A TRUE COPY
<br /> CERTIFICATION 10fid LAST PAGE
<br /> J.R. SMITH, CLERK
<br /> 6. Access Devices;Security Procedures. well as with certain administrative functionality,and/or for
<br /> the creation of ACH and wire templates. Physical security
<br /> 6.1 Upon successful enrollment, Customer of each Token is Customer's sole responsibility. With the
<br /> can access the Services from Bank's designated website by Token, each Authorized User will receive a PIN number
<br /> using Customer's Computer or, as may be permitted by that the Authorized User must keep in a secure place.When
<br /> Bank from time to time in its sole discretion and in an Authorized User (or Administrator) leaves Customer's
<br /> accordance with Bank's terms and conditions for such employ,his or her Login ID must be deleted by Customer
<br /> access,using mobile or other Internet-enabled system(s)or (or by Bank upon Customer's request)and,if a Token had
<br /> device(s), along with the Services' security procedures as been issued to such Authorized User (or Administrator),
<br /> described from time to time. A company ID assigned to Bank must be promptly notified so that Bank may
<br /> Customer by Bank, a unique Login ID and an individual deactivate such Authorized User's (or Administrator's)
<br /> password will be used for log-in by Customer's Token. Any additional Authorized User requiring a Token
<br /> Administrator(s) and Authorized User(s). The must be authorized, in writing by Customer to Bank, for
<br /> Administrator(s) and Authorized User(s) must change his Token creation or re-creation and deployment. If
<br /> or her individual password from time to time for security applicable,fees may be assessed for additional Tokens.
<br /> purposes,as prompted by the Bank Internet System or more
<br /> frequently (subject to the additional security procedures 6.4 Customer further acknowledges and
<br /> described below). agrees that all wire transfers and ACH transactions initiated
<br /> through the Services require"dual control"or separation of
<br /> 6.2 Customer acknowledges that the duties.With this additional security feature,one Authorized
<br /> Administrator(s) will, and Customer authorizes the User will create, edit, cancel, delete and restore ACH
<br /> Administrator(s) to, select other Administrators and batches or wire transfer orders under his/her unique Login
<br /> Authorized Users by issuing to any person a unique Login ID, password and Token; a second different Authorized
<br /> ID and password (subject to the additional security User with his/her own unique Login ID, password and
<br /> procedures described below). Customer further Token will be required to approve, release or delete ACH
<br /> acknowledges that the Administrator(s)may,and Customer batches or wire transfer orders.
<br /> authorizes the Administrator(s) to, change or de-activate
<br /> the unique Login ID and/or password from time to time and 6.5 Customer accepts as its sole
<br /> in his or her sole discretion (subject to the additional responsibility the selection, use, protection and
<br /> security procedures described below). maintenance of confidentiality of,and access to,the Access
<br /> Devices. Customer agrees to take reasonable precautions
<br /> 6.3 Customer acknowledges that, in to safeguard the Access Devices and keep them
<br /> addition to the above individual passwords, access to the confidential. Customer agrees not to reveal the Access
<br /> Services includes,as part of the Access Devices,additional Devices to any unauthorized person. Customer further
<br /> security procedures,including as described below: agrees to notify Treasury Management Services Support
<br /> immediately at 1-866-475-7262 if Customer believes that
<br /> 6.3.1 Additional security the confidentiality of the Access Devices has been
<br /> procedures include a risk-based authentication security compromised in any manner.
<br /> procedure for Customer, including Customer's
<br /> Administrator and Authorized Users. This additional 6.6 The Access Devices identify and
<br /> security procedure involves an additional credential for authenticate Customer (including the Administrator and
<br /> each user that is in addition to Login IDs and individual Authorized Users)to Bank when Customer accesses or uses
<br /> password security (hereinafter "Enhanced Authentication the Services. Customer authorizes Bank to rely on the
<br /> Security," and/or "Enhanced Log-in Security'). With Access Devices to identify Customer when Customer
<br /> Enhanced Authentication Security, additional information accesses or uses any of the Services, and as signature
<br /> regarding each Authorized User's Computer and method of authorization for any Payment,transfer or other use of the
<br /> website access will be collected and validated Services. Customer acknowledges and agrees that Bank is
<br /> automatically with the set-up process. An electronic access authorized to act on any and all communications or
<br /> identity will be created for each Authorized User by instructions received using the Access Devices,where such
<br /> combining a number of key identification points,such as IP communications were provided to Bank in accordance with
<br /> address,Internet service provider,PC and browser settings, the security procedures and other terms as set forth in the
<br /> time of day and geographic location. These access Cash Management Master Agreement, regardless of
<br /> identities are used by Bank to authenticate Authorized whether the communications or instructions are authorized.
<br /> Users. Further authentication may occur automatically due Bank owns the Access Devices, and Customer may not
<br /> to the detection of unusual source occurrences in relation to transfer them to any other person or entity.
<br /> that access identity.
<br /> 6.3.2 An additional security 6.7 Customer acknowledges and agrees
<br /> procedure incorporates use of a physical security device or that the Access Devices and other security procedures
<br /> token("Token")for,by way of example only,initial log-in applicable to Customer's use of the Services and set forth
<br /> and/or certain transactional or administrative functionality. in this Appendix,as well as such security best practices as
<br /> A Token may be issued to any Authorized User(s), for described by Bank from time to time and made available on
<br /> example, for use in initiating and/or approving ACH the Bank Internet System, are a commercially reasonable
<br /> transactions and wire transfers,to log in to the Services,as method for the purpose of verifying whether any Payment,
<br /> HCk 4816-8814-0154 v 1 18 of 58 1016
<br />
|