Protected User definition

Protected User means any person who is a CKT Actual Filer, a Tax Intent User, or a Credit Karma New Member.
Protected User is defined in section 6;
Protected User means any existing user or lessee of the Property shown on Exhibit B attached hereto. Xxxxxx agrees to immediately cure any such RF interference caused to a protected User by Xxxxxx’s equipment or, if such RF interference cannot be immediately be cured, to temporarily reduce power or cease the offending operations, if so demanded by Xxxxxx on the ground of RF interference, until a cure at full power is achieved.

Examples of Protected User in a sentence

  • Thus in the process of translation, he or she must adapt to the translational eco-environment including original work, readers, publishers, patrons, mainstream poetics, and ideology and make corresponding textual and translation strategy choices (Hu Weihua, and Guo Jirong, 2017).

  • If you do not tell us promptly and in any event within 14 days (or 13 months in the case of a Protected User) after the date the payment was debited, you will not be entitled to have any errors corrected or amounts refunded.

  • Correspondence concerning this article should be addressed to Laura Jaffee, Department of Educational Studies, Colgate University, Hamilton, NY 13346, United States.

  • Proposed Rule 41.4 (Drones, and Electronic Communications Privacy Act (Searches of Protected User Information))(2016-05) Rebecca Turner was scheduled to provide a briefing to the Committee on the impact of the decision in Carpenter v.

  • Suitable courses will be provided for staff together with support in the workplace.

  • An attacker may physically modify the Memory Flash in order to achieve the following:• Modify Protected User Data stored in the TOE;• Modify TSF Data stored in the TOE;• Modify the security mechanisms of the TOE (provided by TSF logic) to enable attacks disclosing or manipulating Protected User Data and TSF Data.

  • Employees are not required to obtain assistance from a supervisor or other person prior to filing a SCAR.

  • SCEC may resign as escrow agent or Licensor may remove SCEC as escrow agent by giving 30 days prior written notice to the other party and to each Protected User.

  • No payments will be made until you have agreed to the terms and conditions in the funding agreement.Payment will be made in tranches to be negotiated on a case-by-case basis and will be based upon the goals and Key Performance Indicators (KPI) indicated in your application.Boost Funding is discretionary, and all decisions are final.

  • Each Protected User further agrees not to copy or otherwise make available the Materials to any third party except as may be required to enable Protected User to obtain maintenance for the Software.


More Definitions of Protected User

Protected User means any existing user or lessee of the Property shown on Exhibit B attached hereto. Lessee agrees to immediately cure any such RF interference caused to a protected User by Lessee’s equipment or, if such RF interference cannot be immediately be cured, to temporarily reduce power or cease the offending operations, if so demanded by Lessor on the ground of RF interference, until a cure at full power is achieved.

Related to Protected User

  • Protected Data means Student Data and/or Teacher or Principal Data, to the extent applicable to the product or service actually being provided to the District by Vendor pursuant to the Master Agreement.

  • Protected Information means PHI provided by CE to BA or created, maintained, received or transmitted by BA on CE’s behalf.

  • protected area means an area that is or has to be listed in the register referred to in section 10 of the Protected Areas Act;

  • Protected tenant means a tenant who has obtained a court order.

  • Protected Disclosure means any communication made in good faith that discloses or demonstrates information that may evidence unethical or improper activity.

  • Proprietary Information shall have the same meaning as Confidential Information.

  • Confidential and Proprietary Information means any information that is classified as confidential in the Firm’s Global Policy on Confidential Information or that may have intrinsic value to the Firm, the Firm’s clients or other parties with which the Firm has a relationship, or that may provide the Firm with a competitive advantage, including, without limitation, any trade secrets; inventions (whether or not patentable); formulas; flow charts; computer programs; access codes or other systems information; algorithms; technology and business processes; business, product or marketing plans; sales and other forecasts; financial information; client lists or other intellectual property; information relating to compensation and benefits; and public information that becomes proprietary as a result of the Firm’s compilation of that information for use in its business, provided that such Confidential and Proprietary Information does not include any information which is available for use by the general public or is generally available for use within the relevant business or industry other than as a result of your action. Confidential and Proprietary Information may be in any medium or form, including, without limitation, physical documents, computer files or discs, electronic communications, videotapes, audiotapes, and oral communications.

  • protected variety means any variety that is the subject of a breeder’s right;

  • Protected Territory means the United States of America.

  • Confidential Information has the meaning set forth in Section 6.1.

  • Designated User means any person(s) that you authorise as users of your Broadband service.

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Confidential Information Breach means, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Protected Customers means any Person to whom the Company has sold its products or services or solicited to sell its products or services during the twelve (12) months prior to the Determination Date.

  • Licensed User means an employee, contractor or agent of Client who is authorized by Client to access and use the Licensed Software, to whom a password and user ID has been issued by Client and whose access to the Licensed Software has not been terminated, suspended or surrendered.

  • Customer's Confidential Information means all Personal Data and any information, however it is conveyed, that relates to the business, affairs, developments, trade secrets, know-how, personnel, and suppliers of the Customer, including all IPRs, together with all information derived from any of the above, and any other information clearly designated as being confidential (whether or not it is marked "confidential") or which ought reasonably be considered to be confidential;

  • Proprietary Information and Technology means any and all of the following: works of authorship, computer programs, source code and executable code, whether embodied in software, firmware or otherwise, assemblers, applets, compilers, user interfaces, application programming interfaces, protocols, architectures, documentation, annotations, comments, designs, files, records, schematics, test methodologies, test vectors, emulation and simulation tools and reports, hardware development tools, models, tooling, prototypes, breadboards and other devices, data, data structures, databases, data compilations and collections, inventions (whether or not patentable), invention disclosures, discoveries, improvements, technology, proprietary and confidential ideas and information, know-how and information maintained as trade secrets, tools, concepts, techniques, methods, processes, formulae, patterns, algorithms and specifications, customer lists and supplier lists and any and all instantiations or embodiments of the foregoing or any Intellectual Property Rights in any form and embodied in any media.

  • Proprietary Data means Data embodying trade secrets developed at private expense or commercial or financial information that is privileged or confidential, and that includes a restrictive notice, unless the Data is:

  • Company Confidential Information means information (including any and all combinations of individual items of information) that the Company has or will develop, acquire, create, compile, discover or own, that has value in or to the Company’s business which is not generally known and which the Company wishes to maintain as confidential. Company Confidential Information includes both information disclosed by the Company to me, and information developed or learned by me during the course of my employment with the Company. Company Confidential Information also includes all information of which the unauthorized disclosure could be detrimental to the interests of the Company, whether or not such information is identified as Company Confidential Information. By example, and without limitation, Company Confidential Information includes any and all non-public information that relates to the actual or anticipated business and/or products, research or development of the Company, or to the Company’s technical data, trade secrets, or know-how, including, but not limited to, research, product plans, or other information regarding the Company’s products or services and markets therefor, customer lists and customers (including, but not limited to, customers of the Company on which I called or with which I may become acquainted during the term of my employment), software, developments, inventions, discoveries, ideas, processes, formulas, technology, designs, drawings, engineering, hardware configuration information, marketing, finances, and other business information disclosed by the Company either directly or indirectly in writing, orally or by drawings or inspection of premises, parts, equipment, or other Company property. Notwithstanding the foregoing, Company Confidential Information shall not include any such information which I can establish (i) was publicly known or made generally available prior to the time of disclosure by the Company to me; (ii) becomes publicly known or made generally available after disclosure by the Company to me through no wrongful action or omission by me; or (iii) is in my rightful possession, without confidentiality obligations, at the time of disclosure by the Company as shown by my then-contemporaneous written records; provided that any combination of individual items of information shall not be deemed to be within any of the foregoing exceptions merely because one or more of the individual items are within such exception, unless the combination as a whole is within such exception. I understand that nothing in this Agreement is intended to limit employees’ rights to discuss the terms, wages, and working conditions of their employment, as protected by applicable law.

  • Supplier's Confidential Information means any information, however it is conveyed, that relates to the business, affairs, developments, trade secrets, Know-How, personnel and suppliers of the Supplier, including IPRs, together with information derived from the above, and any other information clearly designated as being confidential (whether or not it is marked as "confidential") or which ought reasonably to be considered to be confidential;

  • Protected Health Information or “PHI” shall have the same meaning as the term “protected health information” in 45 C.F.R. § 160.103, and includes electronic PHI, as defined in 45 C.F.R. 160.103, limited to information created, maintained, transmitted or received by the Business Associate from or on behalf of the Covered Entity or from another Business Associate of the Covered Entity.

  • Named User means a named individual authorized to use the Software (or any portion thereof) regardless of whether the individual is actively using the Software at any given time; a non-human operated device will be counted as one or multiple Named User(s) (depending on the nature of operation) in addition to all individuals authorized to use the Software; and “Permitted Users“ means Named Users, concurrent Users or other types of Users being authorized to use the Software, as set forth in the applicable Notification Form.

  • Customer Confidential Information means any information or compilation of information, not generally known, which is provided to the Employer by its customers or potential customers, is proprietary to the customer or potential customer and relates to the customer’s or potential customer’s existing or reasonably foreseeable business. Information provided to the Employer by a customer or potential customer shall be treated as Customer Confidential Information.

  • Protected Customer means any Person to whom the Company Group has sold its products or services or actively solicited to sell its products or services.

  • Proprietary and Confidential Information means trade secrets, confidential knowledge, data or any other proprietary or confidential information of the Company or any of its affiliates, or of any customers, members, employees or directors of any of such entities, but shall not include any information that (i) was publicly known and made generally available in the public domain prior to the time of disclosure to Executive by the Company or (ii) becomes publicly known and made generally available after disclosure to Executive by the Company other than as a result of a disclosure by Executive in violation of this Agreement. By way of illustration but not limitation, “Proprietary and Confidential Information” includes: (i) trade secrets, documents, memoranda, reports, files, correspondence, lists and other written and graphic records affecting or relating to any such entity’s business; (ii) confidential marketing information including without limitation marketing strategies, customer and client names and requirements, services, prices, margins and costs; (iii) confidential financial information; (iv) personnel information (including without limitation employee compensation); and (v) other confidential business information.

  • Named Users means designated individual users authorized by Customer to access or use Smart Configure, Price, Quote.