Unauthorized access or use definition

Unauthorized access or use means the gaining of access to or use of "computer systems" by an unauthorized person or persons or the use of "computer systems" in an unauthorized manner".

Examples of Unauthorized access or use in a sentence

  • Unauthorized access or use may result in termination of your access, disciplinary action and/or civil or criminal penalties.

  • Unauthorized access or use of this computer system may subject violators to criminal, civil, and/or administrative action.

  • Unauthorized access or use may subject a user to administrative, civil, criminal, or other adverse action to the extent allowed by law.

  • Unauthorized access or use, by a third-party private key corresponding to the public key contained in the certificate.

  • Unauthorized access or use may subject violators to criminal, civil, and/or administrative action.

  • Using a statistically drawn sample, each month support mechanism disbursements are selected and reviewed to verify that payments were made at the correct amount in accordance with FCC rules.

  • Unauthorized access or use is prohibited and will be prosecuted to the fullest extent.

  • Unauthorized access or use of computer equipment, networks, software or data, including violation of the Tulane Computer Services policies.

  • Unauthorized access or use of the Account or the Platform must be immediately reported to the Company.

  • Unauthorized access or use may subject you to disciplinary action and criminal prosecution.

Related to Unauthorized access or use

  • Unauthorized Access means the entrance of a person into a restricted area without permission of the operator or the operator’s designated representative.

  • Unauthorized Use means either of the following:

  • Unauthorized Gas means (a) the quantity of gas taken by Customer exceeding the amount which is permitted during a Period of Interruption or (b) the difference (whether positive or negative) between the quantity of gas taken by Customer and the volumes provided for under an Operational Flow Order.

  • Unauthorized alien means an alien as defined in Section 1324a(h)(3) of Title 8 of the United States Code.

  • Unauthorized Third Party means any person or entity that, at the time of the Computer Fraud, is not an Authorized User.

  • Unauthorized disclosure or "unauthorized release" means any disclosure or release not permitted by federal or state statute or regulation, any lawful contract or written agreement, or that does not respond to a lawful order of a court or tribunal or other lawful order.

  • Unauthorized Code means any virus, Trojan horse, worm, or other software routines or hardware components designed to permit unauthorized access, to disable, erase, or otherwise harm Software, hardware or data.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit "A" or stated in the Service Agreement, or authorized under the statutes referred to herein by this DPA. Provider may use or disclose data to: 1190353v1

  • Authorized User means one named employee, contractor or agent of Customer (each identified by a unique email address) for whom Customer has purchased a subscription to the Subscription Services and who is authorized by Customer to access and use the Services under the rights granted to Customer pursuant to this Agreement.

  • Authorized Users(s) means an individual or individuals with a business need to access DSHS Confidential Information, and who has or have been authorized to do so.

  • Unauthorized signature means one made without actual, implied, or apparent authority and includes a forgery.

  • Authorized Users means employees or contractors of the Licensee who regularly work at Your Workplace who use the Software.

  • Unauthorized Removal means the Contractor’s removal of Key Personnel without the prior written consent of the State.

  • Unauthorized insurer means an insurance institution that has not been granted a certificate of authority by the commissioner to transact the business of insurance in this state."

  • Switched Access Service means an offering of facilities for the purpose of the origination or termination of traffic from or to Exchange Service customer in a given area pursuant to a Switched Access tariff. Switched Access Services include: Feature Group A, Feature Group B, Feature Group D, 800 Series, and 900 access. Switched Access does not include traffic exchanged between LECs for purpose of local exchange interconnection.

  • Customer Materials any materials, data, information, software, equipment or other resources owned by or licensed to You and made available to Us pursuant to facilitating Your use of the Services, including Customer Data.

  • Supplier Materials has the meaning set out in clause 8.1(g);

  • Specified Materials means the basic materials required on the Site for the execution and completion of Works, which shall include fuel and lubricants; cement; aggregates; steel reinforcement; timber and gravel.

  • Customer Proprietary Network Information (“CPNI”) is as defined in the Act.

  • Unauthorized person means any person who accesses government data without a work assignment that reasonably requires access, or regardless of the person's work assignment, for a purpose not described in the procedures required by section 13.05, subdivision 5.

  • Publicity Material means the promotional gifts, catalogues, pamphlets and all and any advertising and publicity material whatsoever which an Exhibitor wishes to display, distribute or use at the Exhibition.

  • Construction materials means any tangible personal property that will be

  • Authorized Third Party means an entity that:

  • Information processing system means an electronic system for creating, generating, sending, receiving, storing, displaying, or processing information.

  • User Information means User Compliance Information and User Financial Information.

  • Client Application means an application developed by Licensee that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.