MALICIOUS ENCRYPTION definition

MALICIOUS ENCRYPTION means the strong encryption of a DATA ASSET by a malicious person that renders such DATA ASSET inaccessible or unreadable to the INSURED ORGANIZATION.

Related to MALICIOUS ENCRYPTION

  • Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Encrypted means the transformation of data into a form which results in a low probability of assigning meaning without the use of a protective process or key.

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.

  • Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.

  • Virus any thing or device (including any software, code, file or program) which may prevent, impair or otherwise adversely affect the access to or operation, reliability or user experience of any computer software, hardware or network, telecommunications service, equipment or network or any other service or device, including worms, trojan horses, viruses and other similar things or devices.

  • Interoperability means the ability of a CenturyLink OSS Function to process seamlessly (i.e., without any manual intervention) business transactions with CLEC's OSS application, and vice versa, by means of secure exchange of transaction data models that use data fields and usage rules that can be received and processed by the other Party to achieve the intended OSS Function and related response. (See also Electronic Bonding.)

  • Malware means any virus, Trojan horse, time bomb, key-lock, spyware, worm, malicious code or other software program designed to or able to, without the knowledge and authorization of the Company or any of its Subsidiaries, disrupt, disable, harm, interfere with the operation of or install itself within or on any Software, computer data, network memory or hardware.

  • compatibility means compatibility as defined in point (10) of Article 2 of Directive (EU) 2019/770;

  • Interceptor means a device designed and installed so as to separate and retain deleterious, hazardous, or undesirable matter from normal wastes, while allowing normal sewage or wastes to discharge into the drainage system by gravity.

  • functionality means the ability of a tenderer to provide goods or services in accordance with specifications as set out in the tender documents.

  • Hacking means unauthorised access to any computer or other equipment or component or system or item which processes, stores, transmits or retrieves data.

  • Messages means both “EDI Messages” or “Other Messages”.

  • Connectivity means the provision of a Permanent Separated Bicycle Lane system that reflects desired routes between all major origins and destinations in the city.

  • pseudonymisation means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organisational measures to ensure that the personal data are not attributed to an identified or identifiable natural person;

  • Propagation means the reproduction of Medical Marijuana plants by seeds, cuttings or grafting.

  • Images means all types of visual content, including without limitation still photography, motion film or video and may include audio elements, whether generated optically, electronically, digitally or by any other means, and shall include all metadata, keywords, descriptions and captions associated therewith. Any reference to Images includes the whole or the part.

  • telecommunications network means any wire, radio, optical, or other electromagnetic system used to route, switch, or transmit telecommunications;

  • Alarm means to cause fear of danger of physical harm; and

  • Firewall means a device for the detection, obstruction, destruction and/or prevention (as applicable) of computer viruses, trojans, worms, unauthorized access or use and/or any similar act or thing which may affect a computer system, or network.

  • Router means a modem or router provided by us for use by you in connection with the Broadband Service.

  • Data Safeguards means the highest industry-standard safeguards (including administrative, physical, technical, and procedural safeguards) against the destruction, loss, misuse, unauthorized disclosure, or alteration of the JBE Data or Confidential Information, and such other related safeguards that are set forth in Applicable Laws, a Statement of Work, or pursuant to JBE policies or procedures.

  • Homelessness or "homeless" means a condition where an

  • Tampering means the unauthorized connecting, disconnecting, or causing to be connected or disconnected, or in any other manner interfering with the operation of the Company’s meters, pipes, conduits, other equipment or attachments, or as otherwise provided by this Tariff (see Sections 6.6, 6.13, and 6.15).

  • Devices means any and all devices owned or purchased from time to time by Party A and utilized for the purposes of the provision of the Services.

  • Telecommunications Carrier is As Defined in the Act.