Invoice Manipulation definition

Invoice Manipulation means the release or distribution of any fraudulent invoice or fraudulent payment instruction to a third party as a direct result of a Security Breach or a Data Breach.
Invoice Manipulation means the release or distribution of any fraudulent invoice or fraudulent payment instruction to a third party as a direct result of a Security Incident or Privacy Incident resulting in the Insured Entity’s inability to collect payment for any goods, products or services after such goods, products or services have been transferred to a third party. Loss means Business Interruption Loss, Claims Expenses, Extortion Loss, Damages, Data Restoration Costs, Direct Financial Loss, Direct Net Loss, Hardware Replacement Costs, Incident Response Expenses, PCI Fines and Expenses, Regulatory Fines, Reputation Loss, and any other amounts covered under this policy. Multiple Losses arising from the same or a series of related, repeated, or continuing acts, errors, omissions, incidents, or events will be considered a single Loss for the purposes of this policy. With respect to the First Party Insuring Agreements, all acts, errors, omissions, incidents, or events (or series of related, repeated or continuing acts, errors, omissions, incidents, or events) giving rise to a Loss or multiple Losses in connection with such Insuring Agreements will be deemed to have been discovered at the time the first such act, error, omission, incident, or event is discovered. Media Content means content that is created or disseminated, via any form or expression, by or on behalf of the Insured Entity. Media Content does not include: (i) tangible product designs; or (ii) content created or disseminated by the Insured Entity on behalf of a third party. Media Incident means any of the following in the public display of Media Content:

Examples of Invoice Manipulation in a sentence

  • Invoice Manipulation means the release or distribution of any fraudulent invoice or fraudulent payment instruction to a third party as a direct result of a Security Breach or a Data Breach.

  • The following FIRST PARTY COVERAGE is added: Invoice Manipulation Subject to the applicable Limits of Insurance and in excess of the applicable retention, the Insurer will pay the Insured for Direct Net Loss resulting directly from the Insured’s inability to collect payment for any of the goods, products or services shown in the SCHEDULE OF COVERAGE, after such goods, products or services have been transferred to a third party, as a result of Invoice Manipulation.

  • Solely with respect to the coverage added by this endorsement, the following DEFINITIONS are added: Direct Net Loss means the payment amount that the Insured would have received from a third party for the Insured’s provision of goods, products or services to such third party if no Invoice Manipulation had occurred.

  • Any Cyber Breach Event, Cyber-extortion Threat or Ransomware, System Failure, Dependent Business Interruption, Dependent System Failure, Social Engineering Fraud, Funds Transfer Fraud, Utility Fraud or Invoice Manipulation.

  • Date: Sep 29, 2020 Legal Name of Vendor 00-0000000 FEIN Signature of Authorized Officer Xxxxx Xxxxxxx Dir.

  • MVRMA provides its members with wide-ranging cyber insur- ance coverage for cyber exposures such as Business Interrup- tion from a Security Breach, Cyber Extortion, Data Recovery, Data & Network Liability, Regulatory Defense & Penalties, Pay- ment Card Liabilities & Costs, Media Liability, Business Inter- ruption from System Failure, eCrimes (eg., Funds Transfer Fraud, Fraudulent Instruction), Invoice Manipulation, Reputa- tion Loss, and other cyber risks.

  • The following FIRST PARTY COVERAGE is added: Invoice Manipulation Subject to the applicable Limits of Insurance and in excess of the applicable retention, the Insurer will pay the Insured for Direct Net Loss resulting directly from the Insured’s inability to collect Payment for any of the goods, products or services show in the Schedule of Coverage, after such goods, products or services have been transferred to a third party, as a result of Invoice Manipulation.

  • Thus, the Court finds that he First Amended Complaint fails to plead claims that are within Section II’s provisions for Breach Response, Business Interruption, Cyber Extortion, Digital Asset Restoration, Service Fraud, Computer Replacement, Invoice Manipulation, Reputational Harm Loss, Criminal Reward Costs, and Crisis Management and Public Relations Coverages.Benoit, however, does argue that the Funds Transfer Fraud provision supports coverage for the Vehicle Thefts.

  • Invoice Manipulation means the release or distribution of any fraudulent invoice or fraudulent payment instruction to a third party as a direct result of an Enterprise Security Event on the Insured’s network, which causes the third party to send payment intended for the Insured to a person or entity other than the Insured.

  • E11848 072018 Invoice Manipulation Coverage is added to CONDITIONS, as attached.

Related to Invoice Manipulation

  • Malware means any virus, Trojan horse, time bomb, key-lock, spyware, worm, malicious code or other software program designed to or able to, without the knowledge and authorization of the Company or any of its Subsidiaries, disrupt, disable, harm, interfere with the operation of or install itself within or on any Software, computer data, network memory or hardware.

  • Price Sensitive Information means any information which relates, directly or indirectly, to a company and which if published is likely to materially affect the price of securities of the company.

  • Transparency Information means the content of this Contract in its entirety, including from time to time agreed changes to the Contract, and details of any payments made by the Authority to the Contractor under the Contract;

  • Input Material means all documents, information, representations, statements and materials provided by Customer or a third party on behalf of Customer, relating to the Services, including computer programs, data, logos, reports and specifications and inventories.

  • Output Material means any Documents or other materials, and any data or other information provided by the Supplier relating to the Specified Service;

  • Client Materials means the CLIENT Development Materials and the CLIENT Production Materials.

  • Supplier Materials has the meaning set out in clause 8.1(g);

  • Commercially Sensitive Information Schedule means the Schedule containing a list of the Commercially Sensitive Information.

  • DXC Sensitive Information means DXC Confidential Information, Intellectual Property, PHI, DXC Customer data, and Personal Information.

  • Computer database or “database” means a collection of recorded information in a form capable of, and for the purpose of, being stored in, processed, and operated on by a computer. The term does not include computer software.

  • Postconsumer material means a material or finished product that has served its intended use and has been discarded for disposal or recovery, having completed its life as a consumer item. Postconsumer material is a part of the broader category of “recovered material.”

  • Spam means unsolicited commercial communications, including unsolicited commercial messages as referred to in section 5.2.1.

  • Transparency Reports means a report in accordance with Schedule 7 Part 1 (Transparency Reports) containing the contract information as set out in the table for that Part for publication by the Authority in the interests of transparency.

  • APIs means SAP application programming interface and accompanying or related Documentation, source code, tools, executable applications, libraries, subroutines, widgets and other materials made available by SAP or through SAP tools or SAP Software Development Kit (and all derivative works or modifications thereof) to Provider that allow Provider to integrate the Provider Service with the Cloud Service, including any access code, authentication keys or similar mechanisms to enable access of the APIs.

  • Unpublished Price Sensitive Information means any information, relating to a company or its securities, directly or indirectly, that is not generally available which upon becoming generally available, is likely to materially affect the price of the securities and shall, ordinarily including but not restricted to, information relating to the following: –

  • Customer Materials any materials, data, information, software, equipment or other resources owned by or licensed to You and made available to Us pursuant to facilitating Your use of the Services, including Customer Data.

  • Contractor Commercially Sensitive Information means the information listed in the Contractor Commercial Sensitive Information Annex to the Contract being information notified by the Contractor to the Authority which is acknowledged by the Authority as being commercially sensitive information.

  • Sensitive Information means controlled unclassified information of a commercial, financial, proprietary, or privileged nature. The term includes technical data and computer software, but does not include information that is lawfully, publicly available without restriction.

  • Hacking means unauthorised access to any computer or other equipment or component or system or item which processes, stores, transmits or retrieves data.

  • Unpublished price sensitive information or UPSI means any information, relating to a company or its securities, directly or indirectly, that is not generally available which upon becoming generally available, is likely to materially affect the price of the securities and shall, ordinarily including but not restricted to, information relating to the following: –

  • Commercially Sensitive Information means the Information (i) listed in the Commercially Sensitive Information Schedule; or (ii) notified to the Authority in writing (prior to the commencement of this Contract) which has been clearly marked as Commercially Sensitive Information comprised of information:

  • Protocol Number 1002-048 Protocol Title: A Randomized, Double-Blind, Placebo-Controlled, Parallel Group, Multicenter Study to Evaluate the Efficacy and Safety of Bempedoic Acid (ETC-1002) 180 mg/day as Add-on to Ezetimibe Therapy in Patients with Elevated LDL-C Protocol Date: 18 January 2017 Sponsor: Esperion Therapeutics, Inc. Country where Institution is Conducting Study Czech Republic Location where the study will be conducted: Kardiologická ambulance, which is a division/part of the Institution Key Enrollment Date: 100 Calendar Days after Site Initiation Visit (being the date by which Site must enrol at least one (1) subject as more specifically set out in section 1.7 “Key Enrollment Date” below) ECMT / EC / RA ECMT: Ethics Committee Fakultni nemocnice v Motole V Uvalu 84 150 06 Xxxxx 0 Xxxxx Xxxxxxxx; Mgr. xxxxxxxxxxxxx Etická komise Nemocnice Havlíčkův Brod Husova 2624 580 22 Havlíčkův Brod RA: State Institute for Drug Control, Xxxxxxxxx 00, 000 00 Xxxxx 00 Xxxxx Xxxxxxxx Investigator name, (the “Investigator”) xxxxxxxxxxxxx Číslo Protokolu: 1002-048 Název Protokolu: Randomizované, dvojitě zaslepené, placebem kontrolované multicentrické klinické hodnocení, s paralelními skupinami, posuzující účinnost a bezpečnost kyseliny bempedové (ETC 1002) 180 mg denně jako doplňku k léčbě ezetimibem u pacientů se zvýšenou hladinou LDL-C Datum Protokolu: 18. 1. 2017 Zadavatel: Esperion Therapeutics, Inc. Stát, ve kterém má sídlo Zdravotnické zařízení, které provádí Studii Česká republika Místo, kde bude prováděna Studie: Kardiologická ambulance, která je součástí/oddělením Zdravotnického zařízení Klíčové datum zařazení: 100 kalendářních dnů po Iniciační návštěvě Místa provádění klinického hodnocení (a to jakožto den, ke kterému je Místo provádění klinického hodnocení povinno zařadit minimálně jeden (1) subjekt, jak je dále podrobněji rozvedeno níže v odstavci 1.7 “Klíčové datum zařazení”) MEK / EK / SÚKL MEK: Etická komise Fakultní nemocnice v Motole V Úvalu 84 150 06 Xxxxx 0 Xxxxx xxxxxxxxx; xxxxxxxxxxxxx Etická komise Nemocnice Havlíčkův Brod Husova 2624 580 22 Havlíčkův Brod SÚKL: Státní ústav pro kontrolu léčiv, Šrobárova 48, 100 41 Xxxxx 00 Xxxxx xxxxxxxxx Jméno zkoušejícího, ( “Zkoušející”) xxxxxxxxxxxxx The following additional definitions shall apply to this Agreement: Ve Smlouvě jsou použity následující smluvní definice:

  • Contractor Sensitive Information means any information provided by the Contractor to the Authority (disregarding any protective marking or assertion of confidentiality) which: is specified as Contractor Sensitive Information in Schedule 7 and has not lost its sensitivity according to the justifications and durations set out in that Schedule; and is exempt information pursuant to sections 33(1) or 36, 38 or 39 of FOISA (having regard for that purpose to the public interest there might be in disclosing such information as referred to in section 2(1)(b) of FOISA).

  • Contractor Materials means Materials owned or developed prior to the provision of the Work, or developed by Contractor independently from the provision of the Work and without use of the Court Materials or Confidential Information.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Messages means both “EDI Messages” or “Other Messages”.