Protected User definition

Protected User means any person who is a CKT Actual Filer, a Tax Intent User, or a Credit Karma New Member.
Protected User is defined in section 6;
Protected User means any existing user or lessee of the Property shown on Exhibit B attached hereto. Xxxxxx agrees to immediately cure any such RF interference caused to a protected User by Xxxxxx’s equipment or, if such RF interference cannot be immediately be cured, to temporarily reduce power or cease the offending operations, if so demanded by Xxxxxx on the ground of RF interference, until a cure at full power is achieved.

Examples of Protected User in a sentence

  • Each Protected User acknowledges that Licensor has advised it that the Materials are the valuable, proprietary and confidential information of Licensor.

  • At its option, Licensor may make a separate arrangement with a Protected User to have the Protected User pay SCEC’s fees.

  • Protected User shall secure from any party to whom such disclosure may be made a covenant that it will not disclose the Materials or make use of them for any purposes except for the maintenance of the Software.

  • Each Protected User agrees to use and to ensure that Protected Users use the Materials solely for its or their own use and for no other purposes.

  • Each Protected User further agrees not to copy or otherwise make available the Materials to any third party except as may be required to enable Protected User to obtain maintenance for the Software.

  • If a Protected User gives such notice, the User Enrolment Schedule shall terminate immediately and Protected User shall cease to be a party to this Agreement.

  • If Licensor gives such notice it must also give such notice to the Protected User, then 30 days after receipt by SCEC of such notice and an affidavit executed by the President or Secretary of Licensor confirming that notice has been given to SCEC and the Protected User, the User Enrolment Schedule shall terminate and the Protected User shall cease to be a party to this Agreement.

  • The User Enrolment Schedule will be valid for a term of one year and shall be renewed automatically for successive one-year terms unless terminated by Licensor or Protected User upon written notice at least 30 days prior to its renewal date.

  • Each Protected User agrees to utilize reasonable measures to retain the same in confidence during any verification procedures conducted pursuant to section 3.

  • Subject to section 3(2), at the date, time and location specified in the notice or as may be agreed to by the parties, SCEC shall deliver the Materials to the Protected User.


More Definitions of Protected User

Protected User means any existing user or lessee of the Property shown on Exhibit B attached hereto. Lessee agrees to immediately cure any such RF interference caused to a protected User by Lessee’s equipment or, if such RF interference cannot be immediately be cured, to temporarily reduce power or cease the offending operations, if so demanded by Lessor on the ground of RF interference, until a cure at full power is achieved.

Related to Protected User

  • Protected Data means Student Data and/or Teacher or Principal Data, to the extent applicable to the product or service actually being provided to the District by Vendor pursuant to the Master Agreement.

  • Protected Information means PHI provided by CE to BA or created, maintained, received or transmitted by BA on CE’s behalf.

  • Protected Disclosure means any communication made in good faith that discloses or demonstrates information that may evidence unethical or improper activity.

  • Confidential Information has the meaning set forth in Section 6.1.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Protected Health Information or “PHI” shall have the same meaning as the term “protected health information” in 45 C.F.R. § 160.103, and includes electronic PHI, as defined in 45 C.F.R. 160.103, limited to information created, maintained, transmitted or received by the Business Associate from or on behalf of the Covered Entity or from another Business Associate of the Covered Entity.