Laserfiche WebLink
A T RUIE Cory <br /> CERTIFICATIOIN CN LAST PACE <br /> J.R. SMITH, CLERK <br /> 8.2 Customer acknowledges that authorized by Customer, including any fraudulent <br /> Administrator(s) will, and Customer authorizes transmission by Customer's employees or agents.Customer <br /> Administrator(s) to, select other Administrators and agrees that any election Customer may make to change or <br /> Authorized Users by issuing to any person an individual waive any optional security procedures recommended by <br /> password. Customer further acknowledges that Bank is at Customer's risk and that any loss resulting in <br /> Administrator(s) may, and Customer authorizes whole or in part from such change or waiver will be <br /> Administrator(s) to, change or de-activate the individual Customer's responsibility. Customer further acknowledges <br /> password and/or any individual password from time to time and agrees that the Access Devices are not intended, and <br /> and in his or her sole discretion. that it is commercially reasonable that the Access Devices <br /> are not intended,to detect any errors relating to or arising <br /> 8.3 Customer acknowledges that, in out of a transaction, transfer or any other use of the <br /> addition to the above individual passwords, access to the Services. <br /> Services includes, as part of the Access Devices, a multi- <br /> factor authentication security procedure at log-in for <br /> Customer, including Administrator(s) and Authorized 8.8 If Customer has reason to believe that <br /> Users. This additional security procedure involves an any Access Devices have been lost, stolen or used(or may <br /> additional access code and Computer registration that is in be used) or that a transaction, transfer or other use of the <br /> addition to User ID and individual password security Services has been or may be made with any Access <br /> (hereinafter"Enhanced Log-in Security'). Devices without Customer's permission, Customer must <br /> contact its Administrator. Customer also agrees to provide <br /> 8.4 Bank does recommend as a Bank with immediate notice of any actual or suspected <br /> commercially reasonable security procedure that Customer breach in the security of or other unauthorized access to the <br /> implement dual control of the Services, whereby one Services through use of Customer's Computer. Such notice <br /> Authorized User creates,edits,cancels,deletes and restores shall include a description of the incident in general terms; <br /> an Electronic File,and a second different Authorized User a description of the type of information or data related <br /> reviews the Electronic File prior to it being released. thereto that was the subject of unauthorized access or use;a <br /> description of what Customer has done to protect the <br /> 8.5 Customer accepts as its sole information or data from further unauthorized access;and a <br /> responsibility the selection, use, protection and telephone number or other contact information so that Bank <br /> maintenance of confidentiality of,and access to,the Access can call for finther information or inquiry. In no event will <br /> Devices. Customer agrees to take reasonable precautions Bank be liable for any unauthorized transaction(s) that <br /> to safeguard the Access Devices and keep them occurs with any Access Devices. <br /> confidential. Customer agrees not to reveal the Access <br /> Devices to any unauthorized person. Customer further 9. Limitation of Liability. In addition to but not in <br /> agrees to notify Bank immediately if Customer believes lieu of the limitations of liability and related provisions <br /> that the confidentiality of the Access Devices has been contained in the parties' Cash Management Master <br /> compromised in any manner. Agreement, Bank shall have no liability for any error or <br /> delay in performing the Services and shall have no liability <br /> 8.6 The Access Devices identify and for not affecting a Check Image,if. <br /> authenticate Customer (including Administrator(s) and <br /> Authorized Users)to Bank when Customer accesses or uses (i) Bank receives actual notice or has <br /> the Services. Customer authorizes Bank to rely on the reason to believe that Customer has filed or commenced a <br /> Access Devices to identify Customer when Customer petition or proceeding for relief under any bankruptcy or <br /> accesses or uses any of the Services, and as signature similar law; <br /> authorization for any transaction, transfer or other use of <br /> the Services. Customer acknowledges and agrees that (ii) The ownership of funds involving a <br /> Bank is authorized to act on any and all communications or Check Image or Customer's authorized representative's <br /> instructions received using the Access Devices, regardless authority to transmit a Check Image is in question; <br /> of whether the communications or instructions are <br /> authorized. Bank owns the Access Devices,and Customer (iii) Bank suspects a breach of the security <br /> may not transfer them to any other person or entity. If this procedures; <br /> Appendix is terminated, Customer's access to the Services <br /> will be immediately terminated. (iv) Bank suspects that Customer's Account <br /> has been used for illegal or fraudulent oses•or <br /> 8.7 Customer acknowledges and agrees PmP <br /> that the Access Devices and other security procedures (v) Bank reasonably believes that a Check <br /> applicable to Customer's use of the Services are a Image is prohibited by federal law or regulation, or <br /> commercially reasonable method for the purpose of otherwise so provided in the Appendix. <br /> verifyingwhether an transaction transfer r <br /> Y o other use of <br /> the Services was initiated by Customer.Customer agrees to Further, Bank will not be liable to Customer for any <br /> be responsible for any transmission Bank receives throughunauthorized actions or fraud initiated or caused b <br /> Y <br /> the Services that is processed by Bank in accordance with Customer or its employees or agents. Bank will also be <br /> the security procedures, even if such transmission is not excused from failing to transmit or delay in transmitting a <br /> XC 481"754-1549 45 of 58 022016 <br />