For the control objective, the service provider's controls provide reasonable assurance that its facilities are
protected against unauthorized access, the service provider's controls in support of this objective might well include the following:
For example, a service provider may establish control objectives in respect of its business that relate to its procedures to ensure the confidentiality of information, the effectiveness of its change control procedures or its facilities being
protected against unauthorized access.
$ 0 Liability on Unauthorized Charges You're completely
protected against unauthorized charges on your account.
$ 0 liability for unauthorized charges You're completely
protected against unauthorized credit card charges on your account.
The card also comes with $ 0 fraud liability protection, so you are completely
protected against unauthorized use.
Also, the card offers a zero liability benefit to cardholders who want to be
protected against unauthorized charges.
They can view transactions, set spending limits and are
protected against unauthorized purchases.
Your account is
protected against unauthorized use as provided in this Agreement.
You are
protected against unauthorized online transactions as long as you check your statement and promptly notify us of any unauthorized activity.
Consumers that make purchases using their credit cards are
protected against unauthorized purchases.
Also, the card offers a zero liability benefit to cardholders who want to be
protected against unauthorized charges.
You're completely
protected against unauthorized charges on your account.
When you shop using your Orange County's Credit Union Mastercard credit card, you have peace of mind because you're
protected against unauthorized charges as long as: 1.
Furthermore, all of the customer data we collect is
protected against unauthorized access with the use of digital certificates.
PayPal allows you to shop without sharing any financial information, and is 100 %
protected against unauthorized payments.
Furthermore, all of the customer data we collect is
protected against unauthorized access.
We use commercially reasonable security measures designed to
protect against unauthorized access to Personal Information under our control, including physical, electronic and procedural safeguards.
Maggie Siff Online takes all measures reasonably necessary to
protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
Card is sheathed in electromagnetically opaque sleeve to
protect against unauthorized contact less access to stored information.
With security always foremost in mind, as FWHA has automated much of this information sharing it also has implemented strict safeguards to
protect against unauthorized or unintentional information exchange.
DRM
protects against unauthorized use or copying of an author's work.
‡ ‡ Zero Liability The Mastercard Zero Liability program
protects against unauthorized purchases.
See who's looking at your credit report to
protect against unauthorized hard inquiries that can damage your score.
This feature typically
protects you against any unauthorized transactions involving your credit card.
You are responsible for maintaining the secrecy of your password and
protecting against unauthorized use of your password.
You are solely responsible for maintaining the secrecy of your password and
protecting it against unauthorized use.
The RCHS uses generally accepted, industry - standard security systems, software and encryption technologies to
protect against unauthorized access to the RCHS servers, equipment, and other components of our online presence.
National Humane Society takes all measures reasonably necessary to
protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
Amateur Traveler takes all measures reasonably necessary to
protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
The Hilton Honors card comes with a chip technology, account alerts, a mobile app and access to your FICO score to help
protect you against unauthorized transactions and identity theft.
I also want a card that
protects against unauthorized charges in case of theft.
Twin Galaxies takes all measures reasonably necessary to
protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
Seattle Tiny Homes takes all measures reasonably necessary to
protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
We adopt appropriate data collection, storage and processing practices and security measures to
protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Properties and via 3rd party applications.
Surely Congress did not intend to condone such an intrusive and unwarranted invasion of privacy when it enacted the Wiretap Act «to
protect against the unauthorized interception of electronic communications.»
One of the main reasons a service provider looks at encryption as a control is to
protect against unauthorized physical access.
Protect against unauthorized access to or use of customer data that could cause substantial harm or inconvenience to any customer.
Breaching PIPEDA: Given the sensitivity of the information under VTech's control and the number of individuals affected, including children, the OPC found that VTech was required to have heightened safeguards in place to
protect against unauthorized access — but it didn't.
We safeguard our clients» social media presences,
protecting them against the unauthorized use of their marks.
«We remain vigilant in
protecting against unauthorized access and use top advisors and best practices on cybersecurity to maintain our effectiveness,» he told the E-Commerce Times.
Unlikely, so the search continues at Google and elsewhere on how to
protect against the unauthorized use of copyrighted content.
Locking down boot devices on client systems helps
protect against unauthorized installations by leveraging secure boot to allow only trusted devices.
H.R. 354
protects against any unauthorized duplication for commercial use.
Jason Fox Real Estate Marketing takes all measures reasonably necessary to
protect against the unauthorized access, use, alteration or destruction of potentially personally - identifying and personally - identifying information.
Not exact matches
Totem is billed as a tool to help photographers
protect their work
against unauthorized use and to connect clients in need of stock photos with images that suit their purposes.
Vision Critical has implemented commercially reasonable safeguards and precautions to
protect your personal information, including technical and organizational measures
against unauthorized access, improper use, alteration, unlawful or accidental destruction, and accidental loss.
To the extent permitted by law, we will disclose your information to government authorities or third parties if: (a) required to do so by law, or in response to a subpoena or court order; (b) we believe in our sole discretion that disclosure is reasonably necessary to
protect against fraud, to
protect the property or other rights of us or other users, third parties or the public at large; or (c) we believe that you have abused the Sites or the Applications by using them to attack other systems or to gain
unauthorized access to any other system, to engage in spamming or otherwise to violate applicable laws.
We may do so when: (1) permitted or required by law; or, (2) trying to
protect against or prevent actual or potential fraud or
unauthorized transactions; or, (3) investigating fraud which has already taken place.
We use appropriate security safeguards to
protect your personal information
against loss, theft, and
unauthorized access.
You agree to defend, indemnify, and hold harmless the Action Network Group and its affiliates and their officers, directors, employees, consultants, agents, licensors, and suppliers from and
against any and all claims, losses, expenses, liabilities, settlements, litigation, damages, and / or costs (including, but not limited to, fees, costs and other expenses of attorneys and expert witnesses) arising out of or related to: (i) your use of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any
unauthorized use of password
protected Materials or User Content utilizing your account information, whether or not known or authorized by you.