Malicious Attack definition

Malicious Attack means intentional hacking, damaging, corrupting or misusing the Insured’s Computer Systems, including Unauthorized Access or the insertion of Malicious Code by a third party or an employee. A Malicious Attack does not include hacking or the insertion of Malicious Code by a Senior Executive if such insertion of Malicious Code by a Senior Executive is intentional and with intent to cause harm;
Malicious Attack means intentional hacking, damaging, corrupting or misusing the Insured’s Computer Systems, including Unauthorized Access or the insertion of Malicious Code by a third party or an employee. A Malicious Attack does not include hacking or the insertion of Malicious Code by a Senior Executive;

Examples of Malicious Attack in a sentence

  • Property, Money and Malicious Attack, Goods in Transit Damage resulting from terrorism.

  • It is a Condition Precedent to Our liability under Section C – Money and Malicious Attack - that Money in transit shall be accompanied by the undernoted:Amount in transitMinimum EscortUp to £3,000Between £3,001 and £5,000 Between £5,001 and £7,500 Between £7,501 and £10,000Over £10,0001 Employee2 Employees3 Employees4 EmployeesOver £10,000 to be carried by a professional security company.

  • All terms in this Section exclude VAT to the extent that You are accountable to the tax authorities for VAT.Section C - Money and Malicious Attack The Cover What is coveredWhat is not covered 1.

  • The maximum amount payable by the Company for a Malicious Attack for each Policy Period is subject to the Network Asset Damage sublimit stated in the Declarations regardless of the number of incidents reported.

  • The payment of such Malicious Attack costs and associated Extra Expenses is subject to the Company’s prior written consent.

  • Professional Counselling Following Malicious Attack WE will at OUR option pay for professional counselling to help YOU or any EMPLOYEE recover from emotional stress resulting from a malicious attack insured by this section.

  • ISO 27002 REFERENCES8.1 Prior to employment10.6.1 Network controls11.4.1 Policy on use of network services11.4.2 User authentication for external connections11.4.6 Network connection control 030103 Defending Network Information from Malicious Attack Purpose: To protect information residing on State and agency networks.

  • Additional covers that you can choose include: • Employers’ Liability • Landlords’ Contents • Money and Malicious Attack • Goods in Transit • Terrorism • Engineering Insurance and Inspections • Commercial Legal Expenses • Group Personal Accident • Business Travel.

  • It is a Condition Precedent to Our liability under Section C – Money and Malicious Attack - that Money in transit shall be accompanied by the undernoted:Amount in transit Minimum EscortUp to £3,000Between £3,001 and £5,000 Between £5,001 and £7,500 Between £7,501 and £10,000 Over £10,0001 Employee2 Employees3 Employees4 EmployeesOver £10,000 to be carried by a professional security company.

  • Host Defence Against Malicious Attack INMS should use their best endeavours to ensure that INMS host system is sufficiently hardened to minimise risks of subscribers gaining unauthorised access to parts of the system and services to which they haven’t subscribed, and to prevent access by malicious individuals who may attempt to break into or out of host applications.

Related to Malicious Attack

  • Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.

  • Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.

  • Heart Attack means death of a portion of heart muscle as a result of inadequate blood supply to the relevant area. The basis for diagnosis shall include:

  • acid attack victims means a person disfigured due to violent assaults by throwing of acid or similar corrosive substance.

  • Violence means the unjustified infliction of physical force by a student with the intent to cause injury to another student or damage to the property of another student.

  • Serious assault means an act that constitutes a felony violation of chapter XI of the Michigan penal code, 1931 PA 328, MCL 750.81 to 750.90h, or that constitutes an assault and infliction of serious or aggravated injury under section 81a of the Michigan penal code, 1931 PA 328, MCL 750.81a.

  • Vandalism means destruction of or damage to a Project Asset deliberately

  • Attack means a nuclear, conventional, biological, or chemical warfare action against the United States of America or this state.

  • Malice means conduct which is intended by the defendant to cause injury to the plaintiff or despicable conduct which is carried on by the defendant with a willful and conscious disregard of the rights or safety of others.

  • Intentional Wrongdoing means an act or omission taken or omitted by a Party with knowledge or intent that injury or damage could reasonably be expected to result.

  • Homelessness or "homeless" means a condition where an

  • Obscene matter or an obscene performance means matter described in 1984 PA 343, MCL 752.361 to 752.374.

  • Sexual violence means any sexual act or act targeting a person’s sexuality, gender identity or gender expression, whether the act is physical or psychological in nature, that is committed, threatened or attempted against a person without the person’s consent. It includes sexual assault, sexual harassment, stalking, indecent exposure, voyeurism and sexual exploitation. For further clarity, sexual assault includes rape.

  • Serious damage means any specific defect described in this section; or an equally objectionable variation of any one of these defects, any other defect, or any combination of defects which seriously detracts from the appearance or the edible or marketing quality of the fruit. The following specific defects shall be considered as serious damage:

  • Violent felony means any offense that, if committed by an adult, would constitute a felony and:

  • Interceptor means a device designed and installed so as to separate and retain deleterious, hazardous, or undesirable matter from normal wastes, while allowing normal sewage or wastes to discharge into the drainage system by gravity.

  • Denial of Service Attack means an attack intended by the perpetrator to overwhelm the capacity of a "computer system" by sending an excessive volume of electronic data to such "computer system" in order to prevent authorized access to such "computer system".

  • Felonious Assault means a violent or criminal act reported to the local authorities which was directed at you during the course of, or an attempt of, a physical assault resulting in serious injury, kidnapping, or rape.

  • Sabotage means deliberate damage, with malevolent intent, to a Category 1 or Category 2 quantity of radioactive material, a device that contains a Category 1 or Category 2 quantity of radioactive material, or the components of the security system.

  • Abuse means one or more of the following:

  • Moral turpitude means conduct that is wrong in itself even if no statute were to prohibit the conduct; and

  • Catastrophic Damage as used hereunder is major change or damage to In- cluded Timber on Sale Area, to Sale Area, to access to Sale Area, or a combination thereof:

  • Obscene means containing a patently offensive description of or a solicitation to commit an ultimate sex act, including sexual intercourse, masturbation, cunnilingus, fellatio, or anilingus, or a description of an excretory function.

  • Cyber attack means an attempt to damage, disrupt, or gain unau- thorized access to a computer, computer network, or computer system.

  • Tampering means the unauthorized connecting, disconnecting, or causing to be connected or disconnected, or in any other manner interfering with the operation of the Company’s meters, pipes, conduits, other equipment or attachments, or as otherwise provided by this Tariff (see Sections 6.6, 6.13, and 6.15).

  • Viruses means any malicious computer code or instructions that have a material adverse effect on the operation, security or integrity of (a) a computing, telecommunications or other electronic operating or processing system or environment, (b) software programs, data, databases or other computer files or libraries or (c) computer hardware, networking devices or telecommunications equipment, including (i) viruses, Trojan horses, malware, time bombs, undisclosed back door devices, worms or any other software routine or hardware component designed to permit unauthorized access, disable, erase or otherwise harm software, hardware or data or perform any other such harmful or unauthorized actions and (ii) similar malicious code or data.