Passwords and PINs Sample Clauses

The "Passwords and PINs" clause establishes the rules and responsibilities regarding the creation, use, and protection of passwords and personal identification numbers within an agreement. Typically, it requires users to keep their login credentials confidential, prohibits sharing them with unauthorized parties, and may outline procedures for reporting compromised credentials. This clause is essential for maintaining the security of systems and data by ensuring that only authorized individuals have access, thereby reducing the risk of unauthorized access or data breaches.
Passwords and PINs. Text-based passwords and PINs were the only encountered implementations of knowledge-based factors. Other knowledge-based schemes have been proposed in the past, such as cognitive and graphical passwords [Zviran and Xxxx 1990; Xxx et al. 2005], but none of them are used by the banks examined in the survey. Using knowledge as a single factor for authentication is quite unsafe. Passwords and PINs are often kept static for longer periods of time to keep them memorable. As long-term secrets, passwords and PINs entered as plain text on a user’s computer can be collected by software-based keyloggers, to be used instantly in subsequent attacks [Xxxxxx and Xxx Xxxxxxxx 2007]. Despite this vulnerability and as shown in Table I, a relatively large number of banks still use passwords or PINs exclusively in home and ACM Computing Surveys, Vol. 49, No. 4, Article 61, Publication date: December 2016. Knowledge factor↓ Possession factor Regular sites (80) Mobile apps (60) Mobile sites (25) None Present None Present None Present PIN 2 17 5 20 2 3 Password and PIN 1 6 1 0 1 0 None N/A 3 N/A 1 N/A 1 Unknown 0 2 1 mobile banking (20% for home banking, 35% and 60% for mobile banking applications and sites, respectively). The “Password and/or PIN” knowledge factor in Table I requires some explanation. It relates to banks that offer different combinations of authentication options that support either passwords, passwords and PINs, or PINs only. This is because they offer different physical or electronic authentication devices, each with its own set of knowledge factors. For example, a bank can require a password to log in, and either physical paper or an electronic device to derive one-time passwords from for transaction authorization. The electronic device requires a PIN to be accessible, while a PIN is not necessary for the physical paper. Passwords are popular in both situations where knowledge is used as a single factor and when a possession factor is used. PINs are only popular in combination with a pos- session factor. If the only factor is knowledge, it is logical that passwords are preferred above PINs, since passwords offer more security due to their higher complexity, making them harder to guess. An explanation for why PINs are still quite popular in multi- factor scenarios is that they are often an intrinsic part of the authentication method. For instance, some OTP generators require the use of some knowledge to unlock their functionality. If the knowledge has to be ...
Passwords and PINs. NASA will incorporate password systems and PINs as necessary to ensure secure access to the system. This system will also provide NASA with a documented record of each stakeholder that logs on to the system and reviews reports and regulatory information. This will effectively produce a “transmission log” of all interested parties, including the general public. General public stakeholders can be issued passwords and PINs through a simple, interactive, log-on screen. NASA will carefully review the viability of this type of security system to ensure it is effective and not burdensome to stakeholders that require access to the web-based reports and regulatory information.
Passwords and PINs. At commencement of the Service, You will be provided with a user name, password and pin number. This user name will give You the ability to generate additional user names with differing access levels, together with their own passwords and pins. These user names, passwords, and pins are personal to Your organisation and should not be given, assigned, or sold to any third party without CCL’s written permission. You are responsible for all actions that take place as a result of access to the Service via Your user names, pins, and passwords. It is Your responsibility to ensure the security of Your passwords and pins, to maintain their confidentiality, and to regularly change them. You acknowledge that You are responsible for ensuring that no unauthorised access to the Service is obtained using Your password and pins and that You are liable for all such activities conducted through Your account whether authorised or not. It is your responsibility to inform CCL in writing as soon as You become aware that you believe the username, password, or pin has become known to an unauthorised third party. CCL may cancel Your existing username, password, and pin and issue new ones to You either where: (i) CCL has reason to believe that the security of Your username, password, and pin has been compromised without Your knowledge (ii) You have requested either a new username, new password, or new pin in writing or have notified CCL of a breach of security

Related to Passwords and PINs

  • Records and Documentation The Sub-Recipient agrees to make available to AAAPP staff and/or any party designated by the AAAPP any and all contract related records and documentation. The Sub-Recipient shall ensure the collection and maintenance of all program related information and documentation on any such system designated by the AAAPP. Maintenance includes valid exports and backups of all data and systems according to AAAPP standards.

  • Access to Records and Personnel Indivior shall ensure the IRO has access to all records and personnel necessary to complete the reviews listed in this Section III.E., and that all records furnished to the IRO are accurate and complete.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Access to Records and Documents It shall permit the Administrative Agent (or, if Independent Accountants are not engaged by the Collateral Manager or the Borrower, Protiviti, Inc. or another nationally recognized audit firm selected by the Administrative Agent with prior notice to the Borrower and subject to delivery of standard confidentiality agreements) to, upon reasonable advance notice and during normal business hours, but, so long as no Event of Default has occurred and is continuing, no more than one (1) time per calendar year, visit and inspect and make copies thereof at reasonable intervals (i) its books, records and accounts relating to its business, financial condition, operations, assets and its performance under the Facility Documents and the Related Documents and to discuss the foregoing with its and such Person’s officers, partners, employees and accountants, and (ii) all of its Related Documents, in each case as often as the Administrative Agent may reasonably request; provided that so long as no Event of Default has occurred and is continuing, the Borrower shall be responsible for all costs and expenses for only one such visit per fiscal year by the Administrative Agent or its respective designees; provided, further, that an officer or employee of the Collateral Manager shall have the opportunity to be present at any discussion between the Administrative Agent, any Lender or any other Person designated by the Administrative Agent, on the one hand, and the Collateral Manager’s accountants, on the other hand. The Administrative Agent shall provide two (2) Business Days’ prior notice to the Lenders of any such visit and any Lender shall be permitted to accompany the Administrative Agent in such visit. Any such visit and inspection shall be made simultaneously with any visit and inspection pursuant to Section 5.01(e).

  • Access to Records and Properties (a) From the date hereof until the Closing Date or earlier termination of this Agreement, Seller will, and will cause the Companies and their Subsidiaries to: (i) provide Purchaser and its officers, counsel and other representatives with reasonable access during normal business hours to the operations of the Companies and their Subsidiaries, their principal personnel and representatives, and such books and records pertaining to the Companies and their Subsidiaries as Purchaser may reasonably request, provided that (A) Purchaser agrees that such access will give due regard to minimizing interference with the operations, activities and employees of the Companies and their Subsidiaries, (B) such access and disclosure would not violate the terms of any agreement to which the Companies or any of their Subsidiaries is bound or any applicable Law and (C) all arrangements for access shall be made solely through Seller; and (ii) furnish to Purchaser or its representatives such additional financial and operating data and other information relating to the Companies and their Subsidiaries as may be reasonably requested, to the extent that such access and disclosure would not (A) violate the terms of any agreement to which the Companies or any of their Subsidiaries is bound or any applicable Law, or (B) cause significant competitive harm to the Companies or any of their Subsidiaries or their Affiliates if the transactions contemplated by this Agreement are not consummated. (b) From the date hereof until the Closing Date, Purchaser agrees that all information so received from Seller, the Companies and their Subsidiaries shall be deemed received pursuant to the Confidentiality Agreement and that each shall, and shall cause its Affiliates and each of its and their representatives to, comply with the provisions of the Confidentiality Agreement with respect to such information, and the provisions of the Confidentiality Agreement are hereby incorporated herein by reference with the same effect as if fully set forth in this Agreement.