Sentences with phrase «preventing fraudulent use»

The personally identifiable information we collect online is also used for verification of your identity while taking our online course to prevent fraudulent use and, when applicable, for accurate certificate processing with your court.
Where the item is not received, Amazon may register the IMEI with loss and theft databases to help prevent any fraudulent use or reselling of the item.
This will prevent any fraudulent use of the malleability issue and protect the assets of our customers.»

Not exact matches

But what's garnered less attention is the innovative security framework the feature uses to prevent fraudulent transactions and data theft.
Uber revealed that it is still using a form of device fingerprinting to prevent the app from being used in fraudulent ways, but Uber has modified it to comply with the privacy rules of Apple.
There are many applications of the tool, including testing new Uber features by the company's employees, launching marketing initiatives, preventing fraudulent activities, protecting drivers from physical harm, and deterring riders from using the Uber app in ways that violate Uber's terms of service.
The values underpinning the constitutional and other legal exclusionary rules on evidence was to prevent such unconstitutionality by using unlawful and fraudulent private anti-corruptionpreneurs like the CEO of the dummy Tiger Eye or its other illegal variant.
Additionally, we may disclose Personal Information where we, in good faith, deem it appropriate or necessary to (1) prevent violation of the Terms of Use, or our other agreements; (2) take precautions against liability; (3) protect our rights, property, or safety, or those of a third party, any individual or the general public; (4) maintain and protect the security and integrity of our services or infrastructure; (5) protect ourselves and our services from fraudulent, abusive, or unlawful uses; (6) investigate and defend ourselves against third party claims or allegations; or (7) assist government regulatory agencies.
This Identity Theft Report can be used to (1) permanently block fraudulent information from appearing on your credit report; (2) ensure that debts do not reappear on your credit report; (3) prevent a company from continuing to collect debts that result from identity theft; and (4) place an extended fraud alert on your credit report.
Also known as the Cardholder Verification Value (CVV) or Customer Identification Number (CID / 4DBC), these three or four digit numbers help ensure that the physical card is in the cardholder's possession while donating or shopping online helping to prevent unauthorized or fraudulent use.
The MIB is a confidential database that is used by insurance companies to detect and prevent fraudulent and misrepresentative applications for insurance.
By using the Site you agree not to: (i) use this Site or its contents for any commercial purpose; (ii) make any speculative, false, or fraudulent transaction or any transaction in anticipation of demand; (iii) access, monitor or copy any content or information of this Site using any robot, spider, scraper or other automated means or any manual process for any purpose without our express written permission; (iv) violate the restrictions in any robot exclusion headers on this Site or bypass or circumvent other measures employed to prevent or limit access to this Site; (v) take any action that imposes, or may impose, in our discretion, an unreasonable or disproportionately large load on our infrastructure; (vi) deep - link to any portion of this Site (including, without limitation, the purchase path for any service) for any purpose without our express written permission; or (vii) «frame», «mirror» or otherwise incorporate any part of this Site into any other website without our prior written authorization.
You agree not to do any of the following: (A) post or transmit any libelous, defamatory, indecent, obscene, fraudulent, deceptive, abusive or pornographic message, data, image, content or program; (B) post or transmit any message, data, image, content or program that would violate any property rights of others; (C) use the Services to threaten, harass, or otherwise violate the legal rights (including rights of privacy and publicity) of others; (D) upload or download files that contain software, marks, logos, data, images, content or other material protected by intellectual property laws, rights of privacy or publicity, or any other applicable law, unless you own or control the rights to such files or material or have received all necessary consents; (E) upload files that contain a virus or corrupted data; (F) falsify the source or origin of software or other material contained in a file that you upload to the Services; (G) falsely purport to be an employee or agent of Gigaom; (H) act, in your use of the Services, in a manner that is contrary to applicable law or regulation; or (I) circumvent, disable or otherwise interfere with security - related features of the Services or features that prevent or restrict use or copying of any Content or enforce limitations on use of the Services or the Content.
Unique bitcoin addresses must be used for each interaction or transaction to prevent any fraudulent activity taking place.
a b c d e f g h i j k l m n o p q r s t u v w x y z