Unauthorized Document definition

Unauthorized Document means any document that (i) provides for the acquisition of a fee simple interest in real property or the purchase of assets by Tower Operator in the name of any AT&T Lessor or any of its Affiliates; (ii) provides for the incurrence of indebtedness for borrowed money in the name of, of any guarantee by, any AT&T Lessor or any of its Affiliates or purports to grant any mortgage, pledge or other security interest on the interest of AT&T Lessor or any of its Affiliates in any Site; (iii) is between or among Tower Operator or any of its Affiliates, on the one hand, and any AT&T Lessor or any of its Affiliates, on the other hand; provided that powers of attorney used for recording, in each County and State, all memoranda of lease, sublease and management agreements contemplated by this Agreement or any other Transaction Document shall be excluded from this clause (iii); (iv) waives, terminates, amends or exercises (or purports to waive, terminate, amend or exercise) any right expressly granted to and reserved for the benefit of any AT&T Lessor or any of its Affiliates under this Agreement and the Transaction Documents; or (v) settles or compromises any Dispute.
Unauthorized Document means any document that (i) provides for the acquisition of a fee simple interest in real property or the purchase of assets by Tower Operator in the name of any T-Mobile Lessor or any of its Affiliates; (ii) provides for the incurrence of indebtedness for borrowed money in the name of any T-Mobile Lessor or any of its Affiliates; (iii) is between or among Tower Operator or any of its Affiliates, on the one hand, and any T-Mobile Lessor or any of its Affiliates, on the other hand; (iv) waives, terminates, amends or exercises (or purports to waive, terminate, amend or exercise) any right expressly granted to and reserved for the benefit of any T-Mobile Lessor or any of its Affiliates under this Agreement and the Transaction Documents; or (v) settles or compromises any Dispute and the settlement or compromise thereof involves an admission of any violation of Law or admission of wrongdoing by any T-Mobile Lessor or any of its Affiliates.
Unauthorized Document means any document that (i) provides for the acquisition of a fee simple interest in real property or the purchase of assets by Tower Operator in the name of any Verizon Lessor or any of its Affiliates; (ii) provides for the incurrence of indebtedness for borrowed money in the name of, of any guarantee by, any Verizon Lessor or any of its Affiliates or purports to grant any mortgage, pledge or other security interest on the interest of Verizon Lessor or any of its Affiliates in any Site; (iii) is between or among Tower Operator or any of its Affiliates, on the one hand, and any Verizon Lessor or any of its Affiliates, on the other hand; provided that powers of attorney used for recording, in each County and State, all memoranda of lease, sublease and management agreements contemplated by this Agreement or any other Transaction Document shall be excluded from this clause (iii); (iv) waives, terminates, amends or exercises (or purports to waive, terminate, amend or exercise) any right expressly granted to and reserved for the benefit of any Verizon Lessor or any of its Affiliates under this Agreement and the Transaction Documents; (v) would permit a party to (A) interfere with any Verizon Lessor’s or any Verizon Lessor’s affiliates’ operations or communications equipment at a Site or (B) interfere with or cause a cessation of any Verizon Lessor’s or any Verizon Lessor’s affiliates’ services at a Site; (vi) the execution or entering in of which is not expressly authorized by the terms of the POA; or (vii) settles or compromises any dispute unrelated to a Ground Lease or any dispute between Tower Operator and any Verizon Group Member related to a Ground Lease.

Examples of Unauthorized Document in a sentence

  • Inc., and Hawaiian Airlines, Inc., and Motion for Leave to File an Unauthorized Document, Docket OST- 2002-13002, Exhibit 1.

  • FOE stated that “SCE has so far delivered no documents under the Board’s Order.”17 At the time FOE made this statement, it had not yet executed the NDA required by the Protective Order.18 Until FOE did so, SCE could not disclose the proprietary documents.B. FOE’s Request Seeks Unauthorized Document Discovery FOE’s request for access to over one hundred additional non-public items is an improper discovery request.

  • Motion for Leave to File an Otherwise Unauthorized Document The AAI also moves for leave to file an otherwise unauthorized document pursuant to14 C.F.R. § 302.6(c)(1) to respond to the IATA Reply.

  • Motion for Leave to File an Otherwise Unauthorized Document and Additional Comments of American Airlines, Inc., April 4, 2014, Docket DOT-OST-2000-7182, p.


More Definitions of Unauthorized Document

Unauthorized Document means any document that (i) provides for the acquisition of a fee simple interest in real property or the purchase of assets by Tower Operator in the name of any T-Mobile Lessor or any of its Affiliates;
Unauthorized Document means any document that (i) provides for the acquisition of a fee simple interest in real property or the purchase of assets by Tower Operator in the name of- 12 -any Verizon Lessor or any of its Affiliates; (ii) provides for the incurrence of indebtedness for borrowed money in the name of, of any guarantee by, any Verizon Lessor or any of its Affiliates or purports to grant any mortgage, pledge or other security interest on the interest of Verizon Lessor or any of its Affiliates in any Site; (iii) is between or among Tower Operator or any of its Affiliates, on the one hand, and any Verizon Lessor or any of its Affiliates, on the other hand; provided that powers of attorney used for recording, in each County and State, all memoranda of lease, sublease and management agreements contemplated by this Agreement or any other Transaction Document shall be excluded from this clause (iii); (iv) waives, terminates, amends or exercises (or purports to waive, terminate, amend or exercise) any right expressly granted to and reserved for the benefit of any Verizon Lessor or any of its Affiliates under this Agreement and the Transaction Documents; (v) would permit a party to (A) interfere with any Verizon Lessor’s or any Verizon Lessor’s affiliates’ operations or communications equipment at a Site or (B) interfere with or cause a cessation of any Verizon Lessor’s or any Verizon Lessor’s affiliates’ services at a Site; (vi) the execution or entering in of which is not expressly authorized by the terms of the POA; or (vii) settles or compromises any dispute unrelated to a Ground Lease or any dispute between Tower Operator and any Verizon Group Member related to a Ground Lease.

Related to Unauthorized Document

  • Unauthorized disclosure or "unauthorized release" means any disclosure or release not permitted by federal or state statute or regulation, any lawful contract or written agreement, or that does not respond to a lawful order of a court or tribunal or other lawful order.

  • Unauthorized Code means any virus, Trojan horse, worm or other software routines or equipment components whose effect is to permit unauthorized access or to disable, erase or otherwise harm software, equipment or data, or to perform any other actions not authorized by Customer.

  • Unauthorized Gas means (a) the quantity of gas taken by Customer exceeding the amount which is permitted during a Period of Interruption or (b) the difference (whether positive or negative) between the quantity of gas taken by Customer and the volumes provided for under an Operational Flow Order.

  • Unauthorized Use means either of the following:

  • Unauthorized signature means one made without actual, implied, or apparent authority and includes a forgery.

  • Unauthorized Third Party means any person or entity that, at the time of the Computer Fraud, is not an Authorized User.

  • Unauthorized person means any person who accesses government data without a work assignment that reasonably requires access, or regardless of the person's work assignment, for a purpose not described in the procedures required by section 13.05, subdivision 5.

  • Unauthorized Access means the entrance of a person into a restricted area without permission of the operator or the operator’s designated representative.

  • Unauthorized insurer means an insurance institution that has not been granted a certificate of authority by the commissioner to transact the business of insurance in this state."

  • Unauthorized alien means an alien as defined in Section 1324a(h)(3) of Title 8 of the United States Code.

  • Unauthorized Removal means the Contractor’s removal of Key Personnel without the prior written consent of the State.

  • Cardholder Information means any non-public, sensitive information about a Cardholder, including any combination of Cardholder name plus the Cardholder’s social security number, driver’s license or other identification number or credit or debit card number, or other bank account number.

  • Authorized User means one named employee, contractor or agent of Customer (each identified by a unique email address) for whom Customer has purchased a subscription to the Subscription Services and who is authorized by Customer to access and use the Services under the rights granted to Customer pursuant to this Agreement.

  • Cardholder Data has the meaning defined by the PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard (DSS) and Payment Application Data Security Standard (PA-DSS), Glossary of Terms, Abbreviations, and Acronyms, Version 3.0, January 2014, currently available online at: xxxxx://xxx.xxxxxxxxxxxxxxxxxxxx.xxx/documents/PCI_DSS_Glossary_v3.pdf. For the term of this Contract, Contractor will maintain a provisional Authority to Operate (ATO) at the Moderate Level from the Federal Risk and Authorization Management Program (FedRAMP) Joint Authorization Board (JAB) or Federal Agency for any and all Cloud Services provided under this Contract. For the term of this Contract, Contractor will maintain an ISO 27001 Certification for any and all Cloud Services provided under this Contract.

  • unauthorised transaction means a transaction that is not authorised by a user

  • Customer Data means any content, materials, data and information that Authorized Users enter into the production system of a Cloud Service or that Customer derives from its use of and stores in the Cloud Service (e.g. Customer-specific reports). Customer Data and its derivatives will not include SAP’s Confidential Information.

  • Authorized Driver means any of the following:

  • Authorized Users(s) means an individual or individuals with a business need to access DSHS Confidential Information, and who has or have been authorized to do so.

  • User Information means User Compliance Information and User Financial Information.

  • Company Proprietary Software means all software owned by the Company and its Subsidiaries.

  • Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a Party receives from the other Party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information, and personal financial information (which may include a Masterworks user account number).

  • Authorized Users means an individual or individuals with an authorized business requirement to access DSHS Confidential Information.

  • Customer Materials any materials, data, information, software, equipment or other resources owned by or licensed to You and made available to Us pursuant to facilitating Your use of the Services, including Customer Data.

  • Password is the customer-generated code selected by you for use during the initial sign-on, or the codes you select after the initial sign-on, that establishes your connection to the Service;

  • Authorized Third Party means an entity that:

  • Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.