Network Security and Reliability Sample Clauses

Network Security and Reliability. Client acknowledges that the Internet is not a secure network and that communications transmitted over the Internet may be accessed by unauthorized or unintended third parties. E-mail notifications sent by Betterment or Betterment Securities will not contain sensitive or confidential customer information, including account numbers. Due to security risks, Client will not send any sensitive information, such as account numbers or Passwords, in an unencrypted e-mail. E-mails on rare occasions may fail to transmit properly. Regardless of whether Client receives an e- mail notification, Client agrees to check the Interface regularly for up-to-date information and to avoid missing time-sensitive information. Client agrees that, for Client’s records, Client can download and save or print the Account Communications Client received via electronic delivery.
AutoNDA by SimpleDocs
Network Security and Reliability. You acknowledge that the Internet is not a secure network and that communications transmitted over the Internet may be accessed by unauthorized or unintended third parties. E-mail notifications sent by AmerKorAsian will not contain sensitive or confidential information. Due to security risks, you should not send any sensitive information, such as account numbers or passwords in an unencrypted e-mail. E-mails may fail to transmit properly. Regardless of whether you receive an e-mail notification, you agree to check the AmerKorAsian Platform to avoid missing time-sensitive information. You further agree that for your records, you can download and save or print the communications received via electronic delivery. Consent to electronic delivery By providing AmerKorAsian with your e-mail address, you agree to receive all required notices electronically to that e-mail address. It is your responsibility to update or change the e-mail address registered with AmerKorAsian, as appropriate. If you become aware of any unauthorized use of your information, please contact AmerKorAsian. Further, by registering with AmerKorAsian, you are aware and consent that electronic signatures and electronic documents will be used instead of paper documents. You agree and are giving consent to electronic delivery of all communications which includes, but is not limited to, all current and future account statements, trade confirmations, notices, disclosures, regulatory communications (including prospectuses, proxy solicitations and privacy notices) and other information, documents, data and records regarding your account all services provided by AmerKorAsian delivered or provided to you by AmerKorAsian. Your consent will be effective immediately and will remain in effect until either AmerKorAsian or you revoke it. You understand that it may take up to three days to process a revocation of consent to electronic communications and you may receive electronic notifications in the interim. You may revoke or restrict consent to electronic delivery of AmerKorAsian communications at any time by notifying AmerKorAsian. You have the right to request paper delivery of any communication that the law requires AmerKorAsian to provide in paper form. If you revoke or restrict consent to electronic delivery, AmerKorAsian, at its discretion, may charge a service fee of up to $100.00 for the delivery of communications that would otherwise be delivered electronically, restrict your account, or close your...

Related to Network Security and Reliability

  • System Security and Data Safeguards When SAP is given access to Licensee’s systems and data, SAP shall comply with Licensee’s reasonable administrative, technical, and physical safeguards to protect such data and guard against unauthorized access. In connection with such access, Licensee shall be responsible for providing Consultants with user authorizations and passwords to access its systems and revoking such authorizations and terminating such access, as Licensee deems appropriate from time to time. Licensee shall not grant SAP access to Licensee systems or personal information (of Licensee or any third party) unless such access is essential for the performance of Services under the Agreement. The parties agree that no breach of this provision shall be deemed to have occurred in the event of SAP non-conformance with the aforementioned safeguard but where no personal information has been compromised.

  • Data Security and Privacy 12.1 SERVICE PROVIDER acknowledges the importance of Data Security and agrees to adhere to the Terms and Conditions of the Data Security Policy of IIMC.

  • Security and Data Privacy Each party will comply with applicable data privacy laws governing the protection of personal data in relation to their respective obligations under this Agreement. Where Siemens acts as Customer’s processor of personal data provided by Customer, the Data Privacy Terms available at xxxxx://xxx.xxxxxxx.xxx/dpt/sw, including the technical and organizational measures described therein, apply to the use of the relevant Learning Services and are incorporated herein by reference.

  • Use, Security, and Retention Local Agency shall use, hold and maintain State Confidential Information in compliance with any and all applicable laws and regulations in facilities located within the United States, and shall maintain a secure environment that ensures confidentiality of all State Confidential Information wherever located. Local Agency shall provide the State with access, subject to Local Agency’s reasonable security requirements, for purposes of inspecting and monitoring access and use of State Confidential Information and evaluating security control effectiveness. Upon the expiration or termination of this Agreement, Local Agency shall return State Records provided to Local Agency or destroy such State Records and certify to the State that it has done so, as directed by the State. If Local Agency is prevented by law or regulation from returning or destroying State Confidential Information, Local Agency warrants it will guarantee the confidentiality of, and cease to use, such State Confidential Information.

  • Security and Safety A. The Contractor warrants it is and shall remain in compliance with all applicable local, state and federal laws, regulations, codes and ordinances relating to fire, construction, building, health, food service and safety, including but not limited to the Hotel and Motel Fire Safety Act of 1990, Public Law 101-391. The Judicial Council may terminate this Agreement, pursuant to the termination for cause provision set forth herein, without penalty or prejudice if the Contractor fails to comply with the foregoing requirements.

  • Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.

  • Security and Privacy 3. Security and privacy policies for the Genesys Cloud Service addressing use of Customer Data, which are incorporated by reference, are located at xxxxx://xxxx.xxxxxxxxxxx.xxx/articles/Genesys Cloud-security-compliance/.

  • Security and Validation Procedures The Scheduling Coordinator shall apply to the Meter Data of the Scheduling Coordinator Metered Entities that it represents the security and validation procedures prescribed by the relevant Local Regulatory Authority. If the relevant Local Regulatory Authority has not prescribed any such procedures, the Scheduling Coordinator shall apply the procedures set forth in the CAISO Tariff. Meter Data submitted by a Scheduling Coordinator for Scheduling Coordinator Metered Entities shall conform to these standards unless the CAISO has, at its discretion, exempted the Scheduling Coordinator from these standards.

  • Description of Vendor Entity and Vendor's Goods & Services If awarded, this description of Vendor and Vendor's goods and services will appear on the TIPS website for customer/public viewing. Full service mechanical and electrical contractors offering professional solutions and services in HVAC, Refrigeration, Piping, Plumbing, Electrical, Controls and Engineering. Primary Contact Name Please identify the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract. Xxxx Xxxxx Primary Contact Title Primary Contact Title Project Manager Primary Contact Email Please enter a valid email address that will definitely reach the Primary Contact. xxxxxx@xxxxxxxxxxxxxx.xxx Primary Contact Phone Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). Please provide the accurate and current phone number where the individual who will be primarily responsible for all TIPS matters and inquiries for the duration of the contract can be reached directly. 0000000000 Primary Contact Fax Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 0 0000000000 Primary Contact Mobile Numbers only, no symbols or spaces (Ex. 8668398477). The system will auto-populate your entry with commas once submitted which is appropriate and expected (Ex. 8,668,398,477). 1 0000000000 Secondary Contact Name Please identify the individual who will be secondarily responsible for all TIPS matters and inquiries for the duration of the contract. Xxxx Xxxxx Secondary Contact Title Secondary Contact Title

  • Data Security and Privacy Plan As more fully described herein, throughout the term of the Master Agreement, Vendor will have a Data Security and Privacy Plan in place to protect the confidentiality, privacy and security of the Protected Data it receives from the District. Vendor’s Plan for protecting the District’s Protected Data includes, but is not limited to, its agreement to comply with the terms of the District’s Bill of Rights for Data Security and Privacy, a copy of which is set forth below and has been signed by the Vendor. Additional components of Vendor’s Data Security and Privacy Plan for protection of the District’s Protected Data throughout the term of the Master Agreement are as follows:

Time is Money Join Law Insider Premium to draft better contracts faster.