Cyber Risks definition

Cyber Risks include but are not limited to (i) Security Breach, which may include Disclosure of Personal Information to an Unauthorized Third Party; (ii) data breach; (iii) breach of any of the Consultant’s obligations under [identify the Article, section, or appendix containing data security obligations] of this Agreement;
Cyber Risks include but are not limited to (1) security breach; (2) data breach; (3) system failure; (4) data recovery; (5) failure to timely disclose data breach or security breach; (6) failure to comply with privacy policy; (7) business interruption;
Cyber Risks include but are not limited to (i) any act or omission that compromises either the security, confidentiality, value, or integrity of any PHI, which may include disclosure of Confidential Information or PHI (collectively, “Personal Information”) to an unauthorized third party or any loss or destruction of, or any corruption or damage to, any Personal Information (“Security Breach”); (ii) any act or

Examples of Cyber Risks in a sentence

  • Coverage must include, but not be limited to, claims involving Cyber Risks.

  • Coverage must encompass all of the Contractor’s obligations under this Agreement, including but not limited to claims involving Cyber Risks.

  • Coverage must encompass all of the Consultant’s obligations under this Agreement, including but not limited to claims involving Cyber Risks.

  • See also: ▇▇▇▇▇▇ ▇▇▇▇▇▇▇, Cyber Risks, A review of cyber liability issues and data breach response, January 2015.

  • Coverage must encompass all of the Performing Party’s obligations under this agreement, including but not limited to claims involving Cyber Risks.


More Definitions of Cyber Risks

Cyber Risks include but are not limited to (i) Security Breach, which may include Disclosure of Personal Information to an Unauthorized Third Party; (ii) data breach; (iii) breach of any of the Contractor’s obligations under Article 11 of this Agreement; (iv) system failure; (v) data recovery; (vi) failure to timely disclose data breach or Security Breach; (vii) failure to comply with privacy policy; (viii) payment card liabilities and costs; (ix) infringement of intellectual property, including but not limited to infringement of copyright, trademark, and trade dress; (x) invasion of privacy, including release of private information; (xi) information theft; (xii) damage to or
Cyber Risks include but are not limited to (i) Security Breach, which may include Disclosure of Personal Information to an Unauthorized Third Party; (ii) data breach; (iii) breach of any of the Contractor’s obligations under Exhibit A of this Agreement; (iv) system failure; (v) data recovery; (vi) failure to timely disclose data breach or Security Breach; (vii) failure to comply with privacy policy; (viii) payment card liabilities and costs; (ix) infringement of intellectual property, including but not limited to infringement of copyright, trademark, and trade dress; (x) invasion of privacy, including release of private information; (xi) information theft; (xii) damage to or destruction or alteration of electronic information; (xiii) cyber extortion; (xiv) extortion related to the Contractor’s obligations under this Agreement regarding electronic information, including Personal Information; (xv) fraudulent instruction; (xvi) funds transfer fraud; (xvii) telephone fraud; (xviii) network security; (xix) data breach response costs, including Security Breach response costs; (xx) regulatory fines and penalties
Cyber Risks include but are not limited to (i) Security Breaches, which may include Disclosure of Personal Information to an Unauthorized Third Party; (ii) breach of any of the Consultant’s obligations under Article 10 of this Agreement; (iii) infringement of intellectual property, including but not limited to infringement of copyright, trademark, and trade dress; (iv) invasion of privacy, including release of private information; (v) information theft; (vi) damage to or destruction or alteration of electronic information; (vii) extortion related to the Consultant’s obligations under this Agreement regarding electronic information, including Personal Information;(viii) network security; (ix) data breach response costs, including Security Breach response costs; (x) regulatory fines and penalties related to the Consultant’s obligations under this Agreement regarding electronic information, including Personal Information; and (xi) credit monitoring expenses.
Cyber Risks include but are not limited to (i) any act or omission that compromises either the security, confidentiality, value, or integrity of any PHI, which may include disclosure of Confidential Information or PHI (collectively, “Personal Information”) to an unauthorized third party or any loss or destruction of, or any corruption or damage to, any Personal Information (“Security Breach”); (ii) any act or omission that compromises the physical, technical, administrative, or organizational security procedures and practices put in place by the Contractor that relate to the protection of the security, confidentiality, value, or integrity of Personal Information; (ii) breach of any of the Contractor’s obligations under Articles 11 or 12 of this Agreement;
Cyber Risks include but are not limited to (i) Security Breach, which may include Disclosure of Personal Information to an Unauthorized Third Party; (ii) data breach; (iii) breach of any of the Contractor’s obligations under this Agreement; (iv) system failure; (v) data recovery; (vi) failure to timely disclose data breach or Security Breach; (vii) failure to comply with privacy policy; (viii) payment card liabilities and costs; (ix) infringement of intellectual property, including but not limited to infringement of copyright, trademark, and trade dress; (x) invasion of privacy, including release of private information; (xi) information theft; (xii) damage to or destruction or alteration of electronic information; (xiii) cyber extortion; (xiv) extortion related to the Contractor’s obligations under this Agreement regarding electronic information, including Personal Information; (xv) fraudulent instruction; (xvi) funds transfer fraud; (xvii) telephone fraud; (xviii) network security; (xix) data breach response costs, including Security Breach response costs; (xx) regulatory fines and penalties related to the Contractor’s obligations under this Agreement regarding electronic information, including Personal Information; and (xxi) credit monitoring expenses.

Related to Cyber Risks

  • operational risk means the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events, and includes legal risk;

  • All Risks property insurance in an amount adequate to cover the full replacement cost of all Tenant Additions to the Premises, equipment, installations, fixtures and contents of the Premises in the event of loss; (d) In the event a motor vehicle is to be used by Tenant in connection with its business operation from the Premises, Comprehensive Automobile Liability Insurance coverage with limits of not less than Three Million and No/100 Dollars ($3,000,000.00) combined single limit coverage against bodily injury liability and property damage liability arising out of the use by or on behalf of Tenant, its agents and employees in connection with this Lease, of any owned, non-owned or hired motor vehicles; and (e) such other insurance or coverages as Landlord reasonably requires.