Unauthorized Acts definition

Unauthorized Acts means any acts by a Contractor/County employee, agent or representative that are not set forth in this Contract and have not been approved by Board of Legislators as part of this Contract.
Unauthorized Acts means any acts by a City employee, agent or representative that are not set forth in this Contract and have not been approved by City Council as part of this Contract.
Unauthorized Acts means any acts by a City employee, agent or representative that are not set forth in this Contract and have not been approved as a part of this Contract by the DWSD Director, and as may be required by the terms of this Contract, the Board and City Council.

Examples of Unauthorized Acts in a sentence

  • Manager shall indemnify Company against all claims, actions, damages, losses, judgments, liabilities, costs and expenses (including attorneys’ fees) and amounts paid in settlement of any claims sustained by Company arising out of or in connection with Unauthorized Acts.

  • The County shall not be bound by Unauthorized Acts of its employees, agents, or representatives with regard to any dealings with the Contractor and any of its Associates.

  • Manager shall indemnify Company against all claims, actions, damages, losses, judgments, liabilities, costs and expenses (including attorneys' fees) and amounts paid in settlement of any claims sustained by Company arising out of or in connection with Unauthorized Acts.

  • Different EO data gathered and produced within WP3 were used to improve and to test the global hydrological simulations.

  • Agent shall indemnify and hold Owner harmless from and against all claims, damages and costs arising out of or in connection with Unauthorized Acts.

  • As between the Parties, a Party responsible for such Unauthorized Acts as contemplated in this Section 14.5 shall pay the reasonable external costs incurred by any of the other Parties to bring the responsible Party into compliance with this Agreement, including any costs incurred in connection with seeking a confidentiality agreement, protective order, or any other protection of the confidentiality of the Confidential Information as contemplated in Section 14.1.

  • Manager shall indemnify and hold Owner harmless from and against any and all claims, damages, costs (including reasonable attorney’s fees and court costs) and other charges arising out of or in connection with Unauthorized Acts.

  • The International Union by telegram to the Local Union officers shall state that such Unauthorized Acts are not directed or authorized by the Union and are in violation of this Agreement.

  • Subject to the provisions of Section 1.06 hereof, the Owner shall indemnify and hold Manager harmless from and against all loss, cost, expense, claims and liability arising out of or in connection with the management, operation and leasing of the Property, except for acts of Manager which constitute a breach of the provisions of this Agreement or are otherwise outside the scope of its employment and Manager's own negligence or misconduct (such acts together referred to as "Unauthorized Acts").

  • Transmission Errors or Unauthorized Acts: Unfortunately, no data transmission over the Internet can be guaranteed to be 100% secure.


More Definitions of Unauthorized Acts

Unauthorized Acts means any acts by a GLWA employee, agent or representative that are not set forth in this Contract and have not been approved as a part of this Contract.
Unauthorized Acts has the meaning set forth in Section 14.5.
Unauthorized Acts has the meaning set forth in Section 14.5. 2.70 VARIANCE has the meaning set forth in Section 3.16. 2.71 WITHHOLDING TAXES has the meaning set forth in Section 8.5. 2.72 WORK ASSIGNMENT has the meaning set forth in Section 3.1. 3. TERMS OF APPOINTMENT/SERVICES 3.1
Unauthorized Acts. Without limiting either Party's rights in respect of a breach of this Section 16.0, each Party shall: (a) promptly notify the other Party of any unauthorized possession, use or knowledge, or attempt thereof, of the other Party's Confidential Information by any person or entity that may become known to such Party, including any incidents involving a breach of security and any incidents that might indicate or lead to a threat to, or weakness in, security and any attempt to make unauthorized use of the Customer Services or the Systems; (b) promptly furnish to the other Party full details of the unauthorized possession, use or knowledge, or attempt thereof, and assist the other Party in investigating or preventing the recurrence of any unauthorized possession, use or knowledge, or attempt thereof, of Confidential Information; (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by the other Party to protect its proprietary rights at the other Party's expense; and (d) promptly use commercially reasonable efforts to prevent a recurrence of any such unauthorized possession, use or knowledge, or attempt thereof, of Confidential Information. [***]*
Unauthorized Acts has the meaning set forth in Section 3.10(m)(i) hereof.

Related to Unauthorized Acts

  • Unauthorized alien means an alien as defined in Section 1324a(h)(3) of Title 8 of the United States Code.

  • Unauthorized Access means the entrance of a person into a restricted area without permission of the operator or the operator’s designated representative.

  • Unauthorized disclosure or "unauthorized release" means any disclosure or release not permitted by federal or state statute or regulation, any lawful contract or written agreement, or that does not respond to a lawful order of a court or tribunal or other lawful order.

  • Unauthorized Code means any virus, Trojan horse, worm, or other software routines or hardware components designed to permit unauthorized access, to disable, erase, or otherwise harm Software, hardware or data.

  • Unauthorized Gas means (a) the quantity of gas taken by Customer exceeding the amount which is permitted during a Period of Interruption or (b) the difference (whether positive or negative) between the quantity of gas taken by Customer and the volumes provided for under an Operational Flow Order.

  • Unauthorized Third Party means any person or entity that, at the time of the Computer Fraud, is not an Authorized User.

  • Unauthorized signature means one made without actual, implied, or apparent authority and includes a forgery.

  • Unauthorized person means any person who accesses government data without a work assignment that reasonably requires access, or regardless of the person's work assignment, for a purpose not described in the procedures required by section 13.05, subdivision 5.

  • Unauthorized Use means either of the following:

  • Unauthorized Removal means the Contractor’s removal of Key Personnel without the prior written consent of the State.

  • Unauthorized insurer means an insurance institution that has not been granted a certificate of authority by the commissioner to transact the business of insurance in this state."

  • Member Information means the share, deposit, loan account balances, or other information related to any member of a domestic credit union maintained in any form.

  • Trade Secret Information means all information, regardless of the form or medium in which it is or was created, stored, reflected or preserved, that is not commonly known by or generally available to the public and that: (i) derives or creates economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. The Company’s Trade Secret Information may include, but is not limited to, all confidential information relating to or reflecting the Company’s research and development plans and activities; compilations of data; product plans; sales, marketing and business plans and strategies; pricing, price lists, pricing methodologies and profit margins; current and planned incentive, recognition and rewards programs and services; personnel; inventions, concepts, ideas, designs and formulae; current, past and prospective customer lists; current, past and anticipated customer needs, preferences and requirements; market studies; computer software and programs (including object code and source code); and computer and database technologies, systems, structures and architectures. You understand that Confidential Information and/or Trade Secret Information may or may not be labeled as such, and you shall treat all information that appears to be Confidential Information and/or Trade Secret Information as confidential unless otherwise informed or authorized by the Company. Nothing in this Agreement shall be construed to mean that Company owns any intellectual property or ideas that were conceived by you before you commenced employment with Company and which you have previously disclosed to the Company. Subject to Section 4.3(b), nothing in this Section 4.3(a) shall prevent you from complying with a valid legal requirement (whether by oral questions, interrogatories, requests for information or documents, subpoena, civil investigative demand or similar process) to disclose any Confidential Information or Trade Secret Information.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • personal health information means, with respect to an individual, whether living or deceased:

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Protected Health Information or “PHI” shall have the same meaning as the term “protected health information” in 45 C.F.R. § 160.103, and includes electronic PHI, as defined in 45 C.F.R. 160.103, limited to information created, maintained, transmitted or received by the Business Associate from or on behalf of the Covered Entity or from another Business Associate of the Covered Entity.

  • Protected Health Information or PHI means any information, whether oral or recorded in any form or medium: (i) that relates to the past, present or future physical or mental condition of an individual; the provision of health care to an individual; and (ii) that identifies the individual or with respect to which there is a reasonable basis to believe the information can be used to identify the individual, and shall have the meaning given to such term under the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.501. Protected Health Information includes Electronic Protected Health Information [45 C.F.R. Sections 160.103, 164.501].

  • Information Acts means the Data Protection Legislation, FOIA and the EIR, as amended from time to time;

  • Privacy Breach means a common law breach of confidence, infringement, or violation of any rights to privacy, including but not limited to breach of “Your” privacy statement, breach of a person’s right of publicity, wrongful collection, false light, intrusion upon a person’s seclusion, public disclosure of “Private Information”, or misappropriation of a person’s picture or name for commercial gain.

  • Protected Health Information (PHI) means individually identifiable health information created, received, maintained or transmitted by Business Associate on behalf of a health care component of the Covered Entity that relates to the provision of health care to an Individual; the past, present, or future physical or mental health or condition of an Individual; or the past, present, or future payment for provision of health care to an Individual. 45 CFR 160.103. PHI includes demographic information that identifies the Individual or about which there is reasonable basis to believe can be used to identify the Individual. 45 CFR 160.103. PHI is information transmitted or held in any form or medium and includes EPHI. 45 CFR 160.103. PHI does not include education records covered by the Family Educational Rights and Privacy Act, as amended, 20 USCA 1232g(a)(4)(B)(iv) or employment records held by a Covered Entity in its role as employer.

  • Unauthorized signature means a signature made without actual, implied, or apparent authority. The term includes a forgery.

  • Authorized Third Party means an entity that:

  • Supplier's Confidential Information means any information, however it is conveyed, that relates to the business, affairs, developments, trade secrets, Know-How, personnel and suppliers of the Supplier, including IPRs, together with information derived from the above, and any other information clearly designated as being confidential (whether or not it is marked as "confidential") or which ought reasonably to be considered to be confidential;

  • Consumer Information Any personally identifiable information in any form (written electronic or otherwise) relating to a Mortgagor, including, but not limited to: a Mortgagor’s name, address, telephone number, Mortgage Loan number, Mortgage Loan payment history, delinquency status, insurance carrier or payment information, tax amount or payment information; the fact that the Mortgagor has a relationship with the Seller or Servicer or the originator of the related Mortgage Loan; and any other non-public personally identifiable information.

  • Customer's Confidential Information means all Personal Data and any information, however it is conveyed, that relates to the business, affairs, developments, trade secrets, know-how, personnel, and suppliers of the Customer, including all IPRs, together with all information derived from any of the above, and any other information clearly designated as being confidential (whether or not it is marked "confidential") or which ought reasonably be considered to be confidential;