Cyber Security Risk definition

Cyber Security Risk. The DFA Real Estate Securities Portfolio’s and its service providersuse of internet, technology and information systems may expose the portfolio to potential risks linked to cyber security breaches of those technological or information systems. Cyber security breaches, amongst other things, could allow an unauthorized party to gain access to proprietary information, customer data, or fund assets, or cause the portfolio and/or its service providers to suffer data corruption or lose operational functionality.
Cyber Security Risk. The U.S. Large Cap Value Portfolio’s and its service providersuse of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information systems. Cyber security breaches, amongst other things, could allow an unauthorized party to gain access to proprietary information, customer data, or fund assets, or cause the portfolio and/or its service providers to suffer data corruption or lose operational functionality. Fees & Expenses Investment Objective
Cyber Security Risk. The portfolio’s and its service providersuse of internet, technology and information systems may expose the portfolio to potential risks linked to cyber security breaches of those technological or information systems. Cyber security breaches, amongst other things, could allow an unauthorized party to gain access to proprietary information, customer data, or fund assets, or cause the portfolio and/or its service providers to suffer data corruption or lose operational functionality. Fees & Expenses Investment Objective

Examples of Cyber Security Risk in a sentence

  • The contractor shall ensure that all the requirements meet the DoD Cyber Security Risk Management Framework (RMF) and DoDI 8500.2, Intelligence Community directive (ICD) 503, or the most current standards and guidance that are applicable.

  • The contractor shall provide application services to support maintain and operate systems or services which are compliant with the DoD Cyber Security Risk Management Framework and DoDI 8500.2, Intelligence Community Directive (ICD) 503 as applicable in the task order.

  • The contractor shall ensure that all the requirements meet the DoD Cyber Security Risk Management Framework (RMF) and DoDI 8500.2, Intelligence Community Directive (ICD) 503, or the most current standards and guidance that are applicable.

  • The contractor shall follow the DoD Cyber Security Risk ManagementFramework (RMF) or ICD 503 to accomplish the infrastructure C&A as applicable.

  • The contractor shall follow the DoD Cyber Security Risk Management Framework (RMF) or ICD 503 to accomplish the infrastructure C&A as applicable.

  • During 2019, a new Group information and cyber security strategy has been developed to align with the Group’s overall corporate strategy and drive cohesion across the Group on managing Information and Cyber Security Risk.

  • Cyber Security Risk ResilienceThe ability to anticipate, absorb, adapt to, rapidly respond to, and recover from disruption caused by a cyber-attack.

  • By continuing to ensure that the right risk behaviours are ingrained across the Group, we can focus on the Risk function’s refreshed purpose of increasing prosperity by taking the right risks.Enhance information and cyber security We continue to invest in our security capabilities to ensure that Informationand Cyber Security Risk management is embedded in each stage of the client journey.

  • TO: 4.5 Cyber Security The contractor shall ensure that all the requirements meet the DoD Cyber Security Risk Management Framework (RMF) and DoDI 8500.2, Intelligence Community Directive (ICD) 503, or the most current standards and guidance that are applicable.

  • Cyber Security Risk Measure CRA-5.8.6A licensee must ensure that comprehensive strategies and measures are in place to manage cyber security risk including prevention, detection and recovery measures.


More Definitions of Cyber Security Risk

Cyber Security Risk. A fund and its service providersuse of internet, technology and information systems may expose the fund to potential risks linked to cyber security breaches of those technological or information systems. Cyber security breaches, amongst other things, could allow an unauthorized party to gain access to proprietary information, customer data, or fund assets, or cause the fund and/or its service providers to suffer data corruption or lose operational functionality. Derivatives Risk: Derivatives are instruments, such as futures contracts, and options thereon, and foreign currency forward contracts, whose value is derived from that of other assets, rates or indices. The use of derivatives for non-hedging purposes may be considered to carry more risk than other types of investments. When a fund uses derivatives, the fund will be directly exposed to the risks of those derivatives. Derivative instruments are subject to a number of risks including counterparty, settlement, liquidity, interest rate, market, credit and management risks, as well as the risk of improper valuation. Changes in the value of a derivative may not correlate perfectly with the underlying asset, rate or index, and a fund could lose more than the principal amount invested. Emerging Markets Risk: Numerous emerging market countries have a history of, and continue to experience serious, and potentially continuing, economic and political problems. Stock markets in many emerging market countries are relatively small, expensive to trade in and generally have higher risks than those in developed markets. Securities in emerging markets also may be less liquid than those in developed markets and foreigners are often limited in their ability to invest in, and withdraw assets from, these markets. Additional restrictions may be imposed under other conditions. Frontier market countries generally have smaller economies or less developed capital markets and, as a result, the risks of investing in emerging market countries are magnified in frontier market countries. Equity Market Risk: Even a long-term investment approach cannot guarantee a profit. Economic, market, political, and issuer-specific conditions and events will cause the value of equity securities, and a fund that owns them, to rise or fall. Stock markets are volatile, with periods of rising prices and periods of falling prices. Foreign Securities and Currencies Risk: Foreign securities prices may decline or fluctuate because of: (a) economic or ...
Cyber Security Risk. The Emerging Markets Core Equity Portfolio’s and its service providersuse of internet, technology and information systems may expose the Portfolio to potential risks linked to cyber security breaches of those technological or information systems. Cyber security breaches, amongst other things, could allow an unauthorized party to gain access to proprietary information, customer data, or fund assets, or cause the portfolio and/or its service providers to suffer data corruption or lose operational functionality. Fees & Expenses
Cyber Security Risk means a threat to or vulnerability of data or information infrastructure that may permit, facilitate or result in a cyber security incident, including any attributes of hardware, software, processes, or procedures that could enable or facilitate the defeat of a relevant security control;
Cyber Security Risk. The portfolio’s and its service providersuse of internet, technology and information systems may expose the portfolio to potential risks linked to cyber security breaches of those technological or information systems. Cyber security breaches, amongst other things, could allow an unauthorized party to gain access to proprietary information, customer data, or fund assets, or cause the portfolio and/or its service providers to suffer data corruption or lose operational functionality. Fees & Expenses Investment Objective Principal Investment Strategies Principal Risks Equity Market Risk: Even a long-term investment approach cannot guarantee a profit. Economic, market, political, and issuer-specific conditions and events will cause the value of equity securities, and the portfolio that owns them, to rise or fall. Stock markets tend to move in cycles, with periods of rising prices and periods of falling prices. Foreign Securities and Currencies Risk: Foreign securities prices may decline or fluctuate because of: (a) economic or political actions of foreign governments, and/or (b) less regulated or liquid securities markets. Investors holding these securities may also be exposed to foreign currency risk (the possibility that foreign currency will fluctuate in value against the U.S. dollar or that a foreign government will convert, or be forced to convert, its currency to another currency, changing its value against the U.S. dollar). The portfolio does not hedge foreign currency risk. Small and Mid-Cap Company Risk: Securities of small and mid-cap companies are often less liquid than those of large companies and this could make it difficult to sell a small or mid-cap company security at a desired time or price. As a result, small and mid-cap company stocks may fluctuate relatively more in price. In general, small and mid- capitalization companies are also more vulnerable than larger companies to adverse business or economic developments and they may have more limited resources. Emerging Markets Risk: Numerous emerging market countries have a history of, and continue to experience serious, and potentially continuing, economic and political problems. Stock markets in many emerging market countries are relatively small, expensive to trade in and generally have higher risks than those in developed markets. Securities in emerging markets also may be less liquid than those in developed markets and foreigners are often limited in their ability to invest in, and withdra...

Related to Cyber Security Risk

  • Cyber Security means the condition in which road vehicles and their functions are protected from cyber threats to electrical or electronic components.

  • liquidity risk means the risk that a position in the portfolio cannot be sold, liquidated or closed out at limited cost in an adequately short time frame and that the ability of the investment service provider to liquidate positions in an individual portfolio in accordance with the contractual requirements of the portfolio management mandate, is thereby compromised;

  • LCR Security means any commercial paper or security (other than equity securities issued to Parent or any Originator that is a consolidated subsidiary of Parent under GAAP) within the meaning of Paragraph .32(e)(viii) of the final rules titled Liquidity Coverage Ratio: Liquidity Risk Measurement Standards, 79 Fed. Reg. 197, 61440 et seq. (October 10, 2014).

  • The HIPAA Security Rule means the Security Standards for the Protection of 23 electronic PHI at 45 CFR Part 160, Part 162, and Part 164, Subparts A and C.

  • Other Security means any security acceptable to the commissioner other than security meeting the definition of Primary Security.

  • Underlying Security means a security issued or transferred, or to be issued or transferred, in accordance with the terms of a convertible security, an exchangeable security or a multiple convertible security;

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Similar Security means a reference bond or reference bonds issued by the same issuer as the Reference Security having an actual or interpolated maturity comparable with the remaining term of the Notes that would be utilised, at the time of selection and in accordance with customary financial practice, in pricing new issues of corporate debt securities of comparable maturity to the remaining term of the Notes.

  • Security Right includes any right relating to issuance, sale, assignment, transfer, purchase, redemption, conversion, exchange, registration or voting and includes rights conferred by statute, by the issuer's governing documents or by agreement.

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;

  • Security Requirement means the amount in Dollars (as certified by the Agent whose certificate shall, in the absence of manifest error, be conclusive and binding on the Borrowers and the Creditors) which is, at any relevant time:

  • Sustainability Risk means an environmental, social or governance event or condition that, if it occurs, could cause an actual or a potential material negative impact on the value of the investment;

  • systemic risk means a risk of disruption in the financial system with the potential to have serious negative consequences for the financial system and the real economy;

  • Relevant Security means the Stock, any other equity security of the Company or any of its subsidiaries and any security convertible into, or exercisable or exchangeable for, any Stock or other such equity security.

  • windstorm means straight line winds of at least 80 miles per

  • Cyber Security Incident means any malicious or suspicious event that disrupts, or was an attempt to disrupt, the operation of those programmable electronic devices and communications networks including hardware, software and data that are essential to the Reliable Operation of the Bulk Power System.++

  • Firearm accessory means a device specifically designed or adapted to enable an individual to wear, carry, store, or mount a firearm on the individual or on a conveyance and an item used in conjunction with or mounted on a firearm that is not essential to the basic function of the firearm. The term includes a detachable firearm magazine.

  • Asset-backed security means a security that is primarily serviced by the cash flows of a discrete pool of mortgages, receivables or other financial assets, fixed or revolving, that by their terms convert into cash within a finite period and any rights or other assets designed to assure the servicing or the timely distribution of proceeds to securityholders;

  • Low risk means normal, uncomplicated prenatal course as determined by adequate prenatal care and prospects for a normal, uncomplicated birth as defined by reasonable and generally accepted criteria of maternal and fetal health.

  • Minimal risk means that the probability and magnitude of harm or discomfort anticipated in the research are not greater in and of themselves than those ordinarily encountered in daily life or during the performance of routine physical or psychological examinations or tests.

  • Security, Securities shall have the meaning set forth in Section 2(1) of the Securities Act;

  • Economic Risk of Loss has the meaning set forth in Treasury Regulation Section 1.752-2(a).

  • Loaned Security means any “security” which is delivered as a Loan under a Securities Loan Agreement; provided that, if any new or different security shall be exchanged for any Loaned Security by recapitalization, merger, consolidation, or other corporate action, such new or different security shall, effective upon such exchange, be deemed to become a Loaned Security in substitution for the former Loaned Security for which such exchange was made.

  • Indexed Security means a Security the terms of which provide that the principal amount thereof payable at Stated Maturity may be more or less than the principal face amount thereof at original issuance.

  • Transaction Security means the Security created or expressed to be created in favour of the Security Agent pursuant to the Transaction Security Documents.

  • HIPAA Security Rule as defined in 45 CFR Part 164, Subparts A and C;