Unauthorized Code means any virus, Trojan horse, worm, or other software routines or hardware components designed to permit unauthorized access, to disable, erase, or otherwise harm Software, hardware or data.
Unauthorized signature means one made without actual, implied, or apparent authority and includes a forgery.
Unauthorized alien means an alien as defined in Section 1324a(h)(3) of Title 8 of the United States Code.
Unauthorized Use means either of the following:
Unauthorized Disclosure means disclosure by the Executive without the prior written consent of the Board to any person other than a person to whom disclosure is reasonably necessary or appropriate in connection with the performance by the Executive of duties as an executive of the Company or as may be legally required, of any information relating to the business or prospects of the Company (including, but not limited to, any confidential information with respect to any of the Company's customers, products, methods of distribution, strategies, business and marketing plans and business policies and practices); provided, however, that such term shall not include the use or disclosure by the Executive, without consent, of any information known generally to the public (other than as a result of disclosure by the Executive in violation of this Section 12(a)). This confidentiality covenant has no temporal, geographical or territorial restriction.
Unauthorized Access means the gaining of access to a “Computer System” by an unauthorized person or an authorized person in an unauthorized manner.
Unauthorized Third Party means any person or entity that, at the time of the Computer Fraud, is not an Authorized User.
Unauthorized person means any person who is not (i) an officer or director of the Company, or (ii) an employee, officer or director of a Subsidiary or Affiliate of the Company for whom the disclosure of the knowledge or information referred to herein is necessary for his performance of his assigned duties, or (iii) a person expressly authorized by the Company to receive disclosure of such knowledge or information. The Company expressly acknowledges and agrees that the term "Confidential Information" excludes information which is (A) in the public domain or otherwise generally known to the trade, or (B) disclosed to third parties other than by reason of the Employee's breach of his confidentiality obligation hereunder or (C) learned of by the Employee subsequent to the termination of his employment hereunder from any other party not then under an obligation of confidentiality to the Company, its Subsidiaries and their Affiliates. Further, the Employee covenants to the Company that in the Employee's performance of his duties hereunder, the Employee will violate no confidentiality obligations he may have to any third persons.
Unauthorized Removal means the Contractor’s removal of Key Personnel without the prior written consent of the State.
Company Proprietary Software means all Software owned by the Company.
Authorized User means any individual to whom Customer grants access authorization to use the Cloud Service that is an employee, agent, contractor or representative of
Contractor attributional/proprietary information means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company.
Authorized Users(s means an individual or individuals with a business need to access DSHS Confidential Information, and who has or have been authorized to do so.
Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.
Unauthorized signature means a signature made without actual, implied, or apparent authority. The term includes a forgery.
Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a party receives from the other party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information and personal financial information (which may include consumer account number).
Authorized Users means an individual or individuals with an authorized business requirement to access DSHS Confidential Information.
Customer Proprietary Network Information (“CPNI”) is as defined in the Act.
Contractor Software means software which is proprietary to the Contractor, including software which is or will be used by the Contractor for the purposes of providing the Services.
Custom Materials means Materials developed by the Supplier at the Purchaser’s expense under the Contract and identified as such in Appendix 5 of the Contract Agreement and such other Materials as the parties may agree in writing to be Custom Materials. Custom Materials includes Materials created from Standard Materials.
Misappropriation means depriving, defrauding, or otherwise obtaining the real or personal property of a resident by any means prohibited by the Revised Code, including violations of Chapter 2911. or 2913. of the Revised Code.
User Information means information about a User made available to you in connection with such User’s request for and use of Transportation Services, which may include the User’s name, pick-up location, contact information and photo.
Authorized Use the specified level at which Licensee is authorized to execute or run the Program. That level may be measured by number of users, millions of service units ("MSUs"), Processor Value Units ("PVUs"), or other level of use specified by Lenovo.
Supplier's Confidential Information means any information, however it is conveyed, that relates to the business, affairs, developments, trade secrets, Know-How, personnel and suppliers of the Supplier, including IPRs, together with information derived from the above, and any other information clearly designated as being confidential (whether or not it is marked as "confidential") or which ought reasonably to be considered to be confidential;
personal health information means, with respect to an individual, whether living or deceased:
Company Proprietary Asset means any Proprietary Asset owned by or licensed to the Company or otherwise used by the Company.