Find the word definition

Longman Dictionary of Contemporary English
unauthorized
adjective
COLLOCATIONS FROM OTHER ENTRIES
unauthorized absence (=that you do not have permission for)
▪ With the older pupils, unauthorized absence increased.
unauthorized entry (=when someone gets into a place where they are not allowed)
▪ There was a big sign on the door saying NO UNAUTHORIZED ENTRY.
EXAMPLES FROM OTHER ENTRIES
▪ Her biography of Sinatra was unauthorized.
▪ This area is closed to all unauthorized persons.
EXAMPLES FROM CORPUS
▪ An author who does not register a copyright will not be able to maintain a suit against anyone who makes unauthorized copies.
▪ Congress also allows the Department of Transportation to reference additional but unauthorized amounts in full-funding agreements.
▪ Other hallways have warning signs prohibiting unauthorized entry.
▪ Pro-Mobutu troops surrounded the parliament building with tanks and armoured vehicles on Oct. 5 to protect this unauthorized session.
▪ Shelley goes, too, and she and her aunt slip away on an unauthorized escapade.
▪ The security programs typically alert users with warning messages whenever an unauthorized program is attempting to send information out into the Internet.
▪ These new steps will also ensure that Verio customer information is not disclosed to unauthorized parties.
▪ Thus it has no power to determine whether unauthorized interceptions are taking place.
Douglas Harper's Etymology Dictionary
unauthorized

1590s, from un- (1) "not" + past participle of authorize (v.).

Wiktionary
unauthorized

a. 1 not having any authority 2 without official authorization

WordNet
unauthorized
  1. adj. not endowed with authority [syn: unauthorised] [ant: authorized]

  2. without official authorization; "an unauthorized strike"; "wildcat work stoppage" [syn: unauthorised, wildcat]

Usage examples of "unauthorized".

The Commissioners are referring only to experimentation in England, where unauthorized painful experimentation is contrary to law--certainly not to America, where no Government supervision of any kind is to be found.

For unauthorized dealing in the trophies of certain scheduled wild game, as opposed to mere poaching or hunting, for buying and reselling and exporting, the maximum penalty will be twelve years at hard labour and a fine not exceeding one hundred thousand dollars.

Malware may look innocent enough, may even be a Word document or PowerPoint presentation, or any program that has macro functionality, but it will secretly install an unauthorized program.

These procedures mitigate the possibility that employees will be duped into revealing sensitive information to unauthorized persons.

Ordinarily, unauthorized disclosure of Internal information is not expected to cause serious harm to the company, its shareholders, its business partners, its customers, or its employees.

However, persons adept in social engineering skills can use this information to masquerade as an authorized employee, contractor, or vendor to deceive unsuspecting personnel into providing more sensitive information that would result in unauthorized access to corporate computer systems.

Distribution of Confidential information Policy: Confidential information, which is company information that could cause substantial harm if obtained by unauthorized persons, may be delivered only to a Trusted Person who is authorized to receive it.

A call trace should be initiated when the caller is clearly attempting to gain unauthorized access to corporate computer systems or requesting Sensitive information.

Computer intruders frequently pose as hardware or software vendors in an attempt to dupe information technology personnel into creating unauthorized accounts.

Encryption of off-site backup data Policy: Any company data that is stored off site should be encrypted to prevent unauthorized access.

This policy is necessary to prevent password guessing by trial and error, dictionary attacks, or brute force attempts to gain unauthorized access.

This policy is a necessary control to prevent password guessing by trial and error, dictionary attacks, or brute force attempts to gain unauthorized access.

An employee who becomes aware that messages they have never listened to are not being announced as new messages must assume that another person has obtained unauthorized access to the voice mailbox and listened to the messages themselves.

When necessary, passwords may be saved using an encryption utility approved by the IT department to prevent any unauthorized disclosures.

Riot Act: if this unauthorized assembly does not disperse instantly, every man woman or child is liable for arrest and .