Compromised definition

Compromised means a given Private Key is in danger of being lost, disclosed, or subjected to unauthorized use in any way.
Compromised means inadvertently or improperly disclosed.
Compromised means where identity has not been protected in line with Section 16 of the Act and the provisions for revealing of identity contained therein.

Examples of Compromised in a sentence

  • Upon Third Party Vendor’s suspected or actual discovery of a Compromised Data Event, Third Party Vendor will not alter or destroy any related records and will maintain complete and accurate documentation regarding any modifications made to the records.

  • A Security Event includes, but is not limited to: o Any abnormality in the environment that could lead to a compromise of the system integrity or result in disclosure of data, o Hack attempts, o Malware, o Changes in security infrastructure, o System failures, o Compromised user accounts, and o Lost/stolen laptop or media.

  • Where We have paid the agreed value of Your vessel to You as a result of Our declaring the Scheduled Vessel a Constructive or Compromised Total Loss, You will, at Our request, transfer title to the Scheduled Vessel either to Us or to Our designated or named nominee.

  • As soon as practicable following entry of an order by the Court in accordance with Paragraph 4 herein, Gemini shall issue and deliver to Tuxedo, Ice Cap and Outboard shares of Gemini’s common stock, par value $0.01 per share, (“Common Stock”) sufficient to satisfy the Compromised Amount through the issuance of freely trading securities issued pursuant to Section 3(a)(10) of the Act.

  • A Security Event includes, but is not limited to: Any abnormality in the environment that could lead to a compromise of the system integrity or result in disclosure of data, Hack attempts, Malware, Changes in security infrastructure, System failures, Compromised user accounts, and Lost/stolen laptop or media.


More Definitions of Compromised

Compromised has the same meaning as in the Smart Energy Code, with all due adjustments or modifications having been made to apply such term in the context of the SMETS1 Live Services;
Compromised means Hygienic Goods which, as determined by Innervation at its sole and absolute discretion, (a) are not in their original condition, (b) are not in their original unopened packaging, and/or (c) whose packaging or seals have been broken, tampered with or compromised;
Compromised is defined in clause 14 to include an unauthorised collection, use or disclosure of information in a consumer’s PCEHR and other events that may affect the security or integrity of the PCEHR system. For example, in relation to clause 4.4(a)(ii), if it appears that someone has hacked into the PCEHR system using your IT system or if you have discovered that one of your employees has accessed records in the PCEHR system when not authorised to do so under the PCEHR Act. The consent in clause 4.5 is for the purposes of paragraph 9(1)(d) of the Electronic Transactions Act 1999.
Compromised means: (a) in relation to any System, that the intended purpose or effective operation of that System is compromised by the occurrence of any event which has an adverse effect on the confidentiality, integrity or availability of the System or of any Data that are stored on or communicated by means of it; (b) in relation to any Device, that the intended purpose or effective operation of that Device is compromised by the occurrence of any event which has an adverse effect on the confidentiality, integrity or availability of the Device or of any Data that are stored on or communicated by means of it; (c) in relation to any Data, that the confidentiality, integrity or availability of that Data is adversely affected by the occurrence of any event;
Compromised means that "the application for
Compromised means: (a) in relation to any System, that the intended purpose or effective operation of that System is compromised by the occurrence of any event which has an adverse effect on the confidentiality, integrity or availability of the System or of any Data that are stored on or communicated by means of it; (b) in relation to any Device, that the intended purpose or effective operation of that Device is compromised by the occurrence of any event which has an adverse effect on the confidentiality, integrity or availability of the Device or of any Data that are stored on or communicated by means of it; (c) in relation to any Data, that the confidentiality, integrity or availability of that Data is adversely affected by the occurrence of any event; (d) in relation to any Secret Key Material, that that Secret Key Material (or any part of it), or any Cryptographic Module within which it is stored, is accessed by, or has become accessible to, a person not authorised to access it;
Compromised or “interrupted”). There is a one-to-one mapping between the cases in sF and F RFE fPAKE such that the outputs for the parties, whether they are honest or corrupt, are identically distributed. Those outputs are described in the last three columns of the table, as tuples of values the first of which is output to 0, and the second of which is output to 1. a, b are adversarially chosen values (which may or may not be distinct). r, s are independent, uniformly random values. The transformation of Barak et al. proceeds in two steps. First, links are initialized: