Your Internal Security Sample Clauses

Your Internal Security. (non-consumer customers only). You bear sole responsibility for establishing, maintaining, implementing and updating policies, procedures, equipment and software (“Internal Security Controls”) that ensure the security and integrity of your computer systems, Mobile Devices and information, protect them from any unauthorized use, intrusion, takeover or theft, and prevent your Access Credentials from any unauthorized discovery or use (collectively “Internal Security Breaches”). You bear all risk of fraudulent transfers and other losses or disclosures arising from your Internal Security Breaches or from the interception of your communications prior to their receipt by us (collectively “Internal Security Losses”). We will not reimburse your Internal Security Losses. You are encouraged to consider purchasing insurance to cover your Internal Security Losses. To help protect your system from Internal Security Breaches, your Internal Security Controls program should consider including: • Verifying all instructions from your payees (e.g., ensure new or changed payment addresses were not communicated by an imposter); • Limiting and controlling who has access to your computer systems and Mobile Devices; • Protecting and frequently changing your Access Credentials; • Adopting dual authorization and/or transaction-based authentication procedures for financial transfers; • Employing up-to-date security software such as anti-virus, anti-malware and anti-spyware programs, as well as up-to-date software patches for all your software programs, internet browsers, e-mail programs, and the like (such as IBM® Trusteer RapportTM software); • Prohibiting the disabling or modification the security features of any software or hardware (e.g., “jailbreaking” of mobile devices); and prohibiting the use of “burner” mobile devices. • Using effective, up-to-date firewalls; • Procedures to avoid infection by malware and malicious code, such as: controlling what software and applications are downloaded to your computers and Mobile Devices; controlling what websites are visited by your computers and Mobile Devices; controlling the connection of other devices (e.g., flash drives) to your computers and Mobile Devices; controlling what documents, e-mail attachments, programs and other files are opened or installed on your computers and Mobile Devices; and limiting which of your computers and Mobile Devices are used for Digital Banking or other financial matters; • Reconciling all accounts on a ...
AutoNDA by SimpleDocs
Your Internal Security. You bear sole responsibility for establishing, maintaining, implementing and updating policies, procedures, equipment and software (“Internal Security Controls”) that ensure the security and integrity of your processes, equipment (including telecommunications and computer systems) and information, protect them from any unauthorized use, intrusion, takeover or theft, and prevent your Access Credentials from any unauthorized discovery or use (collectively “Internal Security Breaches”). You bear all risk of fraudulent transfers and other losses or disclosures arising from your Internal Security Breaches or from the interception of your communications prior to their receipt by us (collectively “Internal Security Losses”). We will not reimburse your Internal Security Losses. You agree that we are authorized to execute, and it is commercially reasonable for us to execute, any instruction received by us and authenticated by your Access Credentials. You are encouraged to consider purchasing insurance to cover your Internal Security Losses. To protect your system from Internal Security Breaches, your Internal Security Controls should consider including:
Your Internal Security. You agree to establish, implement, maintain and update (as appropriate) policies, procedures, equipment and software (“Internal Security Controls”) that, with respect to the initiation, processing and storage of ACH, wire and other transactions, will: (a) protect the confidentiality and integrity of non-public personal information, including financial information, of a natural person used to create or contained within an ACH or other Order and any related addenda record (“Protected Information”) until its destruction, (b) protect against anticipated threats or hazards to the security or integrity of Protected Information until its destruction, (c) protect against unauthorized use of Protected Information that could result in harm to a natural person, and (d) comply with all applicable regulatory guidelines on access to and security for the systems you use to initiate, process, and store ACH, wire and other transactions. Your Internal Security Controls must also safeguard the security and integrity of your computer system and information from unauthorized use, intrusion, takeover or theft, and prevent your Password from unauthorized discovery or use (collectively “Internal Security Breaches”). You bear all risk of fraudulent transfers and other losses arising from your Internal Security Breaches or from the interception of your communications prior to their receipt by us (collectively “Internal Security Losses”). We will not reimburse you in connection with Internal Security Losses. You agree that we are authorized to execute, and it is commercially reasonable for us to execute, any instruction received by us with your Password. You are encouraged to consider purchasing insurance to cover your Internal Security Losses. To protect your system from Internal Security Breaches, your Internal Security Controls should consider including:

Related to Your Internal Security

  • NATIONAL SECURITY Nothing in this Agreement shall be construed:

  • Additional Security This guarantee is in addition to and is not in any way prejudiced by any other guarantee or security now or subsequently held by any Finance Party.

  • Organizational Security 2.1.1 It is the mutual intention of the parties that the provisions of this Article protect the rights of individual workers without restricting CSEA’s rights.

  • Provision of Interconnection Financial Security The Interconnection Customer is obligated to provide all necessary Interconnection Financial Security required under Section 11 of the GIDAP in a manner acceptable under Section 11 of the GIDAP. Failure by the Interconnection Customer to timely satisfy the GIDAP’s requirements for the provision of Interconnection Financial Security shall be deemed a breach of this Agreement and a condition of Default of this Agreement.

  • Additional security requirements The following provisions apply in respect of any Additional Security provided:

  • INTERNAL MAIL 1. The Association shall have reasonable access to inter-school mail.

  • Conversion of Live Telephone Exchange Service to Analog 2W Loops The following coordination procedures shall apply to “live” cutovers of VERIZON Customers who are converting their Telephone Exchange Services to SPRINT Telephone Exchange Services provisioned over Analog 2W unbundled Local Loops (“Analog 2W Loops”) to be provided by VERIZON to SPRINT.

  • ISSUE OF GLOBAL NOTES 3.1 Subject to subclause 3.4, following receipt of a faxed copy of the applicable Final Terms signed by the Issuer, the Issuer authorises the Agent and the Agent agrees, to take the steps required of the Agent in the Procedures Memorandum.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Financial Security 5.4.1. To provide financial security the Company is entitled to request from the Client a confirmation of the verification of personal data submitted at the registration of a trading account. For this purpose the Company may at any moment ask the Client to submit a copy of a passport or other equivalent document, certified by a notary (at Company’s discretion).

Time is Money Join Law Insider Premium to draft better contracts faster.