Sentences with phrase «authorized persons access»

However, our secure sites do require personal information, such as a contract number, email address, Social Security Number or password to assure only authorized persons access customer account information.
KEY ACHIEVEMENTS • Implemented a complex data indexing system, which reduced information retrieval time by 62 % • Secured patient data by a 100 % by introducing «Patient Lock» a system that ensures complete data lockdown until an authorized person accesses it • Increased the efficiency of the insurance reimbursement system by creating and maintaining effective relationships with insurance companies on the facility's panel • Taught 15 new health information technician trainees in healthcare reimbursement methods and classification and coding systems as part of their training program

Not exact matches

«The FDA has embraced innovation and has empowered people by authorizing direct access to this information,» said 23andMe co-founder and CEO Anne Wojcicki in a statement.
«The FDA has embraced innovation and has empowered people by authorizing direct access to this information,» said Wojcicki in a statement following the clearance.
«Now any file has to be encrypted even if it's behind walls, so no matter where the data is, only authorized people have access to it.»
«Authorized account holder» is defined as the natural person who is assigned to an e-mail address by an Internet Access Provider, online service provider, or other organization (e.g., business, educational institute) that is responsible for assigning e-mail addresses for the domain associated with the submitted e-mail address.
You agree to defend, indemnify, and hold harmless the Action Network Group and its affiliates and their officers, directors, employees, consultants, agents, licensors, and suppliers from and against any and all claims, losses, expenses, liabilities, settlements, litigation, damages, and / or costs (including, but not limited to, fees, costs and other expenses of attorneys and expert witnesses) arising out of or related to: (i) your use of the Site, including, but not limited to, any Materials or User Content, (ii) any violation of these Terms of Use or applicable law by you in connection with your use of the Site, including, but not limited to, any Materials or User Content, (iii) any actual or alleged infringement by you, or any person accessing the Site, including, but not limited to, any Materials or User Content, using your password or account identifier, of any intellectual property or privacy or other right of any third party, or (iv) any unauthorized use of password protected Materials or User Content utilizing your account information, whether or not known or authorized by you.
I / we agree that if any material change (s) occur (s) in my / our financial condition that I / we will immediately notify BSHFC of said change (s) and unless Baby Safe Homes Franchise Corporation is so notified it may continue to rely upon the application and financial statement and the representations made herein as a true and accurate statement of my / our financial condition.nI / we authorize Baby Safe Homes Franchise Corporation to make whatever credit inquiries / background checks it deems necessary in connection with this application and financial statement.nI / we authorize and instruct any person or consumer reporting agency to furnish to BSHFC any information that it may have to obtain in response to such credit inquiries.nIn consideration of the ongoing association between Baby Safe Homes and the undersigned applicant (hereinafter u201cApplicantu201d), the parties hereto have entered into this Non-Disclosure and Non-Competition Agreement.nWHEREAS, in the course of its business operations, Baby Safe Homes provides its customers products and services which, by nature of the business, include trade secrets, confidential and proprietary information, and other matters deemed material or important enough to warrant protection; and WHEREAS, Applicant, by reason of his / her interest in Baby Safe Homes and in the course of his / her duties, has access to said secrets and confidential information; and WHEREAS, Baby Safe Homes has trade secrets and other confidential and proprietary information, including procedures, customer lists, and particular desires or needs of such customers to which Applicant has access in the course of his / her duties as an Applicant.nNow, therefore, in consideration of the premises contained herein, the parties agree as follows Applicant shall not, either during the time of his / her franchise evaluation with Baby Safe Homes or at any time thereafter either directly or indirectly, communicate, disclose, reveal, or otherwise use for his / her own benefit or the benefit of any other person or entity, any trade secrets or other confidential or proprietary information obtained by Employee by virtue of his / her employment with Baby Safe Homes, in any manner whatsoever, any such information of any kind, nature, or description concerning any matters affecting or relating to the Baby Safe Homes business, or in the business of any of its customers or prospective customers, except as required in the course of his / her employment by Baby Safe Homes or except as expressly authorized Baby Safe Homes Franchise Corporation, in writing.nDuring any period of evaluation with Baby Safe Homes, and for two (2) years thereafter, Applicant shall not, directly or indirectly, induce or influence, divert or take away, or attempt to divert or take away and, during the stated period following termination of employment, call upon or solicit, or attempt to call upon or solicit, any of the customers or patrons Baby Safe Homes including, but not limited to, those upon whom he / she was directly involved, or called upon, or catered to, or with whom became acquainted while engaged in the franchise evaluation process of a Baby Safe Homes franchise business.
«It is important that the data collected is made available only to persons or institutions authorized by law to access the data and used only for the purposes for which the data was collected,» he added.
Another relief being sought by the plaintiff is a declaration that the «ratification by Parliament of the supposed agreement between Ghana and the Government of United States of America on Defence Cooperation, the Status of United States Forces, and Access to and use of agreed facilities and areas in the Republic of Ghana (hereinafter referred to as Defence Co-operation Agreement) on March 24, 2018, when the supposed agreement had not been executed by the President or person authorized by the President as provided for by Article 75 of the 1992 constitution, is contrary to the said Article 75 of the 1992 constitution and same is null and void.»
A «Secure Proxy Server» must require authentication (a person must enter a username and password that proves they are an Authorized User permitted to access the Licensed Materials remotely).
A direct affiliation with the Licensee may include, for example, (a) current employees whether on a permanent, temporary, contract, or visiting basis, but excluding employees at a foreign affiliate or constituent university and (b) individuals who are: (1) officially enrolled as a registered student at the Licensee's institution; (2) authorized to use the library network from within the library premises or from such other places where such persons work or study (including but not limited to offices and homes, halls of residence, and student dormitories) and who have been issued by the Licensee with a password or other authentication method for such use of the library network, but (3) excluding students at a foreign affiliate or constituent university; or (c) walk - in users who are permitted to use Licensee's library or information service and permitted to access the library network but only from computer terminals within the Licensee's library premises («Authorized Userauthorized to use the library network from within the library premises or from such other places where such persons work or study (including but not limited to offices and homes, halls of residence, and student dormitories) and who have been issued by the Licensee with a password or other authentication method for such use of the library network, but (3) excluding students at a foreign affiliate or constituent university; or (c) walk - in users who are permitted to use Licensee's library or information service and permitted to access the library network but only from computer terminals within the Licensee's library premises («Authorized UserAuthorized Users»).
Recent trials testing transplants of fecal microbes from the healthy to the sick have been so promising that people are attempting dangerous do - it - yourself fecal transplants by enema, for lack of access to authorized medical procedures.
In the event of a dispute regarding any entry, the entry will be deemed made by the authorized account holder of the e-mail address submitted at the time of entry (i.e., the person who is assigned to an e-mail address by an Internet access provider, on - line service provider or other organization responsible for assigning e-mail addresses for the domain associated with the submitted e-mail address).
Further, regular audits of internal PACS and ARFSS activities track actions even by authorized users, to reveal if such persons are accessing data inappropriately.
Access is only authorized, however, if the system simultaneously identifies the Comfort Access control unit (the key), which the person must be carrying with them.
To purchase, email Natalie Jefferson at Kobo with the store name, city and state, and the name and email address of the person authorized to purchase devices and accessories; Natalie will send further instructions for accessing the corporate site.
Also, do you want to «lock» the e-book in any manner and use technological measures to ensure that only authorized persons may access, reproduce or forward copies of your e-book?
Simply put, an authorized user is someone who is granted access to another person's credit card account.
If that consumer decides that they do want to apply for the offer, they will fill out the application and authorize the bank to perform a hard pull which grants them full access to the person's credit report to be used in the approval process.
Use passwords and enhanced login features to verify only authorized persons are accessing account information
You further authorize your Administrator to add other persons as users of your Online Banking Services and designate which of your business Accounts they may access and the level of activity in which they can engage in such accounts («Sub-Users»).
A right - of - way granted to a person or company authorizing access to or over the owner's land.
An «authorized user», on the other hand, is the person who has been given access to an account as a user.
«You,» «your,» and «yourself» mean each applicant for the Account; any person responsible for paying the Account; and anyone You authorize to use, access or service the Account.
As an authorized user, you receive your own card for access to another person's account.
If you permit another person to have access to your Card, Card Number, PIN, or CVV, we will treat this as if you have authorized such use and you will be liable for all transactions and fees resulting in that authorized user's activity until you contact us to revoke that person's authority.
Authorized users are a convenience for the account owner who wishes to allow a spouse, child or other person access to the credit card account.
Share access to your pets with other authorized people, like family and friends.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
No person shall sell, exchange, barter, trade, lease, rent, give away, display or transfer any animal on any roadside, public right - of - way, parkway, median, park, playground, flea market, commercial or retail parking lot, or property adjacent to such locations, that is generally accessible to the public, regardless of whether such access is authorized or not.
If you want to bring more people, an authorized user card for lounge access costs only $ 50 a year.
I think that utilizing the authorized user benefits of these cards is one of the best ways to maximize the value of travel benefits, because it can work out to getting a near 90 % discount for multiple people on lounge access!
(a) an electronic or physical signature of the person authorized to act on your behalf; (b) a description of the material that has been removed or to which access has been disabled and where the material was located online before it was removed or access to it was disabled; (c) a written statement by you that under penalty of perjury, that you have a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled; and (d) your address, telephone number, and email address; and (e) a statement that you consent to the jurisdiction of federal district court for the judicial district in which the address is located, or if your address is outside of the United States, for any judicial district in which the service provider may be found, and that you will accept service of process from the person who provided notification under DMCA 512 subsection (c)(1)(c) or an agent of such person.
You agree not to engage in any of the following prohibited activities: (i) copying, distributing, or disclosing any part of the Service in any medium, including without limitation by any automated or non-automated «scraping»; (ii) using any automated system, including without limitation «robots,» «spiders,» «offline readers,» etc., to access the Service in a manner that sends more request messages to the Company servers than a human can reasonably produce in the same period of time by using a conventional on - line web browser (except that Humble Bundle grants the operators of public search engines revocable permission to use spiders to copy materials from Humble Bundle for the sole purpose of and solely to the extent necessary for creating publicly available searchable indices of the materials, but not caches or archives of such materials); (iii) transmitting spam, chain letters, or other unsolicited email; (iv) attempting to interfere with, compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (v) taking any action that imposes, or may impose in our sole judgment an unreasonable or disproportionately large load on our infrastructure; (vi) uploading invalid data, viruses, worms, or other software agents through the Service; (vii) collecting or harvesting any personally identifiable information, including account names, from the Service; (viii) using the Service for any commercial solicitation purposes; (ix) impersonating another person or otherwise misrepresenting your affiliation with a person or entity, conducting fraud, hiding or attempting to hide your identity; (x) interfering with the proper working of the Service; (xi) accessing any content on the Service through any technology or means other than those provided or authorized by the Service; (xii) bypassing the measures we may use to prevent or restrict access to the Service, including without limitation features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein; (xiii) sell, assign, rent, lease, act as a service bureau, or grant rights in the Products, including, without limitation, through sublicense, to any other entity without the prior written consent of such Products» (defined below) licensors; (xiv) circumventing Service limitations on the number of Products you may purchase, including, without limitation, creating multiple accounts and purchasing a total number of Products through such multiple accounts which exceed the per - user limitations; or (xv) except as otherwise specifically set forth in a licensor's end user license agreement, as otherwise agreed upon by a licensor in writing or as otherwise allowed under applicable law, distributing, transmitting, copying (other than re-installing software or files previously purchased by you through the Service on computers, mobile or tablet devices owned by you, or creating backup copies of such software or files for your own personal use) or otherwise exploiting the Products (defined below) in any manner other than for your own private, non-commercial, personal use.
Only authorized campus officials and law enforcement officers in the performance of their official duties during a missing person investigation may have access to this information.
It would only be a crime if the person who copied the mails did not have authorized access to the computer system.
The authorized account subscriber is the natural person who is assigned an e-mail address by an Internet access provider, on - line service provider, or other organization responsible for assigning e-mail addresses for the domains associated with the submitted e-mail addresses.
As readers of Publishing Perspectives know, the purpose of this international treaty is to facilitate access to published works for people who are «blind, visually impaired or otherwise print disabled» by creating a universal copyright exception that will allow authorized parties to «travel» accessible formats to appropriate consumers.
c. Is accessible so as to be usable for subsequent reference by any person who is entitled to have access to the document or who is authorized to require its production.
(1) Every person who contravenes subsection 110 (1)(identity of offender not to be published), 111 (1)(identity of victim or witness not to be published), 118 (1)(no access to records unless authorized) or 128 (3)(disposal of R.C.M.P. records) or section 129 (no subsequent disclosure) of this Act, or subsection 38 (1)(identity not to be published), (1.12)(no subsequent disclosure), (1.14)(no subsequent disclosure by school) or (1.15)(information to be kept separate), 45 (2)(destruction of records) or 46 (1)(prohibition against disclosure) of the Young Offenders Act, chapter Y - 1 of the Revised Statutes of Canada, 1985, (a) is guilty of an indictable offence and liable to imprisonment for a term not exceeding two years; or (b) is guilty of an offence punishable on summary conviction.
A school is required to have a policy on who are authorized to use its computers to which a person under the age of 18 years has access and to monitor the use that persons under the age of 18 years make of those computers.
(f) establish the manner in which persons who are authorized to deliver electronic documents by direct electronic transmission shall access the electronic land registration database and establish the manner in which authorization shall be assigned to them for that purpose.
(c) establish the manner in which persons who are authorized to deliver electronic documents by direct electronic transmission shall access the electronic land registration database and establish the manner in which authorization shall be assigned to them for that purpose;
A person commits computer crime if the person knowingly:... (e) Without authorization or in excess of authorized access alters, damages, interrupts or causes the interruption or impairment of the proper functioning of, or causes any damage to, any computer, computer network, computer system, computer software, program, application, documentation, or data contained in such computer, computer network, or computer system or any part thereof.
[50] The questions ranged from how, generally, clients and potential clients can be better served, to whether access to legal services can be improved by authorizing persons without a full law school education and law license to provide them, to what insights can be gained from innovations in other professions and industries.
The VIQ Solutions Inc. product produces a digital file of the vive voce evidence which can be automatically sent using a secure Internet protocol to a specified server, which acts as a secure portal through which authorized persons can access the digital audio file.
When an individual is not an authorized person, this restriction effectively prohibits the clinical laboratory from providing an individual access to this information.
Comment: Several commenters urged that the proposed standard for deceased individuals be clarified to allow access by a family member who has demonstrated a legitimate health - related reason for seeking the information when there is no executor, administrator, or other person authorized under applicable law to exercise the right of access of the individual.
a b c d e f g h i j k l m n o p q r s t u v w x y z