Cyber harassment is a crime of the fourth degree, unless the person is 21 years of age or older at the time of the offense and impersonates a minor for the purpose of cyber-harassing a minor, in which case it is a crime of the third degree.
Cyber privacy breaches; hacking; and technology malfunction or damage.
Cyber. The Organization may offer or promote online programming (such as webinars, remote conferences, workshops, and online training) which have different foreseeable and unforeseeable risks than in-person programming. These risks include privacy breaches, hacking, technology malfunction or damage.
Cyber. 1. Subject only to paragraph 3 below, in no case shall this insurance cover loss, damage, liability or expense directly or indirectly caused by or contributed to by or arising from the use or operation, as a means for inflicting harm, of any computer, computer system, computer software programme, malicious code, computer virus, computer process or any other electronic system.
2. Subject to the conditions, limitations and exclusions of the policy to which this clause attaches, the indemnity otherwise recoverable hereunder shall not be prejudiced by the use or operation of any computer, computer system, computer software programme, computer process or any other electronic system, if such use or operation is not as a means for inflicting harm.
3. Where this clause is endorsed on policies covering risks of war, civil war, revolution, rebellion, insurrection, or civil strife arising therefrom, or any hostile act by or against a belligerent power, or terrorism or any person acting from a political motive, paragraph 1 shall not operate to exclude losses (which would otherwise be covered) arising from the use of any computer, computer system or computer software programme or any other electronic system in the launch and/or guidance system and/or firing mechanism of any weapon or missile.
Cyber. If a vendor is “getting into” County computer systems For all labor categories in the Information Technology Labor category. Policy Limit:
6.2.14.1 The policy shall be issued with minimum limits of $100,000.
6.2.14.2 The policy shall include coverage for all directors, officers, agents and employees of the Contractor.
6.2.14.3 The policy shall include coverage for third party risk fidelity.
6.2.14.4 The policy shall include coverage for cyber theft.
6.2.14.5 The policy shall contain no requirement for arrest and conviction.
6.2.14.6 The policy shall cover loss outside the premises of the Named Insured.
6.2.14.7 The policy shall endorse (Blanket Endorsements are not acceptable) the Department as Loss Payee as our interest may appear.
Cyber. Sending unkind messages, posting images without their consent, kicking them out from a game or a group chat, being emotionally, verbally or racially abusive to or about them in chat rooms or on social media.
Cyber. Attack: a non-physical attack on the Supplier’s System or any part of it, not being any form of inherent internal shortcoming, but deliberately instigated by any person directly or indirectly (including through the actions or omissions of Customer personnel) to gain unauthorised access to electronic data and software on the Supplier’s System or any part of it, including malware (malicious software, such as spyware, ransomware, viruses, and worms), phishing attack, man-in-the-middle attack, denial-of-service attack, SQL injection, zero-day attack/exploit and DNS tunnelling. Deliverable: means all Documents, products and materials developed by the Supplier or its agents, subcontractors, consultants and employees in relation to the Services in any form, including computer programs, data, reports and specifications (including drafts). Deposit: means the deposit amount (if any) set out in the Statement of Work. Dispute Resolution Procedure: the procedure described in Clause 32. The dispute resolution is always under the exclusive jurisdiction of the courts of England and Wales. Document: means, in addition to any document in writing, any drawing, map, plan, diagram, design, picture or other image, tape, disk or other device or record embodying information in any form. EU GDPR: the General Data Protection Regulation ((EU) 2016/679) as it has effect in EU law. Fair Usage Policy: any fair usage is defined in our fair usage policy which can be found on the Supplier’s home website. Fees: the fees payable to the Supplier, as described in the Statement of Work as may be varied from time to time pursuant to the terms of this Agreement.
Cyber. The City will not be responsible for providing the Company any cyber security or related coverage.
Cyber. AND SRC CUSTOMERS Government End Users (exclusivity with TSI during term of Agreement): House Permanent Select Committee on Intelligence SCCI Central Intelligence Agency National Security Agency (2) National Reconnaissance Office NGIA (National Imagery and Mapping Agency) Defense Threat Reduction Army G-2 Army Space and Missile Command Army Communications-Electronics Command NAVAIRSYSCOM Space and Naval Warfare Systems Command Air Force Air Force Logistics Command Air Force Systems Command Homeland (Coast Guard-Border Patrol) DoD Battlespace DOD Acquisition, Technology and Logistics US Coast Guard Homeland Defense Border Protection/Customs Office of Secretary of Defense Iraq Command Southcom- Army Air Force Special Operations Command US Air Force Israel Air Force Israel Defense Force Federal Aviation Administration Army Security and Intel Department of Energy Non-Government End Users (no exclusivity and right to Sales Commission based on acceptance of Purchaser Order):