Personalised security features Sample Clauses

Personalised security features. For the execution of banking transactions, the User must use the personalised security credentials and authentication instruments established with the Bank in order to prove his/her identity and to authorise orders. Each User can arrange which type of personalised security credentials and authentication instruments he/she is to use with the Bank. Personalised security credentials are those personalised elements that the Bank provides to the User for authentication purposes. The personalised security credentials, which may also be alphanumeric, are (hereinafter referred to as the “Security Credentials” and, individually, the “Security Credential”):
AutoNDA by SimpleDocs

Related to Personalised security features

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).

  • Particular Methods of Procurement of Goods and Works International Competitive Bidding. Goods and works shall be procured under contracts awarded on the basis of International Competitive Bidding.

  • RE-WEIGHING PRODUCT Deliveries are subject to re- weighing at the point of destination by the Authorized User. If shrinkage occurs which exceeds that normally allowable in the trade, the Authorized User shall have the option to require delivery of the difference in quantity or to reduce the payment accordingly. Such option shall be exercised in writing by the Authorized User.

  • Biological Samples If so specified in the Protocol, Institution and Principal Investigator may collect and provide to Sponsor or its designee Biological Samples (“Biological Samples”). 12.2.

  • Compiler’s note On October 1, 2005 the following amendments were made to Section 305:

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Placement of RDDS probes Probes for measuring RDDS parameters shall be placed inside the networks with the most users across the different geographic regions; care shall be taken not to deploy probes behind high propagation-­‐delay links, such as satellite links.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Use of artificial intelligence or data analytics You acknowledge that we may use artificial intelligence or data analytics (i.e. technologies that assist or replace human decision-making) whilst providing products and services to you, for purposes including but not limited to risk assessment, statistical, trend analysis and planning; and to make decisions, provide, operate, process and administer your accounts and services with us.

Time is Money Join Law Insider Premium to draft better contracts faster.