Verification and Security Procedures Sample Clauses

Verification and Security Procedures. (a) X.X. Xxxxxx and the Customer shall comply with any applicable Security Procedures with respect to the delivery or authentication of Instructions and shall ensure that any codes, passwords or similar devices are reasonably safeguarded.
AutoNDA by SimpleDocs
Verification and Security Procedures. (a) Bank and Customer shall comply with any applicable Security Procedures with respect to the delivery or authentication of Instructions and shall ensure that any codes, passwords or similar devices are reasonably safeguarded.
Verification and Security Procedures. (a) Bank and Customer shall from time to time agree upon security procedures to be followed by Customer upon the issuance of an instruction and/or by Bank upon the receipt of an instruction, so as to enable Bank to verify that such instruction is authorized (“Security Procedures”). A Security Procedure may, without limitation, involve the use of algorithms, codes, passwords, encryption and telephone call backs. The Customer acknowledges that Security Procedures are designed to verify the authenticity of, and not detect errors in, instructions. For the avoidance of doubt, the parties agree that a SWIFT message issued in the name of the Customer through any third party utility agreed upon by the parties as being a method for providing Instructions and authenticated in accordance with that utility’s customary procedures, shall be deemed to be an authorised Instruction.
Verification and Security Procedures. (a) J.X. Xxxxxx and the Customer shall comply with any applicable Security Procedures to permit J.X. Xxxxxx to verify the authenticity of Instructions.
Verification and Security Procedures. (a) ABIS and the Fund shall comply with any applicable security procedures with respect to the delivery or authentication of Instructions and shall ensure that any codes, passwords or similar devices are reasonably safeguarded.
Verification and Security Procedures. All transactions by both parties (Originator and Beneficiary) are carried out through their respective banks. Appropriate verification and security procedures are the responsibility of each party and its bank.
Verification and Security Procedures. (a) JPMorgan and the Customer shall from time to time agree upon security procedures to be followed by the Customer upon the issuance of an Instruction and/or by JPMorgan upon the receipt of an Instruction, so as to enable JPMorgan to verify that such Instruction is authorized (“Security Procedures”). A Security Procedure may, without limitation, involve the use of algorithms, codes, passwords, encryption and telephone callbacks. The Customer acknowledges that Security Procedures are designed to verify the authenticity of, and not detect errors in, Instructions. The parties agree that a message issued in the name of the Customer through any third party utility agreed upon by the parties as being a method for providing Instructions and authenticated in accordance with that utility’s customary procedures, shall be deemed to be an authorized Instruction.
AutoNDA by SimpleDocs
Verification and Security Procedures. 3.3 Instructions Contrary To Applicable Law/Market Practice.
Verification and Security Procedures. (a) The Administrative Agent, the Trust and the Sponsor shall comply with any applicable Security Procedures with respect to the delivery or authentication of Instructions and shall ensure that any codes, passwords or similar devices are reasonably safeguarded.
Verification and Security Procedures. (a) Any Instructions delivered to Bank by telephone will promptly thereafter be confirmed in writing by an Authorized Person. Each confirmation is to be clearly marked “Confirmation.” Bank and Customer shall from time to time agree upon security procedures to be followed by Customer upon the issuance of an instruction and/or by Bank upon the receipt of an instruction, so as to enable Bank to verify that such instruction is authorized (“Security Procedures”). A Security Procedure may, without limitation, involve the use of algorithms, codes, passwords, encryption and telephone call backs. Customer acknowledges that Security Procedures are designed to verify the authenticity of, and not detect errors in, instructions. For the avoidance of doubt, the parties agree that a SWIFT message issued in the name of Customer through any third party utility agreed upon by the parties as being a method for providing Instructions and authenticated in accordance with that utility’s customary procedures, shall be deemed to be an authorized Instruction.
Time is Money Join Law Insider Premium to draft better contracts faster.