My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Reso 2014-2242
SIBFL
>
City Clerk
>
Resolutions
>
Regular
>
2014
>
Reso 2014-2242
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/8/2015 2:50:14 PM
Creation date
7/7/2014 2:49:14 PM
Metadata
Fields
Template:
CityClerk-Resolutions
Resolution Type
Resolution
Resolution Number
2014-2242
Date (mm/dd/yyyy)
06/19/2014
Description
Awd Bid 14-04-02 & Nego. Agmt w/TD Bank, for Banking Srvs
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
77
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
provide the Administrator(s) initially designated by <br />Customer with an initial individual password to gain access <br />to the Services. The Administrator(s) and Authorized <br />User(s) must change his or her individual password from <br />time to time for security purposes, as prompted by the Bank <br />Internet System or more frequently. <br />6.2 Customer acknowledges that the <br />Administrator(s) will, and Customer authorizes the <br />Administrator(s) to, select other Administrators and <br />Authorized Users by issuing to any person a unique Login <br />ID and password. Customer further acknowledges that the <br />Administrator(s) may, and Customer authorizes the <br />Administrator(s) to, change or de- activate the unique Login <br />ID and /or password from tune to time and in his or her sole <br />discretion. <br />6.3 Customer acknowledges that, in <br />addition to the above individual passwords, access to the <br />Services includes, as part of the Access Devices, a risk - <br />based authentication security procedure at log -in for <br />Customer. including Customer's Administrator and <br />Authorized Users. This additional security procedure <br />involves an additional credential for cacti user that is in <br />addition to Login IDs and individual password security <br />(hereinafter " Fnhanced Log -in Security "). With Enhanced <br />Log -in Security, additional information regarding each <br />Authorized Uscr's computer and method of website access <br />will be collected and validated automatically with the set- <br />up process. An electronic access identity will be created for <br />cacti Authorized User by combining a number of key <br />identification points, such as 11' address, Internet service <br />provider. PC and browser settings, time of day and <br />geographic location. These access identities are used by <br />Bank to authenticate Authorized Users. Further <br />authentication may occur automatically due to the detection <br />of unusual source occurrences in relation to that access <br />identity. An additional security procedure incorporates use <br />of a physical security device or token ("Token ") for certain <br />transactional functionality associated with ACT <br />transactions and wire transfers. A Token will be issued to <br />any Authorized Uscr(s), for example, for use in initiating <br />and /or approving ACFI transactions and wire transfers. <br />Notwithstanding the foregoing, Bank reserves the right to <br />incorporate the use of Tokcns for certain other functionality <br />from time to time, in its sole discretion, including by way <br />of example only and not by way of limitation, the use of <br />Tokens with certain administrative functionality and for the <br />creation of ACII and wire templates. Physical security of <br />each "Token is Customer's sole responsibility. With the <br />Token, cacti Authorized User will receive a PIN number <br />that the Authorized User must keep in a secure place. When <br />an Authorized User leaves Customer's employ, his or her <br />Login 11) must be deleted and. if a Token had been issued <br />to such Authorized User, Bank must be promptly notified <br />so that Bank may deactivate such Authorized User's <br />Token. Any additional Authorized User requiring a Token <br />must be authorized. in writing by Customer to Bank, for <br />Token creation or rc- creation and deployment. It- <br />applicable. ices may be assessed for additional Tokens. <br />6.4 Customer further acknowledges and <br />agrees that all wire transfers and ACII transactions initiated <br />through the Services incorporate "dual control" or <br />separation of duties. With this additional security feature. <br />one Authorized User will be permitted to create. edit. <br />cancel. delete and restore ACT batches or wire transfer <br />orders under his /her unique Login ID. password and Token: <br />a second dillerenl Authorized User with his /her own unique <br />Login ID. password and Token will be required to approve. <br />release or delete ACII batches or wire transfer orders. <br />6.5 Customer accepts as its sole <br />responsibility the selection, use. protection and <br />maintenance of confidentiality of and access to. the Access <br />Devices. Customer agrees to take reasonable precautions <br />to safeguard the Access Devices and keep them <br />confidential. Customer agrees not to reveal the Access <br />Devices to any unauthorized person. Customer further <br />agrees to notify Cash Management Customer Care <br />immediately at 1 -866- 475 -7262 if Customer believes that <br />the confidentiality of the Access Devices has been <br />compromised in any manner. <br />6.6 The Access Devices identify and <br />authenticate Customer (including the Administrator and <br />Authorized Users) to Bank when Customer accesses or uses <br />the Services. Customer authorizes Bank to rely on the <br />Access Devices to identify Customer when Customer <br />accesses or uses any of the Services, and as signature <br />authorization for any Payment, transfer or other use of the <br />Services. Customer acknowledges and agrees that Bank is <br />authorized to act on any and all communications or <br />instructions received using the Access Devices. regardless <br />of whether the communications or instructions are <br />authorized. Bank owns the Access Devices, and Customer <br />may not transfer them to any other person or entity. <br />6.7 Customer acknowledges and agrees <br />that the Access Devices and other security procedures <br />applicable to Customer's use of the Services and set forth <br />in this Appendix. as well as such security best practices as <br />described by Bank from time to time and made available on <br />the Bank Internet System, arc a commercially reasonable <br />method for the purpose of verifying whether any Payment. <br />transfer or other use of the Services was initiated by <br />Customer. Customer also agrees that any election <br />Customer may make to change or waive any optional <br />security procedures recommended by Bank is at <br />Customer's risk and that any loss resulting in whole or in <br />part from such change or waiver will be Customer's <br />responsibility. Customer further acknowledges and agrees <br />that the Access Devices are not intended, and that it is <br />commercially reasonable that the Access Devices are not <br />intended. to detect any errors relating to or arising out of a <br />Payment. transfer or any other use of the Services. <br />6.8 If Customer has reason to believe that <br />any Access Devices have been lost, stolen or used (or may <br />be used) or that a Payment or other use of the Services has <br />been or may be made with any Access Devices without <br />Customer's permission. Customer must contact its <br />Administrator and Bank. In no event will Bank be liable <br />I'm- any unauthorized transaction(s) that occurs with any <br />Access Devices. <br />112ol l <br />
The URL can be used to link to this page
Your browser does not support the video tag.