Sentences with phrase «unlawful access»

They make sure records are available to users and are safe from unlawful access at all times.
The new ruling also states that internet search engines, web hosting sites, internet service providers (ISPs), domain name registrars and domain name registries cease facilitating «any or all domain names and websites through which Defendant Sci - Hub engages in unlawful access to, use, reproduction, and distribution of the ACS Marks or ACS's Copyrighted Works.»
: Some people take and alter photo identification badges to gain unlawful access to secure areas.
PIPEDA permits the collection and use of personal information without consent in exceptional circumstances, but those exceptions do not apply to an electronic address that was collected by a computer program designed to collect electronic addresses (a process known as «address harvesting») or by unlawful access to a computer system.
This finding was supported by the Court's observation that the rules in the Directive were not tailored to the vast quantity of sensitive data retained and to the risk of unlawful access to these data [66].
British Cycling will take all steps reasonably necessary including policies, procedures and security features to ensure that your data is treated securely and protected from unauthorised and unlawful access and / or use, and in accordance with this notice.
6.1.3 Auto & General shall take appropriate and reasonable technical and organisational measures to prevent the loss of, damage to or unauthorised destruction of Data and the unlawful access to or processing of Data.
As long as the national data retention obligations do not concern the content of the electronic communications and as long as they provide for safeguards that «effectively protect personal data» retained by service providers «against the risk of abuse and against any unlawful access and use of that data» (§ 159), this requirement does not seem to create particular problems in the cases submitted to the CJEU.
Lawful access or unlawful access?
We have implemented technical and organizational security measures to protect your information from misuse, unauthorized or unlawful access or disclosure, loss, alteration, damage or destruction.
a b c d e f g h i j k l m n o p q r s t u v w x y z