Cyber Theft Sample Clauses

Cyber Theft. If such insurance is written on a claims-made basis, the Contractor shall provide proof that the policy has an Extended Discovery Clause providing coverage for up to three (3) years after work is completed in the event that coverage is cancelled or not renewed.
AutoNDA by SimpleDocs
Cyber Theft. The term "

Related to Cyber Theft

  • Theft We will pay up to 5% of the limit of liability that applies to the dwelling for all trees, shrubs, plants or lawns. No more than $500 of this limit will be paid for any one tree, shrub or plant. We do not cover property grown for "business" purposes. This coverage is additional insurance.

  • Destruction In the event the Premises are destroyed or injured by fire or earthquake or other casualty, to the extent that they are untenantable in whole or in part, then Landlord may, at Landlord’s option, proceed with reasonable diligence to build and restore said Premises or such part thereof, provided that within thirty (30) days after such destruction or injury Landlord shall notify Tenant in writing of Landlord’s intention to do so, which notice shall also set forth Landlord’s estimated time frame for complete restoration of the Premises. If more than forty percent (40%) the Premises is unuseable and Landlord’s notice provides that repairs necessary to complete restoration of the Premises cannot be made within two hundred and seventy (270) days, or in the event Landlord commences restoration of the Premises and does not complete the same within two hundred and seventy (270) days from the date Landlord commences restoration, Tenant may terminate the Lease effective upon Landlord’s receipt of Tenant’s notice. During the period from destruction or damage to restoration, the rent shall be abated in the same ratio as that portion of the Premises which Landlord determines is unfit for occupancy bears to the whole Premises. If the Landlord shall fail to notify Tenant, then this Lease shall, at the expiration of the time for the giving of notice as herein provided, be deemed terminated. If Landlord elects not to repair or rebuild as set forth above, this Lease shall terminate without further notice, and all amounts paid or payable by Tenant to Landlord shall, where applicable, be prorated accordingly. Tenant shall vacate the Premises and all further obligations of both parties hereunder shall cease (other than those which shall theretofore have accrued), effective as of the date on which Tenant vacates the Premises.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Loss, Theft, Destruction or Mutilation of Warrant The Company covenants that upon receipt by the Company of evidence reasonably satisfactory to it of the loss, theft, destruction or mutilation of this Warrant or any stock certificate relating to the Warrant Shares, and in case of loss, theft or destruction, of indemnity or security reasonably satisfactory to it (which, in the case of the Warrant, shall not include the posting of any bond), and upon surrender and cancellation of such Warrant or stock certificate, if mutilated, the Company will make and deliver a new Warrant or stock certificate of like tenor and dated as of such cancellation, in lieu of such Warrant or stock certificate.

  • Programme Management The Government will establish a programme management office and the Council will be able to access funding support to participate in the reform process. The Government will provide further guidance on the approach to programme support, central and regional support functions and activities and criteria for determining eligibility for funding support. This guidance will also include the specifics of any information required to progress the reform that may be related to asset quality, asset value, costs, and funding arrangements.

  • PROFESSIONAL ACTIVITY DAYS 22.01 (a) A Long-Term Occasional Teacher who is scheduled to work when there is a Professional Activity Day shall be required to participate in the scheduled professional activities and shall be paid for such day.

  • Security Coordinator Provider shall provide the name and contact information of Provider’s Security Coordinator for the Student Data received pursuant to the DPA.

  • Trade Controls DXC and Supplier will comply with all applicable export, import and trade-related laws and regulations of the United States and other nations. To this effect, Supplier warrants that: (i) if necessary and upon DXC’s request, it will provide DXC with technical specifications concerning commodities, software, technology or services covered by this agreement sufficient for DXC to determine the appropriate export and import classification of such items under applicable regulations; (ii) to the best of the Supplier’s knowledge, the Supplier is not listed on any U.S. Government international trade sanctions lists and that Supplier will give immediate notice to DXC in the event that it is so listed; and

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

Time is Money Join Law Insider Premium to draft better contracts faster.