Your Access Codes Sample Clauses

Your Access Codes. To gain access to the Digital Services, you will need an access passcode ("Passcode"), user identification ("User ID") and other authentication factors that we may require from time to time. Your card data may also be required for authentication purposes. The Passcode (including a fingerprint or other biometric identifier), User ID, Card Data, and other authentication factors (e.g., a token for the ACH, Wire Transfers and Real-Time Payments Digital Services) that we may require from time to time may collectively be called the "Access Codes." The Passcode will either be selected by you upon enrollment or will be supplied to you by us. For some services (e.g., M&T Mobile Banking), after your first login, you may be able to use a fingerprint or other biometric identifier as a Passcode. You can change your User ID and/or Passcode at any time. We require that you change any Passcode we provide to you. You agree to keep all Access Codes confidential to prevent unauthorized access to your accounts and to prevent unauthorized use of the Digital Services. To protect the security of your information and accounts, you agree to log out of the Digital Services and close your browser or application session when you are finished using the Digital Services. For reasons of security, we may cancel your Access Codes at any time without notice. All electronic communications and Instructions using these Access Codes will be deemed to be valid and authentic and we may act on such communications and Instructions. You also agree that those electronic communications will be given the same legal effect as written and signed paper communications. In general, your Access Codes permit you to access all Eligible Accounts associated with your Social Security number or Taxpayer Identification Number that are compatible with the Digital Services (including accounts you own individually and with others). Every owner of an account should obtain and use his or her own Access Codes. Do not share you Access Codes with others as such sharing will enable those individuals to access information and even transact on your Eligible Account(s) and you may be responsible for those transactions. In addition, for Business Accounts, the Administrator will select for each Authorized User, a User ID, and a Passcode. Issuance and re-issuance of certain Access Codes may require the Administrator to use additional authentication or security procedures we establish from time to time. If you believe that any of...
AutoNDA by SimpleDocs
Your Access Codes. Your Gandi handle is associated to a confidential password that You chose at the time of its creation. Your Gandi handle and the associated confidential password are designated together in Our Contract as Your "Access Codes", and allow You to be identifiable to Our services. Each password is, and must remain, strictly personal and confidential. It is placed under the responsibility of its owner, who must take all necessary precautions in order to preserve its confidentiality and integrity. You must notably take all appropriate measures to assure that Your handle and its associated password remain secret, and are not lost or stolen. You agree to formally notify Us as soon as Your access codes (handle and passwords) have been lost or disclosed to an unauthorized third party. By default, and until You have notified Gandi, all access to Your Gandi Account, or operation performed using Your access codes is deemed to have been done under Your responsibility and with Your permission.
Your Access Codes. To gain access to the Services, you will need a web access passcode (“Passcode”) and user identification (“User ID”). The Passcode and User ID may collectively be called the “Access Codes.” The Passcode will either be selected by you upon enrollment (if you enroll using Card Data) or will be supplied to you by us. You can change your User ID and/or Passcode on-line at any time. We recommend that you change any User ID and Passcode we provide to you. You agree to keep all Access Codes confidential to prevent unauthorized access to your accounts and use of the Services. For reasons of security, we may cancel your Passcode or ID at any time without notice. All electronic communications and instructions using these Access Codes will be deemed to be valid and authentic and we may act on such communications and instructions. You also agree that those electronic communications will be given the same legal effect as written and signed paper communications.
Your Access Codes. To gain access to the Services, you will need a web access password (“Password”) and user identification (“Access ID”). For certain Services you will also need to supply your personal identification number we have supplied to you in regard to your Commerce Bank HSA Debit Card, and the number associated with that card (collectively, “Card Data”). The Password, Access ID or Card Data may collectively be called the “Access Codes.” The Password will either be selected by you upon enrollment or will be supplied to you by us. You can change your Password on-line at any time. We recommend that you change the Password we provide to you. You agree to keep all Access Codes confidential to prevent unauthorized access to your accounts and use of the Services. For reasons of security, we may cancel your Password or Access ID at any time without notice. All electronic communications and instructions using these Access Codes will be deemed to be valid and authentic and we may act on such communications and instructions. If you permit any other person to use the Service or your Access Codes or other means to access your account, you will have authorized that person to access your Commerce Bank HSA Deposit Account and you are solely responsible for any transactions that person initiates or authorizes from your Commerce Bank HSA Deposit Account. You also agree that all electronic communications will be given the same legal effect as written and signed paper communications.
Your Access Codes. Your Walled Networks handle is associated to a confidential password that You chose at the time of its creation. Your Walled Networks handle and the associated confidential password are designated together in Our Contract as Your "Access Codes", and allow You to be identifiable to Our services. Each password is, and must remain, strictly personal and confidential. It is placed under the responsibility of its owner, who must take all necessary precautions in order to preserve its confidentiality and integrity. You must notably take all appropriate measures to assure that Your handle and its associated password remain secret, and are not lost or stolen. You agree to formally notify Us as soon as Your access codes (handle and passwords) have been lost or disclosed to an unauthorized third party. By default, and until You have notified Walled Networks, all access to Your Walled Networks Account, or operation performed using Your access codes is deemed to have been done under Your responsibility and with Your permission.

Related to Your Access Codes

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • CANCELLATION OF TBS ACCESS CODE The Account Holder may cancel his TBS Access Code by giving notice to the Bank in writing or in any other manner as may be determined by the Bank, and such notice shall only be effective upon actual receipt thereof by the relevant officer-in-charge at the Bank.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

Time is Money Join Law Insider Premium to draft better contracts faster.