Legitimate User definition

Legitimate User means a user of a Customer Product that (i) acquired the Customer Product lawfully, and (ii) uses the Embedded Software embedded on the Customer Product strictly limited to the extent reasonably necessary for using the Customer Product and in line with applicable copyright laws.
Legitimate User means a Court of Auditors Member, official, other member of staff or SNE with an established and recognised need for access to a specific information system.

Examples of Legitimate User in a sentence

  • When such is used in developing, producing, and selling programs where expressions are practically similar to the program subject to the decompilation of program codes or infringing on other program copyrights.[This Article added on April 22, 2009] Article 101-5 (Reproduction for Keeping by a Legitimate User, Etc.) (1) Parties which own and use copies of programs with justifiable authority may reproduce the copies to the extent necessary to protect against destruction, damage, degradation, etc.

  • This emulated the use of a pattern cudaMemcpy Legitimate User Shared MemoryMemory AllocationMalicious User cudaMemcpymatching algorithm running on the GPU, storing confidentialFig.

  • We say that ADV successfully launches an SSA attack iff she canmmsmchange bits from 0 to 1 in si and produce a new array sri i that will be accepted asvalid by the corresponding authorities.ADVAttack 2 (Successful Revocation of Legitimate User Attack – RLUA).

  • Generally under different application scenarios of UAV-involved secure communications, the purpose of transmit power design is to sufficiently make use of the channel superiority of legitimate channels to improve the secrecy capacity or to increase the channel superiority in an opportunistic manner.Based on the aforementioned application scenarios and main design considerations, the recent UAV aerialGround BSTrajectoryBS: Legitimate User : Potential Eavesdropper Fig.

  • In order to deploy WCF services to the database security policies which have been presented in Figure.1, three-tier security architecture is built as presented in Figure.2. The architecture is presented vertically according to its components (Client- Application Server – Database Server) and is presented horizontally according to WCF deployment to (Trusted Third Party – Database Administrator – Legitimate User).

  • Legitimate User (210.21.1.5) IP Source(210.21.1.5)IP Destination(123.12.1.1) DATA Parliament House website, Optus, Web24, Vocus, and Burma’s main Internet provider.

  • The Annual Meeting will be held on June 7, 2022, at 8:00 am, Pacific Time.

  • Malicious and Legitimate User Model The network is modeled as an undirected graph G = (V, L), where each node in V corresponds to one user.

Related to Legitimate User

  • Customer User means an employee of Customer, a Customer Affiliate or Business Partner.

  • Customer Usage Data means the Telecommunications Service usage data of CLEC’s Customer, measured in minutes, sub-minute increments, message units or otherwise, that is recorded by CenturyLink AMA equipment and forwarded to CLEC.

  • Customer Data means any content, materials, data and information that Authorized Users enter into the production system of a Cloud Service or that Customer derives from its use of and stores in the Cloud Service (e.g. Customer-specific reports). Customer Data and its derivatives will not include SAP’s Confidential Information.

  • Service User means the person directly receiving the Services provided by the Provider as specified in the Service Specifications and includes their Carer and Legal Guardian where appropriate Service Quality Performance Report means a report as described in Appendix J (Service Quality Performance Report)

  • Customer Usage Information means information regarding the historical electricity consumption of a Customer;

  • Customer Personal Data means the personal data contained within the Customer Data.

  • Confidential Information has the meaning set forth in Section 6.1.

  • Customer means the State agency or other entity identified in a contract as the party to receive commodities or contractual services pursuant to a contract or that orders commodities or contractual services via purchase order or other contractual instrument from the Contractor under the Contract. The “Customer” may also be the “Buyer” as defined in the PUR 1001 if it meets the definition of both terms.

  • Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a Party receives from the other Party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information, and personal financial information (which may include a Masterworks user account number).

  • Customer Content means all software, data (including personal data), information, text, images, audio, video, photographs, non-AVEVA or third-party applications, and other content and material, in any format, provided by Customer, any of Customer’s users, or on behalf of Customer that is stored in, or run on or through, the Products and Support Services.

  • State Confidential Information means any and all State Records not subject to disclosure under CORA. State Confidential Information shall include, but is not limited to, PII, PHI, PCI, Tax Information, CJI, and State personnel records not subject to disclosure under CORA. State Confidential Information shall not include information or data concerning individuals that is not deemed confidential but nevertheless belongs to the State, which has been communicated, furnished, or disclosed by the State to Contractor which (i) is subject to disclosure pursuant to CORA; (ii) is already known to Contractor without restrictions at the time of its disclosure to Contractor; (iii) is or subsequently becomes publicly available without breach of any obligation owed by Contractor to the State; (iv) is disclosed to Contractor, without confidentiality obligations, by a third party who has the right to disclose such information; or (v) was independently developed without reliance on any State Confidential Information.

  • Sensitive Data means information that is protected against unwarranted disclosure, to include Personally Identifiable Information (PII), Protected Health Information (PHI) or other private/confidential data, as specifically determined by the State. Sensitive Data includes information about an individual that (1) can be used to distinguish or trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or biometric records; (2) is linked or linkable to an individual, such as medical, educational, financial, and employment information; (3) falls within the definition of “personal information” under Md. Code Ann., Com. Law § 14-3501(d); or (4) falls within the definition of “personal information" under Md. Code Ann., State Govt. § 10-1301(c).

  • Legitimate Interest means the interest of our business in conducting and managing our business to enable us to give you the best service/product and the best and most secure experience. We make sure we consider and balance any potential impact on you (both positive and negative) and your rights before we process your personal data for our legitimate interests. We do not use your personal data for activities where our interests are overridden by the impact on you (unless we have your consent or are otherwise required or permitted to by law). You can obtain further information about how we assess our legitimate interests against any potential impact on you in respect of specific activities by contacting us.