Unauthorized Use means either of the following:
Unauthorized Access means the entrance of a person into a restricted area without permission of the operator or the operator’s designated representative.
Unauthorized Code means any virus, Trojan horse, worm, or other software routines or hardware components designed to permit unauthorized access, to disable, erase, or otherwise harm Software, hardware or data.
Unauthorized alien means an alien as defined in Section 1324a(h)(3) of Title 8 of the United States Code.
Unauthorized Gas means (a) the quantity of gas taken by Customer exceeding the amount which is permitted during a Period of Interruption or (b) the difference (whether positive or negative) between the quantity of gas taken by Customer and the volumes provided for under an Operational Flow Order.
Trusted Network means a network operated and maintained by the Contractor, which includes security controls sufficient to protect DSHS Data on that network. Controls would include a firewall between any other networks, access control lists on networking devices such as routers and switches, and other such mechanisms which protect the confidentiality, integrity, and availability of the Data.
Authorized User means a person:
Unauthorized Third Party means any person or entity that, at the time of the Computer Fraud, is not an Authorized User.
Authorized Users(s) means an individual or individuals with a business need to access DSHS Confidential Information, and who has or have been authorized to do so.
Customer Proprietary Network Information (“CPNI”) is as defined in the Act.
Router means a modem or router provided by us for use by you in connection with the Broadband Service.
Server Software means software that provides services or functionality on a computer acting as a server.
Core Network means the transport infrastructure identified in accordance with Chapter III of Regulation (EU) No 1315/2013;
Unauthorized disclosure or "unauthorized release" means any disclosure or release not permitted by federal or state statute or regulation, any lawful contract or written agreement, or that does not respond to a lawful order of a court or tribunal or other lawful order.
Supplier Software means software which is proprietary to the Supplier or its Affiliates which is used or supplied by the Supplier in the provision of the Services; Supplier Staff means all persons employed or engaged by the Supplier together with the Supplier's servants, agents, suppliers, consultants and Sub-Contractors (and all persons employed by any Sub-Contractor together with the Sub-Contractor’s servants, consultants, agents, suppliers and Sub-Contractors) used in the performance of its obligations under this Contract; Time and Materials means the pricing mechanism for the Services as may be agreed by the Parties and set out at paragraph Error: Reference source not found in the SOW; TUPE means the Transfer of Undertakings (Protection of Employment) Regulations 2006 (SI 2006/246) as amended or replaced or any other regulations or UK legislation implementing the Acquired Rights Directive; Velocity means the Metric which measures the total number of Story Points for Stories that have been accepted in a Sprint, indicating the rate of progress towards Acceptance of all Stories from the Product Backlog;
Mobile Network means the network facilities and/or network services comprising the public cellular network for the provision of Call Communications.
Unauthorized Removal means the Contractor’s removal of Key Personnel without the prior written consent of the State.
Commercial Software means Software developed or regularly used that: (i) has been sold, leased, or licensed to the general public; (ii) has been offered for sale, lease, or license to the general public; (iii) has not been offered, sold, leased, or licensed to the public but will be available for commercial sale, lease, or license in time to satisfy the delivery requirements of this Contract; or (iv) satisfies a criterion expressed in (i), (ii), or (iii) above and would require only minor modifications to meet the requirements of this Contract.
Authorized Users means those employees, agents, independent contractors and students of Customer who are authorized by Customer to use the Services and for whom a Subscription Fee has been paid. Each Authorized User will have a unique username and login as set forth in more detail below.
Customer Software means software which is owned by or licensed to the Customer, including Specially Written Software and Assigned Software and software which is or will be used by the Supplier for the purposes of providing the Services but excluding the Supplier Software;
Unauthorized signature means one made without actual, implied, or apparent authority and includes a forgery.
ALI Database A database used in providing 911 Service which stores information associated with End User customers’ telephone numbers or Shell Records.
pseudonymisation means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person;
Client Application means an application developed by Licensee that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.
Supported Web Browser means the current release from time to time of Microsoft Edge, Mozilla Firefox, Google Chrome or Apple Safari, or any other web browser that the Provider agrees in writing shall be supported;
IntraLATA LEC Toll means IntraLATA Toll traffic carried solely by a Local Exchange Carrier and not by an IXC. "IntraLATA Toll Traffic" describes IntraLATA Traffic outside the Local Calling Area.