Cyber harassment is a crime of the fourth degree, unless the person is 21 years of age or older at the time of the offense and impersonates a minor for the purpose of cyber-harassing a minor, in which case it is a crime of the third degree.
Cyber privacy breaches; hacking; and technology malfunction or damage.
Cyber. The Organization may offer or promote online programming (such as webinars, remote conferences, workshops, and online training) which have different foreseeable and unforeseeable risks than in-person programming. These risks include privacy breaches, hacking, technology malfunction or damage.
Cyber. Sending unkind messages, posting images without their consent, kicking them out from a game or a group chat, being emotionally, verbally or racially abusive to or about them in chat rooms or on social media.
Cyber. If a vendor is “getting into” County computer systems For all labor categories in the Information Technology Labor category. Policy Limit:
6.2.14.1 The policy shall be issued with minimum limits of $100,000.
6.2.14.2 The policy shall include coverage for all directors, officers, agents and employees of the Contractor.
6.2.14.3 The policy shall include coverage for third party risk fidelity.
6.2.14.4 The policy shall include coverage for cyber theft.
6.2.14.5 The policy shall contain no requirement for arrest and conviction.
6.2.14.6 The policy shall cover loss outside the premises of the Named Insured.
6.2.14.7 The policy shall endorse (Blanket Endorsements are not acceptable) the Department as Loss Payee as our interest may appear.
Cyber. 1. Subject only to paragraph 3 below, in no case shall this insurance cover loss, damage, liability or expense directly or indirectly caused by or contributed to by or arising from the use or operation, as a means for inflicting harm, of any computer, computer system, computer software programme, malicious code, computer virus, computer process or any other electronic system.
2. Subject to the conditions, limitations and exclusions of the policy to which this clause attaches, the indemnity otherwise recoverable hereunder shall not be prejudiced by the use or operation of any computer, computer system, computer software programme, computer process or any other electronic system, if such use or operation is not as a means for inflicting harm.
3. Where this clause is endorsed on policies covering risks of war, civil war, revolution, rebellion, insurrection, or civil strife arising therefrom, or any hostile act by or against a belligerent power, or terrorism or any person acting from a political motive, paragraph 1 shall not operate to exclude losses (which would otherwise be covered) arising from the use of any computer, computer system or computer software programme or any other electronic system in the launch and/or guidance system and/or firing mechanism of any weapon or missile.
Cyber. The City will not be responsible for providing Supplier any cybersecurity or related coverage.
Cyber. ‘Cyber’ refers to the virtual online world, which can be accessed through a variety of technology mediums (e.g. computers, tablets, and smartphones).
Cyber. AND SRC CUSTOMERS Government End Users (exclusivity with TSI during term of Agreement): House Permanent Select Committee on Intelligence SCCI Central Intelligence Agency National Security Agency (2) National Reconnaissance Office NGIA (National Imagery and Mapping Agency) Defense Threat Reduction Army G-2 Army Space and Missile Command Army Communications-Electronics Command NAVAIRSYSCOM Space and Naval Warfare Systems Command Air Force Air Force Logistics Command Air Force Systems Command Homeland (Coast Guard-Border Patrol) DoD Battlespace DOD Acquisition, Technology and Logistics US Coast Guard Homeland Defense Border Protection/Customs Office of Secretary of Defense Iraq Command Southcom- Army Air Force Special Operations Command US Air Force Israel Air Force Israel Defense Force Federal Aviation Administration Army Security and Intel Department of Energy Non-Government End Users (no exclusivity and right to Sales Commission based on acceptance of Purchaser Order):