Cyber Sample Clauses
The 'Cyber' clause establishes the responsibilities and requirements related to cybersecurity within an agreement. It typically outlines the standards parties must follow to protect sensitive data, such as implementing security measures, reporting breaches, and complying with relevant laws or industry standards. This clause ensures that both parties are aware of their obligations to prevent, detect, and respond to cyber threats, thereby reducing the risk of data breaches and clarifying liability in the event of a cyber incident.
POPULAR SAMPLE Copied 2 times
Cyber. If a vendor is “getting into” County computer systems For all labor categories in the Information Technology Labor category. Policy Limit:
6.2.14.1 The policy shall be issued with minimum limits of $100,000.
6.2.14.2 The policy shall include coverage for all directors, officers, agents and employees of the Contractor.
6.2.14.3 The policy shall include coverage for third party risk fidelity.
6.2.14.4 The policy shall include coverage for cyber theft.
6.2.14.5 The policy shall contain no requirement for arrest and conviction.
6.2.14.6 The policy shall cover loss outside the premises of the Named Insured.
6.2.14.7 The policy shall endorse (Blanket Endorsements are not acceptable) the Department as Loss Payee as our interest may appear.
Cyber. Vendor/Contractor shall procure and maintain for the duration of the contract insurance against claims for security breaches, system failures, injuries to persons, damages to software, or damages to property (including computer equipment) which may arise from or in connection with the performance of the work hereunder by the Vendor, its agents, representatives, or employees. Vendor shall procure and maintain for the duration of the contract insurance claims arising out of their services and including, but not limited to loss, damage, theft or other misuse of data, infringement of intellectual property, invasion of privacy and breach of data. Cyber Liability Insurance, with limits not less than $2,000,000 per occurrence or claim, 01375.0001/962053.4 privacy violations, information theft, damage to or destruction of electronic information, release of private information, and alteration of electronic information. The policy shall provide coverage for breach response costs, regulatory fines and penalties as well as credit monitoring expenses.
Cyber harassment is a crime of the fourth degree, unless the person is 21 years of age or older at the time of the offense and impersonates a minor for the purpose of cyber-harassing a minor, in which case it is a crime of the third degree.
Cyber privacy breaches; hacking; and technology malfunction or damage.
Cyber. The Organization may offer or promote online programming (such as webinars, remote conferences, workshops, and online training) which have different foreseeable and unforeseeable risks than in-person programming. These risks include privacy breaches, hacking, technology malfunction or damage.
Cyber. The Authority requires the Contractor to maintain Cyber Essentials Certification in relation to this requirement for the duration of the Contract in conjunction with DEFCON 658, DEFSTAN 05-138 and will be measured as a Deliverable on the Contract.
Cyber. SpinCo and each member of the SpinCo Group shall have the right to assert claims and access coverage for Pre-Distribution Claims under the cyber insurance policy or policies maintained by the Holcim Group for any occurrences or other matters that occurred and were reported, or are deemed to have occurred and been reported, to the applicable insurer or insurers at or prior to the Effective Time; provided that, for the avoidance of doubt, such access shall not include any claim first made after the Effective Time unless such claim is deemed to have been made at or prior to the Effective Time (collectively, the “Cyber Policies”).
Cyber. 1. Subject only to paragraph 3 below, in no case shall this insurance cover loss, damage, liability or expense directly or indirectly caused by or contributed to by or arising from the use or operation, as a means for inflicting harm, of any computer, computer system, computer software programme, malicious code, computer virus, computer process or any other electronic system.
2. Subject to the conditions, limitations and exclusions of the policy to which this clause attaches, the indemnity otherwise recoverable hereunder shall not be prejudiced by the use or operation of any computer, computer system, computer software programme, computer process or any other electronic system, if such use or operation is not as a means for inflicting harm.
3. Where this clause is endorsed on policies covering risks of war, civil war, revolution, rebellion, insurrection, or civil strife arising therefrom, or any hostile act by or against a belligerent power, or terrorism or any person acting from a political motive, paragraph 1 shall not operate to exclude losses (which would otherwise be covered) arising from the use of any computer, computer system or computer software programme or any other electronic system in the launch and/or guidance system and/or firing mechanism of any weapon or missile.
Cyber. Sending unkind messages, posting images without their consent, kicking them out from a game or a group chat, being emotionally, verbally or racially abusive to or about them in chat rooms or on social media.