Unauthorised Code definition

Unauthorised Code means any virus, Trojan Horse, worm, logic bomb or other software routine or hardware components designed to permit unauthorised access, to disable, erase, or otherwise harm software, hardware or data or to perform any such actions.
Unauthorised Code means any computer viruses or other malicious, destructive or corrupting code, agent, programme, macros or other software routine or hardware components;
Unauthorised Code means any virus, Trojan Horse, worm, logic bomb or other System

Examples of Unauthorised Code in a sentence

  • Supplier will not incorporate or introduce or permit or facilitate the incorporation or introduction of Unauthorised Code into the Supplier's Information Systems nor any Imagination Information Systems.Supplier shall ensure it at all times employs adequate security practices to prevent, detect, mitigate and protect against the introduction of any such Unauthorised Code into the Supplier's Information Systems in real-time.

  • Supplier shall ensure that it at all times employs adequate security practices to prevent, detect, mitigate and protect against the introduction of any such Unauthorised Code into the Supplier's Information Systems in real-time.

  • Supplier will not incorporate or introduce or permit or facilitate the incorporation or introduction of Unauthorised Code into the Supplier's Information Systems nor any Company Information Systems.


More Definitions of Unauthorised Code

Unauthorised Code means (i) any software virus, Trojan Horse, worm, logic bomb or other software routine or hardware components designed to permit unauthorised access, to deny authorised use, to disable, erase, or otherwise harm software, hardware or data, or to perform any unauthorised actions and (ii) any software codes licensed under a licensing scheme that mandates that all derivative works thereof have to be distributed with the source codes of the derivative works or that the source codes of all derivative works have to be made readily available (e.g. GNU Public Licence).

Related to Unauthorised Code

  • Unauthorized Code means any virus, Trojan horse, worm, or other software routines or hardware components designed to permit unauthorized access, to disable, erase, or otherwise harm Software, hardware or data.

  • unauthorised transaction means a transaction that is not authorised by a user

  • Unauthorized signature means one made without actual, implied, or apparent authority and includes a forgery.

  • Unauthorized disclosure or "unauthorized release" means any disclosure or release not permitted by federal or state statute or regulation, any lawful contract or written agreement, or that does not respond to a lawful order of a court or tribunal or other lawful order.

  • Unauthorized alien means an alien as defined in Section 1324a(h)(3) of Title 8 of the United States Code.

  • Unauthorised expenditure , means any expenditure incurred by a municipality otherwise than in accordance with section 15 or 11(3) of the MFMA, and includes-

  • Authorised Third Party means a person authorised by you to initiate trades or close existing trades using your account details, as referred to in Clause 16.

  • Unauthorized person means any person who accesses government data without a work assignment that reasonably requires access, or regardless of the person's work assignment, for a purpose not described in the procedures required by section 13.05, subdivision 5.

  • Unauthorized Use means either of the following:

  • Authorised User means those employees, agents and independent contractors of the Customer who are authorised by the Customer to use the Services.

  • Unauthorized Third Party means any person or entity that, at the time of the Computer Fraud, is not an Authorized User.

  • Unauthorized Gas means (a) the quantity of gas taken by Customer exceeding the amount which is permitted during a Period of Interruption or (b) the difference (whether positive or negative) between the quantity of gas taken by Customer and the volumes provided for under an Operational Flow Order.

  • Authorised Users means any of the following to whom You give permission to use the Software as part of Your BlackBerry Solution: (a) any of Your employees, consultants or independent contractors; (b) any friend or family member, or any person that resides in Your premises; and (c) any other person who RIM authorises in writing. Notwithstanding the foregoing, this Agreement does not convey the automatic right to have Your BlackBerry Server Software hosted by a third party. If You wish to do so, please contact RIM at: xxxxxxxxx@xxx.xxx. "BlackBerry Handheld Product", also known as "BlackBerry Device", means a device manufactured by or on behalf of RIM, including any such smartphone, smart card reader, tablet or BlackBerry Presenter and any other device expressly identified by RIM at xxxx://xxx.xxxxxxxxxx.xxx/legal/blackberrydevices_for_bbsla as a BlackBerry Handheld Product.

  • Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.

  • Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.

  • authorised person means the Client or any person (including any individual or entity) authorised by the Client to act on its behalf in the performance of any act, discretion or duty under this Agreement (including, for the avoidance of doubt, any officer or employee of such person) in a notice reasonably acceptable to the Custodian.

  • Privacy Act means the Privacy Act 1988 (Cth).

  • authorised party means the party referred to in Article XIII(3);

  • Personal Data Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.

  • Unauthorized Access means the entrance of a person into a restricted area without permission of the operator or the operator’s designated representative.

  • Authorised Driver means any driver approved by Xxxxxx and whose name is noted in Rental Vehicle Agreement Part A as an authorised driver;

  • Relevant Personal Data means Personal Data in respect of which we are the Controller.

  • Customer Personal Data means the personal data contained within the Customer Data.

  • Cardholder Data has the meaning defined by the PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard (DSS) and Payment Application Data Security Standard (PA-DSS), Glossary of Terms, Abbreviations, and Acronyms, Version 3.0, January 2014, currently available online at: xxxxx://xxx.xxxxxxxxxxxxxxxxxxxx.xxx/documents/PCI_DSS_Glossary_v3.pdf.

  • Unauthorized Removal means the Contractor’s removal of Key Personnel without the prior written consent of the State.

  • Authorised Persons means collectively all Event management, Venue management, Police, public bodies and agencies responsible for safety and security in connection with the Event or the Venue, and their respective staff, officials, representatives, officers and volunteers;