Find the word definition

The Collaborative International Dictionary
Unauthorize

Unauthorize \Un*au"thor*ize\, v. t. [1st pref. un- + authorize.] To disown the authority of; to repudiate.

Wiktionary
unauthorize

vb. 1 (context transitive English) To disown the authority of; to repudiate. 2 (context transitive computing English) To withdraw authorization or permissions from.

Usage examples of "unauthorize".

In high school, one of my all-time favorite pranks was gaining unauthorized access to the telephone switch and changing the class of service of a fellow phone phreak.

Visitor access to network connections Policy: All publicly accessible Ethernet access points must be on a segmented network to prevent unauthorized access to the internal network.

Ethernet jacks installed in conference rooms, the cafeteria, training centers, or other areas accessible to visitors shall be filtered to prevent unauthorized access by visitors to the corporate computer systems.

Malware may look innocent enough, may even be a Word document or PowerPoint presentation, or any program that has macro functionality, but it will secretly install an unauthorized program.

These procedures mitigate the possibility that employees will be duped into revealing sensitive information to unauthorized persons.

Ordinarily, unauthorized disclosure of Internal information is not expected to cause serious harm to the company, its shareholders, its business partners, its customers, or its employees.

However, persons adept in social engineering skills can use this information to masquerade as an authorized employee, contractor, or vendor to deceive unsuspecting personnel into providing more sensitive information that would result in unauthorized access to corporate computer systems.

Distribution of Confidential information Policy: Confidential information, which is company information that could cause substantial harm if obtained by unauthorized persons, may be delivered only to a Trusted Person who is authorized to receive it.

A call trace should be initiated when the caller is clearly attempting to gain unauthorized access to corporate computer systems or requesting Sensitive information.

Computer intruders frequently pose as hardware or software vendors in an attempt to dupe information technology personnel into creating unauthorized accounts.

Encryption of off-site backup data Policy: Any company data that is stored off site should be encrypted to prevent unauthorized access.

This policy is necessary to prevent password guessing by trial and error, dictionary attacks, or brute force attempts to gain unauthorized access.

This policy is a necessary control to prevent password guessing by trial and error, dictionary attacks, or brute force attempts to gain unauthorized access.

An employee who becomes aware that messages they have never listened to are not being announced as new messages must assume that another person has obtained unauthorized access to the voice mailbox and listened to the messages themselves.

When necessary, passwords may be saved using an encryption utility approved by the IT department to prevent any unauthorized disclosures.