but if you must write it down, keep it stored in a safe or locked drawer or reputable third-party password keeper application. ▪ Do not give out your Account information, Password, or Access ID. ▪ Don’t choose a Password already used for other unrelated services. ▪ Choose a Password that is not easy to guess, keeping in mind that the requirement for choosing your Password is a minimum of eight (8) with a maximum of seventeen (17) characters, and must include one (1) numeric, one (1) alpha and one (1) special character. ▪ Do not use the word “password” in your Password. ▪ Consider using a passphrase as your Password. ▪ Try not to use names of family members or pets followed by a number. In addition, words in a dictionary, derivatives of Access IDs and common character sequences such as “12345678” should not be employed. Likewise, Passwords should not contain proper names, geographic locations, common acronyms, slang or personal details such as spouse’s name, license plate, social security number, or birthday. ▪ If you should receive a suspicious email or telephone call requesting information that purports to be from Denmark State Bank or notice errors on your account, please contact us immediately at 920-863-2161.
Security Recommendations. The upward trend of more and more customers using online channels for banking and financial services has expanded the opportunities for criminals and cyber-crime. Cyber criminals using malware, keystroke loggers and/or Trojan viruses have the ability to capture customer information such as Login credentials and Multi-Factor Authentication challenge questions/answers and can highjack the user’s computer using their IP address so that the criminal will appear to be the end-user. Some of the most common approaches for criminals to compromise end user data is to take advantage of end users signing on to unsecured networks, not having up to date virus protection and security patches, visiting compromised web sites or opening attachments with embedded malware or Trojan software. Due to the sophisticated nature of this crime, there is not on single solution for online security. The best approach is a multi-layered approach. In addition to the information mentioned in the Use of Your Security Password; Authorization section: We require an alpha-numeric password that is 8-10 characters in length. We recommend that you create a password that utilizes both upper and lower case alpha characters. While it may seem like an inconvenience to change your password, this is an essential piece of the multi–layered security approach. We require you to change your password from time to time and do not allow you to use one of your previous four (4) passwords. Your password should not be associated with any commonly known or easily accessible personal identification, such as social security numbers, address, date of birth, names of children, and should be memorized rather than written down. As an enhanced online security feature, the System utilizes the RSA Multi-Factor Authentication Solution. RSA Authentication provides you added safety by helping ensure that only you can access your bank account. RSA Authentication remembers which computer(s) you normally use, preventing potential fraudsters from logging into your account even if they somehow obtain your login information. When the computer you are using to access the System is not recognized, you must verify your identity by responding correctly to the Challenge Questions that you established during the User enrollment process before you can proceed to access the System. We recommend that Cash Management Administrators establish a series of valid days of the week and/or time limitations for each User within the User settings....
Security Recommendations. To help enhance your Internet Service security, we recommend that you follow some general safety guidelines: • Never walk away from your computer while logged on to this service. • Memorize your PIN. • Don’t share your PIN with anyone. • Don’t choose a PIN that you use as a password or code for other unrelated services. • Choose a PIN that’s not easy to guess. For example, use a minimum of six characters with a combination of numeric and alpha characters, and do not use names of family members or pets alone or followed by a number. Words in a dictionary, derivatives of user ids and common characters sequence such as “12345678” should not be employed. Likewise, PINs should not contain proper names, geographic locations, common acronyms, slang or personal details such as spouse’s name, license plate, social security number, and birthday. Choosing a PIN that contains at least one lower case and one upper alphabetic character and the use of non- alphabetic characters where feasible such as a numeral (0-9) or punctuation character is strongly recommended. • Never give your PIN to somebody else, even if they identify themselves as our employee. Under no circumstances do we need your PIN. • You must report errors or problems immediately to us. Should you receive a suspicious email or telephone request for information that purports to be from us, you must notify us immediately. In any such case, notify your banker or call us at (000) 000-0000. IN CASE OF ERRORS OR QUESTIONS ABOUT YOUR ELECTRONIC TRANSFERS Telephone us at 000-000-0000 or write us at Denmark State Bank, 000 X. Xxxx Xx., X.X. Xxx 000, Xxxxxxx, XX, 00000 as soon as you can, if you think your statement or receipt is wrong or if you need more information about a transfer listed on the statement or receipt. Also, if your statement or posting shows transfers that you did not make, tell us at once. We must hear from you no later than 60 days after we made available to you the FIRST statement on which the problem or error appeared. If you do not tell us within 60 days of the date your statement is made available to you, you may not get any money you lost after the 60 days if we show that we could have stopped someone from taking the money if you would have told us in time. If a good reason (such as a long trip or a hospital stay) kept you from telling us, we will extend the time periods.

Related to Security Recommendations

  • Board Recommendation The Acquiror Company Board, by unanimous written consent, has determined that this Agreement and the transactions contemplated by this Agreement are advisable and in the best interests of the Acquiror Company’s stockholders and has duly authorized this Agreement and the transactions contemplated by this Agreement.

  • Company Board Recommendation (a) The Company hereby consents to the Offer and represents, as of the date of this Agreement, that the Company Board, at a meeting duly called and held, has unanimously made the Company Board Recommendation. Subject in each case to Section 6.1(b), the Company hereby consents to the inclusion of a description of the Company Board Recommendation in the Offer Documents and, during the Pre-Closing Period, neither the Company Board nor any committee thereof shall (i) (A) fail to make, withdraw (or modify or qualify in a manner adverse to Parent or Purchaser), or publicly propose to fail to make, withdraw (or modify or qualify in a manner adverse to Parent or Purchaser), the Company Board Recommendation or (B) approve, recommend or declare advisable, or publicly propose to approve, recommend, endorse or declare advisable, any Acquisition Proposal, (ii) fail to include the Company Board Recommendation in the Schedule 14D-9 when disseminated to the Company’s stockholders (any action described in clause (i) or (ii) being referred to as a “Company Adverse Change Recommendation”), (iii) publicly make any recommendation in connection with a tender offer or exchange offer (other than the Offer) other than a recommendation against such offer or (iv) approve, recommend or declare advisable, or propose to approve, recommend or declare advisable, or allow the Company to execute or enter into any Contract (other than an Acceptable Confidentiality Agreement) with respect to any Acquisition Proposal requiring, or reasonably expected to cause, the Company to abandon, terminate, delay or fail to consummate, or that would otherwise materially impede, interfere with or be inconsistent with, the Transactions.

  • Conclusions and Recommendations The literature review (see Appendix C) indicates a range of buffer width recommendations for protecting the shade function. Based on the XXXXX curve reported in this section of the report, approximately 1 SPTH (estimated at 61 meters or 200 ft) will provide nearly 100 percent effectiveness of the buffer to protect the intertidal from desiccation, elevated temperatures, and other shade-related functions. Of course, in nonforested community types (e.g., prairie and grasslands) the shade function from overstory trees may be unattainable. To maximize the buffer’s effectiveness to provide the shade function, the following actions are recommended: • Avoid disturbance to native vegetation in riparian areas, especially nearer the water’s edge. • Retain, restore, and enhance mature trees and a multi-layered canopy and understory of native vegetation at sites that support these types of plant communities. • Ensure that riparian areas can be maintained in mature, native vegetation through time. • Prevent modifications to banks and bluffs (e.g., armoring) that could disrupt natural processes (such as soil creep, development of backshore and overhanging vegetation, recruitment of wood and other organic matter to riparian area including beaches and banks.) • Prohibit cutting and topping of trees and avoid “limbing” (selective branch cutting to enhance views) of trees for view corridors and other purposes within buffers.

  • Change of Recommendation Notwithstanding anything in this Agreement to the contrary, at any time prior to obtaining the Company Stockholder Approval, the Company’s Board of Directors may, if it concludes in good faith (after consultation with its financial advisors and outside legal advisors) that the failure to take such action would be inconsistent with its fiduciary duties under applicable Law, make an Adverse Recommendation Change; provided that prior to any such Adverse Recommendation Change, (A) the Company shall have given Parent and Merger Sub prompt written notice advising them of (x) the decision of the Company’s Board of Directors to take such action and the reasons therefor and (y) in the event the decision relates to an Alternative Transaction Proposal, a summary of the material terms and conditions of the Alternative Transaction Proposal and other information requested to be provided with respect thereto pursuant to this Section 5.4, including the information required to be provided pursuant to Section 5.4(b) and (c), (B) the Company shall have given Parent and Merger Sub three (3) Business Days (the “Notice Period”) after delivery of each such notice to propose revisions to the terms of this Agreement (or make another proposal) and, during the Notice Period, the Company shall, and shall direct its financial advisors and outside legal advisors to, negotiate with Parent in good faith (to the extent Parent desires to negotiate) to make such adjustments in the terms and conditions of this Agreement so that, if applicable, such Alternative Transaction Proposal ceases to constitute (in the judgment of the Company’s Board of Directors, after consultation with its financial advisors and outside legal advisors), a Superior Proposal or, if the Adverse Recommendation Change does not involve an Alternative Transaction Proposal, to make such adjustments in the terms and conditions of this Agreement so that such Adverse Recommendation Change is otherwise not necessary, and (C) the Company’s Board of Directors shall have determined in good faith, after considering the results of such negotiations and giving effect to the proposals made by Parent and Merger Sub, if any, that such Alternative Transaction Proposal, if applicable, continues to constitute a Superior Proposal or that such Adverse Recommendation Change is otherwise still required; provided further that, (1) if during the Notice Period described in clause (B) of this paragraph any revisions are made to the Superior Proposal, if applicable, and the Company’s Board of Directors in its good faith judgment determines (after consultation with its financial advisors and outside legal advisors) that such revisions are material (it being understood that any change in the purchase price or form of consideration in such Superior Proposal shall be deemed a material revision), the Company shall deliver a new written notice to Parent and shall comply with the requirements of this Section 5.4(d) with respect to such new written notice except that the new Notice Period shall be two (2) Business Days instead of three (3) Business Days and (2) in the event the Company’s Board of Directors does not make the determination referred to in clause (C) of this paragraph but thereafter determines to make an Adverse Recommendation Change pursuant to this Section 5.4(d), the procedures referred to in clauses (A), (B) and (C) above shall apply anew and shall also apply to any subsequent withdrawal, amendment or change.

  • JOINT SETTLEMENT RECOMMENDATION 2. Staff conducted an investigation of the Respondent’s activities. The investigation disclosed that the Respondent had engaged in activity for which the Respondent could be penalized on the exercise of the discretion of the Hearing Panel pursuant to s. 24.1 of By-law No. 1.

  • Authority Relative to this Agreement; Recommendation The Company has all necessary corporate power and authority to execute and deliver this Agreement and to consummate the transactions contemplated hereby. The execution and delivery of this Agreement and the consummation of the transactions contemplated hereby have been duly and validly authorized by the Board and no other corporate proceedings on the part of the Company are necessary to authorize this Agreement or to consummate the transactions contemplated hereby except, if required by law, the approval and adoption of this Agreement and the Merger by the holders of the outstanding Shares. This Agreement has been duly and validly executed and delivered by the Company and constitutes a valid, legal and binding agreement of the Company enforceable against the Company in accordance with its terms, except as such enforceability may be limited by any applicable bankruptcy, insolvency, reorganization, moratorium or other similar laws affecting the enforcement of creditors' rights generally, and except as the availability of equitable remedies may be limited by the application of general principles of equity (regardless of whether such equitable principle is applied in a proceeding at law or in equity). The Board has duly and validly approved, and taken all corporate actions required to be taken by the Board (including but not limited to all actions the Board reasonably believes to be required to render the provisions of Title 3, Subtitles 2, 6 and 7 of the MGCL, "Special Voting Requirements" and "Voting Rights of Certain Control Shares", respectively, inapplicable to Parent and Acquisition) for the consummation of, the transactions contemplated hereby, including the Offer and the acquisition of the Shares pursuant thereto, the Preferred Stock Issuance and the Merger.

  • No Government Recommendation or Approval The Subscriber understands that no federal or state agency has passed upon or made any recommendation or endorsement of the offering of the Shares.

  • Recommendation The Sheriff recommends approval of the Board Order. The County Administrator concurs with the recommendation of the Sheriff. Should the Board of Commissioners concur with their recommendations, approval of the Board Order will implement that action. Respectfully submitted, /s/ XXXXX XXXXXX Xxxxx Xxxxxx County Administrator

  • Fairness Opinions (a) Unless waived by PSINet, there shall have been delivered to PSINet an opinion of independent investment bankers selected by PSINet, in form and substance satisfactory to PSINet, (i) as to the fairness to PSINet and its stockholders from a financial point of view of the issuance of the IXC Shares and the consummation of the transactions contemplated by, and in connection with, this Agreement and (ii) as to the value of the IRUs being granted by IXC to PSINet and the securities being issued or issuable by PSINet to IXC pursuant to this Agreement.

  • No Change in Recommendation or Alternative Acquisition Agreement Neither the Company Board nor any committee thereof shall:

Time is Money Join Law Insider Premium to draft better contracts faster.