Also found in: Dictionary, Thesaurus, Acronyms, Wikipedia.
References in periodicals archive ?
The names of 242 unauthorized firms/persons have been published by the central bank since August 1998.
That 5-part definition is a more comprehensive, accurate, and usable definition to use when deciding whether an unauthorized commitment has occurred.
Password-protected files: These can be used to protect spreadsheets, for example, from unauthorized access.
Vulnerability Identification -- Conduct a technical assessment to detect vulnerabilities and to check how effective the controls are preventing unauthorized access due to those vulnerabilities.
The guidance provides that "when a financial institution becomes aware of an incident of unauthorized access to sensitive customer information, the institution should conduct a reasonable investigation to promptly determine the likelihood that the information has been or will be misused.
Storage media protection and authentication controls at the storage system and media levels can provide strong barriers against unauthorized stored data disclosure, theft, and corruption.
Public access properties, such as shopping centers, sports stadiums or office complexes, will have digital and infrared scanning cameras linked by LAN and microwave to multi-gigabyte processing centers capable of detecing a theft or assault in progress or the arrival of an unauthorized vehicle or individual.
E-mail sent over the Internet is not secure, and computer systems connected to the Internet are open to unauthorized access.
Together, these audit trails, when compared, clearly identify any unauthorized changes.
Macrovision develops technologies for the protection of video information from unauthorized copying and unauthorized viewing.
Fortune 500 businesses can now detect, validate and report unauthorized changes and out-of-policy actions on the entire IT infrastructure, in realtime, making immediate and effective correction a reality.
Environmental vulnerabilities include unavailable or compromised management that leads to either unavailable data or unauthorized access, unauthorized use of management that leads to unauthorized third-party access, unauthorized changes of the management application that leaves access open, and more.