Unauthorized Users definition

Unauthorized Users means any individual or entity who accesses the Software in violation of the terms and conditions of this Agreement.
Unauthorized Users means individuals, who may include employees, contractors or agents of Participating Entity, who use equipment or a network within Participating Entity’s control, who accesses the Oregon Provider Directory without authority, including by use of any password, identifier or log-on received or obtained, directly or indirectly, lawfully or unlawfully.

Examples of Unauthorized Users in a sentence

  • The Organization shall exercise reasonable care to ensure no Unauthorized Users access the System.

  • You agree that we may comply with Transfer or Payment Instructions entered by any person using your User ID and Password, subject to the terms set forth more fully below in the Unauthorized Users section of this document.

  • The Subscriber shall take reasonable measures to prevent Unauthorized Users from accessing the Services and Documentation and from using the Password.

  • Licensee shall promptly inform Vendor of any and all Unauthorized Access (or suspected Unauthorized Access) and Unauthorized Users (or suspected Unauthorized Users) of which Licensee has knowledge or suspicion.

  • SUBSCRIBER is responsible for ensuring that its location or its terminal is not used by Unauthorized Users to access information from the Clerk’s subscriber site.

  • LICENSEE shall promptly inform QUMU of any and all Unauthorized Access (or suspected Unauthorized Access) and Unauthorized Users (or suspected Unauthorized Users) of which LICENSEE has knowledge or suspicion.

  • Section 2.02 Unauthorized Use: Licensee shall prevent Unauthorized Users from accessing the Product.

  • Licensee shall prohibit Unauthorized Users from accessing the Software and Documentation.

  • LICENSEE shall prevent Unauthorized Users from accessing Software.

  • You shall be responsible for all acts and omissions of: (i) Authorized Users, and (ii) all Unauthorized Users who access the Data Center by use of any password, identifier or log-on received or obtained, lawfully or unlawfully, from you or any Authorized User, with respect to the Servers and Client's Software.