Your Internal Security Sample Clauses

Your Internal Security. (non-consumer customers only). You bear sole responsibility for establishing, maintaining, implementing and updating policies, procedures, equipment and software (“Internal Security Controls”) that ensure the security and integrity of your computer systems, Mobile Devices and information, protect them from any unauthorized use, intrusion, takeover or theft, and prevent your Access Credentials from any unauthorized discovery or use (collectively “Internal Security Breaches”). You bear all risk of fraudulent transfers and other losses or disclosures arising from your Internal Security Breaches or from the interception of your communications prior to their receipt by us (collectively “Internal Security Losses”). We will not reimburse your Internal Security Losses. You are encouraged to consider purchasing insurance to cover your Internal Security Losses. To help protect your system from Internal Security Breaches, your Internal Security Controls program should consider including: • Verifying all instructions from your payees (e.g., ensure new or changed payment addresses were not communicated by an imposter); • Limiting and controlling who has access to your computer systems and Mobile Devices; • Protecting and frequently changing your Access Credentials; • Adopting dual authorization and/or transaction-based authentication procedures for financial transfers; • Employing up-to-date security software such as anti-virus, anti-malware and anti-spyware programs, as well as up-to-date software patches for all your software programs, internet browsers, e-mail programs, and the like (such as IBM® Trusteer RapportTM software); • Prohibiting the disabling or modification the security features of any software or hardware (e.g., “jailbreaking” of mobile devices); and prohibiting the use of “burner” mobile devices. • Using effective, up-to-date firewalls; • Procedures to avoid infection by malware and malicious code, such as: controlling what software and applications are downloaded to your computers and Mobile Devices; controlling what websites are visited by your computers and Mobile Devices; controlling the connection of other devices (e.g., flash drives) to your computers and Mobile Devices; controlling what documents, e-mail attachments, programs and other files are opened or installed on your computers and Mobile Devices; and limiting which of your computers and Mobile Devices are used for Digital Banking or other financial matters; • Reconciling all accounts on a ...
AutoNDA by SimpleDocs
Your Internal Security. You bear sole responsibility for establishing, maintaining, implementing and updating policies, procedures, equipment and software (“Internal Security Controls”) that ensure the security and integrity of your processes, equipment (including telecommunications and computer systems) and information, protect them from any unauthorized use, intrusion, takeover or theft, and prevent your Access Credentials from any unauthorized discovery or use (collectively “Internal Security Breaches”). You bear all risk of fraudulent transfers and other losses or disclosures arising from your Internal Security Breaches or from the interception of your communications prior to their receipt by us (collectively “Internal Security Losses”). We will not reimburse your Internal Security Losses. You agree that we are authorized to execute, and it is commercially reasonable for us to execute, any instruction received by us and authenticated by your Access Credentials. You are encouraged to consider purchasing insurance to cover your Internal Security Losses. To protect your system from Internal Security Breaches, your Internal Security Controls should consider including:
Your Internal Security. You agree to establish, implement, maintain and update (as appropriate) policies, procedures, equipment and software (“Internal Security Controls”) that, with respect to the initiation, processing and storage of ACH, wire and other transactions, will: (a) protect the confidentiality and integrity of non-public personal information, including financial information, of a natural person used to create or contained within an ACH or other Order and any related addenda record (“Protected Information”) until its destruction, (b) protect against anticipated threats or hazards to the security or integrity of Protected Information until its destruction, (c) protect against unauthorized use of Protected Information that could result in harm to a natural person, and (d) comply with all applicable regulatory guidelines on access to and security for the systems you use to initiate, process, and store ACH, wire and other transactions. Your Internal Security Controls must also safeguard the security and integrity of your computer system and information from unauthorized use, intrusion, takeover or theft, and prevent your Password from unauthorized discovery or use (collectively “Internal Security Breaches”). You bear all risk of fraudulent transfers and other losses arising from your Internal Security Breaches or from the interception of your communications prior to their receipt by us (collectively “Internal Security Losses”). We will not reimburse you in connection with Internal Security Losses. You agree that we are authorized to execute, and it is commercially reasonable for us to execute, any instruction received by us with your Password. You are encouraged to consider purchasing insurance to cover your Internal Security Losses. To protect your system from Internal Security Breaches, your Internal Security Controls should consider including:

Related to Your Internal Security

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

Time is Money Join Law Insider Premium to draft better contracts faster.