Cyber Liability (Network Security Sample Clauses

Cyber Liability (Network Security. Privacy Liability) shall be a limit of not less than Five Million Dollars ($5,000,000) per claim subject to policy terms, conditions, and limitations. The network security/privacy liability coverage exposures shall include, but not be limited to: Coverage for unauthorized access, denial of service attacks, computer viruses, Trojan horses, worms, transmission of any other type of malicious or damaging code, and failure of security; Hostile action or threat of hostile action with the intent to affect, alter, copy, corrupt, destroy, disrupt, damage, or provide unauthorized access/unauthorized use of a computer system, including exposing or publicizing confidential electronic data or causing electronic data to be inaccessible; Dishonest, fraudulent, malicious, or criminal use of a computer system by a person, whether identified or not, and whether acting alone or in collusion with other persons, to affect, alter, copy, corrupt, delete, disrupt, or destroy a computer system or obtain financial benefit for any party or to steal or take electronic data; Denial of service for which the Contractor is responsible that results in the degradation of or loss of access to internet or network activities or normal use of a computer system; Loss of service for which the Contractor is responsible that results in the inability of a third party, which is authorized to do so, to gain access to a computer system and conduct normal internet or network activities; Failure to prevent access to a computer system or computer system resources by an unauthorized person or an authorized person in an unauthorized manner; Breach of privacy and the failure to protect and disclosure of personally identifiable information, and health information no matter how such loss occurs; Violation of privacy regulations, as defined by the insurance policy, in connection with the protection of information; Coverage shall not exclude the Authority’s notification and crisis management costs, identity theft monitoring and regulatory defense; Disclosure of any third party’s proprietary information including liability for interruption of Authority or any third party’s business including claims for loss of use. Continuous coverage shall be maintained, or an extended reporting period will be exercised for a period of not less than three years from termination or expiration of this Contract. The retroactive date shall precede the effective date of this Contract. The Metropolitan Washington Airports Authority s...
AutoNDA by SimpleDocs
Cyber Liability (Network Security. Privacy Liability coverage with limits not less than $3,000,000 for liability and damages resulting from any misuse, misappropriation, unauthorized disclosure or other breach of private information and personally identifiable information, arising from the Company’s or its subcontractor’s performance of services. Such damages shall include notification costs and/or forensics costs, fines, penalties, and related damages.

Related to Cyber Liability (Network Security

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • -wire Unbundled Digital/DS0 Loop These are designed 4-wire Loops that may be configured as 64kbps, 56kbps, 19kbps, and other sub-rate speeds associated with digital data services and will come standard with a test point, OC, and a DLR.

  • Out-of-Network Services We Cover the services of Non-Participating Providers. See the Schedule of Benefits section of this Contract for the Non-Participating Provider services that are Covered. In any case where benefits are limited to a certain number of days or visits, such limits apply in the aggregate to in-network and out-of-network services.

  • Network Services Preventive care: 100% coverage. Preventive services include, but are not restricted to routine physical exams, routine gynecological exams, routine hearing exams, routine eye exams, and immunizations. A $100 single and $200 family combined annual deductible will apply to lab/diagnostic testing after which 100% coverage will apply. A $50 copay will apply to CT and MRI scans.

  • Wire Unbundled DS1 Digital Loop This is a designed 4-wire Loop that is provisioned according to industry standards for DS1 or Primary Rate ISDN services and will come standard with a test point, OC, and a DLR. A DS1 Loop may be provisioned over a variety of loop transmission technologies including copper, HDSL-based technology or fiber optic transport systems. It will include a 4-Wire DS1 Network Interface at the End User’s location.

  • FTTP Loop A Loop consisting entirely of fiber optic cable, whether dark or lit, that extends from the main distribution frame (or its equivalent) in an end user’s serving End Office to the demarcation point at the end user’s customer premises or to a serving area interface at which the fiber optic cable connects to copper or coaxial distribution facilities that extend to the end user's customer premises demarcation point, provided that all copper or coaxial distribution facilities extending from such serving area interface are not more than 500 feet from the demarcation point at the respective end users' customer premises; provided, however, that in the case of predominantly residential multiple dwelling units (MDUs), an FTTP Loop is a Loop consisting entirely of fiber optic cable, whether dark or lit, that extends from the main distribution frame (or its equivalent) in the End Office that serves the multiunit premises: (a) to or beyond the multiunit premises’ minimum point of entry (MPOE), as defined in 47 C.F.R. § 68.105; or

  • Verizon OSS Services Access to Verizon Operations Support Systems functions. The term “Verizon OSS Services” includes, but is not limited to: (a) Verizon’s provision of Z-Tel Usage Information to Z-Tel pursuant to Section 8.1.3 below; and, (b) “Verizon OSS Information”, as defined in Section 8.1.4 below.

  • Conversion of Wholesale Services to Network Elements or Network Elements to Wholesale Services Upon request, BellSouth shall convert a wholesale service, or group of wholesale services, to the equivalent Network Element or Combination that is available to Global Dialtone pursuant to Section 251 of the Act and under this Agreement or convert a Network Element or Combination that is available to Global Dialtone pursuant to Section 251 of the Act and under this Agreement to an equivalent wholesale service or group of wholesale services offered by BellSouth (collectively “Conversion”). BellSouth shall charge the applicable nonrecurring switch-as-is rates for Conversions to specific Network Elements or Combinations found in Exhibit A. BellSouth shall also charge the same nonrecurring switch-as-is rates when converting from Network Elements or Combinations. Any rate change resulting from the Conversion will be effective as of the next billing cycle following BellSouth’s receipt of a complete and accurate Conversion request from Global Dialtone. A Conversion shall be considered termination for purposes of any volume and/or term commitments and/or grandfathered status between Global Dialtone and BellSouth. Any change from a wholesale service/group of wholesale services to a Network Element/Combination, or from a Network Element/Combination to a wholesale service/group of wholesale services, that requires a physical rearrangement will not be considered to be a Conversion for purposes of this Agreement. BellSouth will not require physical rearrangements if the Conversion can be completed through record changes only. Orders for Conversions will be handled in accordance with the guidelines set forth in the Ordering Guidelines and Processes and CLEC Information Packages as referenced in Sections 1.13.1 and 1.13.2 below.

  • Registration Data Directory Services Until ICANN requires a different protocol, Registry Operator will operate a WHOIS service available via port 43 in accordance with XXX 0000, and a web-­‐based Directory Service at <whois.nic.TLD> providing free public query-­‐based access to at least the following elements in the following format. ICANN reserves the right to specify alternative formats and protocols, and upon such specification, the Registry Operator will implement such alternative specification as soon as reasonably practicable. Registry Operator shall implement a new standard supporting access to domain name registration data (SAC 051) no later than one hundred thirty-­‐five (135) days after it is requested by ICANN if: 1) the IETF produces a standard (i.e., it is published, at least, as a Proposed Standard RFC as specified in RFC 2026); and 2) its implementation is commercially reasonable in the context of the overall operation of the registry.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!