Glossary Sample Clauses

Glossary. When a defined term is used, it will be italicized.
AutoNDA by SimpleDocs
Glossary. For purposes of this Agreement, the following terms shall have the meanings specified in this Section:
Glossary. A4.1 A "Commercial Transaction" payment involves buying and selling goods and services, making any other commercial transaction or receiving payments when you “request money” using PayPal.
Glossary. When a defined term is used in this agreement, it will be italicized.
Glossary. Agent: means any person who has been delegated the authority to obligate or act on behalf of a Provider Entity.
Glossary. For purposes of this Agreement, the following terms shall be defined as follows:
Glossary. Term Definition Computer Virus A Computer Virus is a self-replicating computer program that alters the way a computer operates, without the knowledge of the user. A true virus replicates and executes itself. While viruses can be destructive by destroying data, for example, some viruses are benign or merely annoying. Confidential Very sensitive information. Disclosure could adversely impact your company. Encryption Encryption is the process of obscuring information to make it unreadable without special knowledge. Firewall In computer science, a Firewall is a piece of hardware and/or software which functions in a networked environment to prevent unauthorized external access and some communications forbidden by the security policy, analogous to the function of Firewalls in building construction. The ultimate goal is to provide controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle. Information Lifecycle (Or Data Lifecycle) is a management program that considers the value of the information being stored over a period of time, the cost of its storage, its need for availability for use by authorized users, and the period of time for which it must be retained. IP Address A unique number that devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP). Any All participating network devices - including routers, computers, time- servers, printers, Internet fax machines, and some telephones - must have its own unique IP address. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network. It is important to keep your IP address secure as hackers can gain control of your devices and possibly launch an attack on other devices. Peer-to-Peer A type of communication found in a system that uses layered protocols. Peer-to-Peer networking is the protocol often used for reproducing and distributing music without permission. Router A Router is a computer networking device that forwards data packets across a network via routing. A Router acts as a junction between two or more networks transferring data packets. Spyware Spyware refers to a broad category of malicious software designed to intercept or take partial control of a computer's operation without the consent of tha...
Glossary. The following terms shall have the meanings indicated below: