Security Alerts Sample Clauses

Security Alerts. If we, through Electronic Services, make the Alerts Services available and you use the Alerts Services, you acknowledge and agree that:
AutoNDA by SimpleDocs
Security Alerts. The Company does not guarantee to provide you with security alerts or any other alert, and the Company shall not be held liable for not providing any alerts. In no event will the Company be held responsible for any damages or losses which you may sustain as a result of compromise of your Log-In, Registration Details, or other Account information, other than due to the gross negligence of the Company.
Security Alerts. Online Security Alerts help you monitor and protect your Accounts from unauthorized access. Typical security alerts include notifying the customer via the requested method when a password has been changed, a computer browser is successfully registered for Online Banking, a User login is disabled or a User login is locked out, a new User is created, or security alert preferences are changed. Some of these Security Alerts may not be disabled by the User. Please review the full menu of available Security Alerts. In some circumstances, when we perceive that unusual behavior may be occurring in one or more of your Accounts and time is of the essence, we attempt to contact you immediately to verify the activity or transactions in question, using any communication channel that is available to us.
Security Alerts. Security Alerts help you monitor and protect your Accounts from unauthorized access. SouthState Bank automatically provides you with several Security Alerts, which you cannot disable. In addition, you can set up additional Security Alerts to further protect your Accounts. You can set up Security Alerts so that you are notified from time to time via SMS text message, email and/or phone call (the "delivery methods"). Security Alerts will also be delivered to your Online and Mobile Banking Message Center.
Security Alerts. Online Security Alerts help you monitor and protect your Accounts from unauthorized access. Typical security alerts include sending the customer via the requested method when an ACH Transaction or wire payment have been initiated and are out for review, a password has been changed, a computer browser is successfully registered for Online Banking, a user login is disabled or a user login is locked out, a new user is created, or security alert preferences are changed. Some of these Security Alerts may not be disabled by the user. Please review the full menu of available security alerts. In some circumstances, when we perceive that unusual behavior may be occurring in one or more of your Accounts and time is of the essence, we attempt to contact you immediately to verify the activity or transactions in question, using any communication channel that is available to us.
Security Alerts. Authorized Users may sign up for the AgileStacks security vulnerabilities list. AgileStacks will use this list to notify Authorized Users of urgent security vulnerabilities.
Security Alerts. The Service provides you with certain security alerts, for example, following certain changes made to your Accounts or Online Banking profile. For example, we will send you an alert following a change to your user name, password or email address. • We also provide alerts following certain activity or events relating to access and use of Online Banking or your Online Banking credentials such as a locked or unlocked access or invalid responses to challenge questions. • We automatically activate these alerts for you.
AutoNDA by SimpleDocs

Related to Security Alerts

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Security Audit Customer agrees that PROS’ Audit Report will be used to satisfy any audit or inspection requests by or on behalf of Customer, and PROS will make Audit Reports available to Customer upon request. PROS will promptly remediate any material weaknesses or significant control deficiencies identified in any Audit Reports. In the event that an audit opinion is qualified and the qualification has not been remediated by the date of the Audit Report, PROS shall (i) provide Customer with PROS remediation plan; and (ii) execute such plan in accordance with its terms.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Security Badging Any Company employee, or any employee of its contractors or agents, that require unescorted access to the Security Identification Display Area (SIDA) to perform work under this Agreement will be badged with an Airport identification badge (hereinafter referred to as "Badge") provided by Authority’s ID Badging Department and will be subject to an FBI fingerprint-based criminal history records check (CHRC) and an annual Security Threat Assessment (STA). A new or renewed Badge will not be issued to an individual until the results of the CHRC and the STA are completed and indicate that the applicant has not been convicted of a disqualifying criminal offense. If the CHRC or STA discloses a disqualifying criminal offense, the individual’s new or renewed badge application will be rejected. The costs of the CHRC and the annual STA will be paid by Company. These costs are subject to change without notice, and Company will be responsible for paying any increase in the costs. All badged employees of Company and its contractors or agents will comply with Authority's regulations regarding the use and display of Badges. Company will be assessed a fine for each Badge that is lost, stolen, unaccounted for or not returned to Authority at the time of Badge expiration, employee termination, termination of the Agreement, or upon written request by Authority. This fine will be paid by Company within 15 days from the date of invoice. The fine is subject to change without notice, and Company will be responsible for paying any increase in the fine. If any Company employee is terminated or leaves Company’s employment, Authority must be notified immediately, and the Badge must be returned to Authority promptly.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • Security Assessments Upon advance written notice by the JBE, Contractor agrees that the JBE shall have reasonable access to Contractor’s operational documentation, records, logs, and databases that relate to data security and the Contractor’s Information Security Program. Upon the JBE’s request, Contractor shall, at its expense, perform, or cause to have performed an assessment of Contractor’s compliance with its privacy and data security obligations. Contractor shall provide to the JBE the results, including any findings and recommendations made by Contractor’s assessors, of such assessment, and, at its expense, take any corrective actions.

  • Security Arrangements Infrastructure security of electric system equipment and operations and control hardware and software is essential to ensure day-to-day reliability and operational security. FERC expects the NYISO, the Connecting Transmission Owner, Market Participants, and Interconnection Customers interconnected to electric systems to comply with the recommendations offered by the President’s Critical Infrastructure Protection Board and, eventually, best practice recommendations from the electric reliability authority. All public utilities are expected to meet basic standards for system infrastructure and operational security, including physical, operational, and cyber-security practices.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

Time is Money Join Law Insider Premium to draft better contracts faster.