Cyber Liability Insurance definition
Examples of Cyber Liability Insurance in a sentence
The Contractor shall provide evidence satisfactory to the Contracting Officer of Cyber Liability Insurance, with limits not less than $2,000,000 per occurrence or claim, $2,000,000 aggregate.
The Cyber Liability Insurance coverage may be subject to a deductible or self-insured retention.
Cyber Liability Insurance with limits not less than $1,000,000 per claim.
Cyber Liability Insurance, with limits not less than two million dollars ($2,000,000) per occurrence or claim, two million dollars ($2,000,000) aggregate.
The Airline shall purchase and maintain Cyber Liability Insurance throughout the Term of this Agreement and such insurance will be maintained for a period of three years thereafter for services completed during the Term of this Agreement.
The Company shall purchase and maintain Cyber Liability Insurance throughout the Term of this Agreement and such insurance will be maintained for a period of three (3) years thereafter for services completed during the Term of this Agreement.
Cyber Liability Insurance coverage offers protection for exposures from Internet hacking and notification requirements.
Cyber Liability Insurance, with limits not less than $2,000,000 per occurrence or claim, $2,000,000 aggregate.
Should the Work include or require the Contractor to connect to the Participating Entity’s server(s) and/or computer system(s) either directly, remotely or through the cloud or install or run software on the Participating Entity’s server(s) and/or computer system(s), then the Contractor shall be required to obtain and maintain Cyber Liability Insurance, with limits not less than $2,000,000 per occurrence or claim, $4,000,000 aggregate.
Cyber Liability Insurance with limits of no less than $1,000,000 for each occurrence or event with an annual aggregate of $2,000,000 covering privacy violations, information theft, damage to or destruction of electronic information, intentional and/or unintentional release of private information, alteration of electronic information, extortion and network security.