authorized user


Also found in: Financial, Acronyms.

authorized user

Radiation physics A person who, having satisfied the applicable training and experience requirements, is granted authority to order radioactive material and accepts responsibility for its safe receipt, storage, use, transfer and disposal
References in periodicals archive ?
But outside of a spousal relationship, the value of this information is less clear since the authorized user is not responsible for paying the account.
Further illustrated, that is if, in the initial stage, authorized users use the channel detected by the sensing users mentioned in the last stage, then SU1 and SU2 must stop detecting and give the right back to the authorized users since they have lower priority than the authorized users.
Through feedback from lenders, Fair Isaac thought it would be best to add authorized user accounts, particularly in light of the Equal Credit Opportunity Act, says John Ulzheimer, president of Consumer Education for Credit.com, a credit information Website.
The arrangement does not allow the authorized user to make purchases on the card nor does the authorized user have access to any of the personal information associated with the account.
* In Samples A, all three loci were consistent with the authorized user's, but STR profiles that did not belong to this user were also discovered.
The eBoard module uses eOPF technology to allow authorized users, such as board members, to access and view folders identified for use by specific boards.
"Many young people have authorized user accounts because their parents wanted to help them establish credit.
The most common security violation is born out of courtesy, where the authorized user holds the door open to permit entry by another who has also approached the door.
"What this illustrates is that before you cosign for another person or add a person as an authorized user on your account, you have to think it through and understand that if he or she defaults, you've essentially entered into a joint account arrangement, so you're responsible," says Greg McBride, senior financial analyst with Bankrate.com.
The assumption is that a hacker might gain access to a network, intercept communications, and pretend to be an authorized user. Such security and privacy invasions actually are not as common today as more direct attacks against Web servers or client software.
To gain aisle access, an authorized user enters a four-digit code on the 10-digit keypad that is mounted on the end of the desired aisle.
Remove hold and remove suspend milestones must be recorded by an authorized user to release the hold or suspend on the case.

Full browser ?