Your Responsibilities Regarding Security Sample Clauses

Your Responsibilities Regarding Security. You agree that you are solely responsible for maintaining the security of your and any permitted guests’ computer(s), device(s) and data, including without limitation, encryption of data and protection of your User ID, password and personal and other data. The Service may permit you with the option to provide third parties authorized by you access to the Internet using your Verizon-issued device. If you believe your login credentials have been lost or stolen, or that someone has gained access to your account or login credentials without your permission, call us immediately at 0-000-000-0000. WE STRONGLY RECOMMEND THE USE (AND APPROPRIATE UPDATING) OF COMMERCIAL ANTI-VIRUS, ANTI- SPYWARE AND FIREWALL SOFTWARE. Use of the Verizon network for the distribution, operation, and maintenance of malicious software (viruses, bots, worms, Trojan horses, etc.) is prohibited. Communications to malicious domain names (e.g., domain names used by networks of machines running malicious software) and to malicious Internet protocol addresses (e.g., IP addresses used by networks of machines running malicious software) may be redirected by Verizon to our network security systems at any time without notice as a countermeasure against the operation of malicious software such as “botnets” in the Verizon network. Verizon’s security systems may retain certain information such as the date and time of the malicious communication, the IP address it originated from, the domain name involved, and other technical information for cybersecurity purposes. Our security systems are configured to not retain end user information contained in the payload of the application layer, if any, that is delivered or uploaded by the compromised machines. WE STRONGLY RECOMMEND THE USE (AND APPROPRIATE UPDATING) OF COMMERCIAL ANTI-VIRUS, ANTI-SPYWARE AND FIREWALL SOFTWARE.
AutoNDA by SimpleDocs
Your Responsibilities Regarding Security. You agree that you are solely responsible for maintaining the security of your computer(s) and data, including without limitation, encryption of data and protection of your User ID, password and personal and other data. WE STRONGLY RECOMMEND THE USE (AND APPROPRIATE UPDATING) OF COMMERCIAL ANTI-VIRUS, ANTI-SPYWARE AND FIREWALL SOFTWARE.
Your Responsibilities Regarding Security. You agree that you are solely responsible for maintaining the security of your computer(s) and data, including without limitation, encryption of data and protection of your User ID, password and personal and other data. WE STRONGLY RECOMMEND THE USE (AND APPROPRIATE UPDATING) OF COMMERCIAL ANTI-VIRUS, ANTI-SPYWARE AND FIREWALL SOFTWARE. You understand that it may be possible for unauthorized third parties to monitor data traffic. If you wish to secure your usage in connection with the Services, you have the obligation to obtain, at your own cost, encryption software or other transmission security protections. You assume full responsibility for the establishment of appropriate security measures to control or limit access to your information.
Your Responsibilities Regarding Security. Unless otherwise prohibited by law, You agree that You are solely responsible for maintaining the security of Your computer(s) and data, including without limitation, encryption of data and protection of Your User ID, password, and personal and other data. You agree to keep confidential all passwords, IP addresses, and computer names and are solely responsible for any liability or damages resulting from Your failure to maintain that confidentiality. You are also solely and fully responsible and liable for all activities that occur under Your password, account or IP address. You agree to do all of the following: (a) immediately notify Service Provider if You suspect any breach of security such as loss, theft, public use or unauthorized disclosure or use of Your account or sub account, or password;
Your Responsibilities Regarding Security. You agree that you are solely responsible for maintaining the security of your and any permitted guests’ computer(s), device(s) and data, including without limitation, encryption of data and protection of your User ID, password and personal and other data. You agree to keep confidential all passwords, user IDs, and other Account identifiers and are solely responsible for any liability or damages resulting from your failure to maintain that confidentiality. You are solely and fully responsible and liable for all activities that occur under your Layer3 TV Account, password or user ID. You agree to: (a) immediately notify us if you suspect any breach of security such as loss, theft, public use (unrestricted, open, communal or shared use by third parties unrelated and/or not affiliated with you either for profit or not for profit) or unauthorized disclosure or use of your Layer3 TV Account, password, user ID, or any credit or debit card number provided to us by calling at 844- Layer3TV (844-529-3738); (b) ensure you exit from your Account as applicable at the end of each session; and (c) periodically change your password. WE STRONGLY RECOMMEND THE USE (AND APPROPRIATE UPDATING) OF COMMERCIAL ANTI-VIRUS, ANTISPYWARE AND FIREWALL SOFTWARE. Use of the Layer3 TV network for the distribution, operation, and maintenance of malicious software (viruses, bots, worms, Trojan horses, etc.) is prohibited. Communications to malicious domain names (e.g., domain names used by networks of machines running malicious software) and to malicious Internet protocol addresses (e.g., IP addresses used by networks of machines running malicious software) may be redirected by Layer3 TV to our network security systems at any time without notice as a countermeasure against the operation of malicious software such as “botnets” in the Layer3 TV network. Layer3 TV’s security systems may retain certain information such as the date and time of the malicious communication, the IP address it originated from, the domain name involved, and other technical information for cybersecurity purposes. Our security systems are configured to not retain end user information contained in the payload of the application layer, if any, that is delivered or uploaded by the compromised machines.

Related to Your Responsibilities Regarding Security

  • Our Responsibilities This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review it carefully. This notice took effect on September 23, 2013. We are required to maintain the privacy of your protected health information and we will follow the terms of this notice while it is in effect. Your Protected Health Information (PHI) and Other Nonpublic Personal Information PHI — health information that identifies you or could be used to identify you that was created or received by a provider, health plan, or employer, and that relates to one of the following: • Your past, present, or future physical or mental health or condition • Providing you health care • The past, present, or future payment for providing you health care Other Nonpublic Personal Information — identifies you, such as account balance information, payment history, information obtained in connection with a loan, or information from a consumer report. Your Information We collect your information as necessary to provide you with health insurance products and services and to administer our business. We may also disclose this information to nonaffiliated third parties as described in this notice. The types of information we may collect and disclose include: • Information you or your employer provide on applications and other forms, such as names, addresses, social security numbers, and dates of birth • Information about your interactions with us or others (such as providers) regarding your medical information or claims • Information you provide in person, by phone, in email, or through visits to our website Your Rights When it comes to your health information, you have certain rights. This section explains your rights and some of our responsibilities. Get a copy of health and claims records • You can ask to see or get a copy of your health and claims records and other health information we have about you. • We will provide a copy or a summary of your health and claims records, usually within 30 days of your request. We may charge a reasonable, cost-based fee. • We may ask that you submit your request in writing. Please note, if you want to obtain copies of your medical records, you should contact the practitioner or facility. We do not generate, modify, or maintain complete medical records. • You may also request that we send a copy of your information to a third party. We may ask that you submit a written, signed authorization form permitting us to do so and we may charge a reasonable fee for copying and mailing your personal information. Ask us to correct health and claims records • You can ask us to correct your health and claims records if you think they are incorrect or incomplete. • We may say no to your request, but we’ll tell you why in writing within 60 days. Request confidential communications • You can ask us to contact you in a specific way (for example, home or office phone) or to send mail to a different address. • We will consider all reasonable requests, and must say “yes” if you tell us you would be in danger if we do not. • All requests should be made in writing. • It may take a short period of time for us to implement your request. • We will comply with your request if it is reasonable and continues to permit us to collect premiums and pay claims under your policy, including issuing certain explanations of benefits and policy information to the BlueShield of Northeastern New York is a division of HealthNow New York Inc., an independent licensee of the BlueCross BlueShield Association. 15049R_NENY_12_19 f11011 subscriber of the policy. For example, even if you request confidential communications: ο We will mail the check for services you receive from a nonparticipating provider to you but made payable to the subscriber ο Accumulated payment information such as deductibles (in which your information might appear), will continue to appear on explanations of benefits sent to the subscriber ο We may disclose to the subscriber, as the contract holder, policy details such as eligibility status or certificates of coverage Ask us to limit what we use or share • You can ask us not to use or share certain health information for treatment, payment, or our operations. • We are not required to agree to your request, but if we do, we will abide by our agreement (except when necessary for treatment in an emergency). You have the right to request a list of certain disclosures of your information we or our business associates made for purposes other than treatment, payment, or health care operations. You have the right to receive a paper copy of this notice Choose someone to act for you • You have the right to authorize individuals to act on your behalf with respect to your information. You must identify your authorized representatives on a HIPAA-compliant authorization form (available on our website) and explain what type of information they may receive. • You have the right to revoke an authorization except for actions already taken based on your authorization. File a complaint if you feel your rights are violated • You can complain if you feel we have violated your rights by contacting us using the information listed on page 4. • You can file a complaint with the U.S. Department of Health and Human Services Office for Civil Rights. • We will not retaliate against you for filing a complaint. Your Choices For certain health information, you can tell us your choices about what we share. We may use and disclose your information in the situations described below but you have the right to limit or object to these uses or disclosures. If you have a clear preference for how we share your information in these situations, contact us using the information on page 4. • With your family, close friends, or others involved with your health care or payment for your care when you are present and have given us permission to do so. If you are not present, if it is an emergency, or you are not able to give us permission, we may give your information to a family member, friend, or other person if sharing your information is in your best interest. In these cases, the person requesting your information must accurately verify details about you (e.g., name, identification number, date of birth, etc.) and prove involvement with your health care or payment for your health care by providing details relevant to the information requested. For example, if a family member calls us with prior knowledge of a claim (e.g., provider’s name, date of service, etc.), we may confirm the claim’s status, patient responsibility, etc. We will only disclose information directly relevant to that person’s involvement with your health care or payment for your health care. • In a disaster relief situation. Uses and disclosures for which we will obtain your authorization In these cases we never share your information unless you give us written permission: • Marketing purposes • Sale of your information • Disclose your psychotherapy notes • Make certain disclosures of information considered sensitive in nature, such as HIV/AIDS, mental health, alcohol or drug dependency, and sexually transmitted diseases. Certain federal and state laws require that we limit how we disclose this information. In general, unless we obtain your written authorization, we will only disclose such information as provided for in applicable laws. Our Uses and Disclosures How do we typically use or share your health information? We typically use or share your health information in the following ways: Help manage the health care treatment you receive • We can use your health information and share it with professionals who are treating you.

  • Your Responsibilities You represent and agree to the following by enrolling for Mobile Banking or by using the Service:

  • Employer Responsibility The Employer accepts its responsibility to insure equal opportunity in all aspects of employment for all qualified persons regardless of race, creed, religion, color, national origin, age, disability, reliance on public assistance, sex, marital status, sexual orientation/affectional preference, or any other class or group distinction, as set forth by state or federal anti-discrimination laws, or in Board policy.

  • User Responsibilities i. Users are required to follow good security practices in the selection and use of passwords;

  • Employer Responsibilities Recognizing the inherent risk(s) in a correctional setting, the Employer is obligated to provide a safe workplace and to educate employees on proper safety procedures and use of protective and safety equipment. The Employer is committed to responding to legitimate safety concerns raised by the Union and employees. The Employer will comply with federal and state safety standards, including requirements relating to first aid training, first aid equipment and the use of protective devices and equipment.

  • Owner Responsibilities Owner shall:

  • Your Responsibility You are solely responsible for the quality, completeness, accuracy, validity and integrity of the image. You are solely responsible if you, intentionally or unintentionally, submit fraudulent, incorrect or illegible images to us or if Mobile Deposit is used, by authorized or unauthorized persons, to submit fraudulent, unauthorized, inaccurate, incorrect or otherwise improper or unusable images to us. In addition you agree that you will not modify, change, alter, translate, create derivative works from, reverse engineer, disassemble or decompile the technology or Service, copy or reproduce all or any part of the technology or Service, or interfere, or attempt to interfere, with the technology or Service. The Bank and its technology partners, inclusive of, but not limited to, Q2 and ProfitStars, retain all rights, title and interests in and to the Services, Software and Development made available to you.

  • User Responsibility You agree that you are responsible for all use(s) related to your account. You understand this means that you accept full liability and responsibility for your actions or the actions of anyone who uses the Service via your account with or without your permission. You acknowledge that XXXXXXX XXXXXXXX will be sending you information, including your Password, via e-mail over the Internet. You agree that the Internet is not a secure network and that third parties may be able to intercept, access, use or corrupt the information and telephone calls you transmit over the Internet. In order to maintain the security of your Service, you should safeguard your User IDs and Passwords, as well as the media access control (MAC) address of the Adapter. The MAC address is one of the pieces of information used by XXXXXXX XXXXXXXX to authenticate customer calls and should not be shared.

  • Customer Responsibilities Customer shall:

  • Vendor Responsibilities Note: NO EXCEPTIONS OR REVISIONS WILL BE CONSIDERED IN C-M, O-S, V-W. Indemnification

Time is Money Join Law Insider Premium to draft better contracts faster.