Examples of Covered Computer System in a sentence
Payments made to any person(s) who has threatened to deny or has denied authorized access to a Covered Computer System or otherwise has threatened to disrupt the business of the Insured.
Payments made to any person(s) who has threatened to deny or has denied authorized access to a Covered Computer System or otherwise has threatened to disrupt the business of the Insured.For purposes of this Insuring Agreement, "Single Loss," as defined in Section 1.X of this Bond, shall also include all loss caused by Computer Fraud(s) committed by one person, or in which one person is implicated, whether or not that person is specifically identified.
Loss resulting from Computer Fraud committed by means of wireless access to any Covered Computer System, or any part thereof, or any data, data elements or media associated therewith.
Loss resulting from physical damage to or destruction of any Covered Computer System, or any part thereof, or any data, data elements or media associated therewith.
Neither any Agent, the Joint Book Runners, or any Joint Lead Arranger nor any of their respective Related Parties shall have any duties or obligations except those expressly set forth herein and in the other Loan Documents.
Payments made to any person(s) who has threatened to deny or has denied authorized access to a Covered Computer System or otherwise has threatened to disrupt the business of the Insured.For purposes of this Insuring Agreement, “Single Loss,” as defined in Section 1.EE of this Bond, shall also include all loss caused by Computer Fraud(s) committed by one person, or in which one person is implicated, whether or not that person is specifically identified.
VERIFICATION AND RECONSTITUTION EXPENSES Expense incurred by the Insured with the prior written approval by the Insurer (such approval not to be unreasonably withheld or unduly delayed), for the verification or reconstitution or removal of data or programs or the removal of Malicious Code within a Covered Computer System following a paid loss under Insuring Agreement J of this Bond.
This exclusion shall not apply to any loss resulting from unauthorized entry of data into, or the deletion or destruction of data in, or change of data elements or programs within, a Covered Computer System by an Authorized User or by any other person or entity listed in (2) or (3) above.
Any loss resulting from physical damage to or destruction of any Covered Computer System, or any part thereof, or any data, data elements or media associated therewith.
Any loss resulting from Computer Fraud committed by means of wireless access to any Covered Computer System, or any part thereof, or any data, data elements or media associated therewith.