or involving data or "media" of any
<br />kind; or
<br />(2) Misalignment, miscalibration,
<br />tripping off-line, or any condition
<br />which can be corrected by
<br />resetting, tightening, adjusting or
<br />cleaning, or by the performance of
<br />maintenance.
<br />However, if an "accident" results, we
<br />will pay for the resulting loss, damage
<br />or expense caused by that "accident".
<br />2. "Antique" or "antiques" means an object
<br />having value because its:
<br />a. Craftsmanship is in the style or fashion
<br />of former times; and
<br />b. Age is 100 years old or older.
<br />3. "Cloud computing services" means
<br />professional, on -demand, self-service data
<br />storage or data processing services
<br />provided through the Internet or over
<br />telecommunications lines. This includes
<br />services known as IaaS (infrastructure as a
<br />service), PaaS (platform as a service),
<br />Saes (software as a service) and NaaS
<br />(network as a service). This includes
<br />business models know as public clouds,
<br />community clouds and hybrid clouds.
<br />"Cloud computing services" include private
<br />clouds if such services are owned and
<br />operated by a third party.
<br />4. "Computer equipment" means:
<br />a. "Hardware" and related component
<br />parts. Component parts include but are
<br />not limited to modems, routers,
<br />printers, keyboards, monitors, and
<br />scanners;
<br />b. "Software"; and
<br />c. "Protection and control equipment"
<br />"Computer equipment" does not mean
<br />"Computer equipment" used to operate
<br />production -type machinery or equipment.
<br />5. "Computer hacking" means an
<br />unauthorized intrusion by an individual or
<br />group of individuals, whether employed by
<br />you or not, into "hardware" or "software",
<br />a Web site, or a computer network and
<br />that results in but is not limited to:
<br />a. Deletion, destruction, generation, or
<br />modification of "software';
<br />b. Alteration, contamination, corruption,
<br />degradation, or destruction of the
<br />integrity, quality or performance of
<br />"software";
<br />TTM
<br />Hnover
<br />]rance Group-
<br />ODFD785344 5701644
<br />d. Damage, destruction, inadequacy,
<br />malfunction, degradation, or corruption
<br />of any "hardware" or "media" used
<br />with "hardware"'; or
<br />e. Denial of access to or denial of
<br />services from "hardware", "software",
<br />computer network, or Web site
<br />including related "software".
<br />6. "Computer program" means a set of
<br />related electronic instructions, which direct
<br />the operation and function of a computer
<br />or devices connected to it, which enable
<br />the computer or devices to receive,
<br />process, store or send "electronic data".
<br />7. "Computer Virus" means the introduction
<br />into "hardware", "software", computer
<br />network, or Web site of any malicious,
<br />self -replicating electronic data processing
<br />code or other code and that is intended to
<br />result in, but is not limited to:
<br />a. Deletion, destruction, generation, or
<br />modification of "software"
<br />b. Alteration, contamination, corruption,
<br />degradation, or destruction of the
<br />integrity, quality, or performance of
<br />"software",
<br />c. Damage, destruction, inadequacy,
<br />malfunction, degradation, or corruption
<br />of any "hardware" or "media" used
<br />with "hardware": or
<br />d. Denial of access to or denial of
<br />services from "hardware", "software",
<br />computer network, or Web site
<br />including related "software".
<br />8. "Counterfeit money" means an imitation of
<br />"money" that is intended to deceive and to
<br />be taken as genuine.
<br />9. "Covered equipment" means Covered
<br />Property which, during normal usage,
<br />operates under vacuum or pressure, other
<br />than the weight of its contents, or that
<br />generates, transmits or utilizes energy.
<br />"Covered equipment" may utilize
<br />conventional design and technology or
<br />new or newly commercialized design and
<br />technology.
<br />"Covered equipment" does not include:
<br />a. Structure, foundation, cabinet or
<br />compartment;
<br />b. Insulating or refractory material;
<br />c. Sewer piping, buried vessels or piping,
<br />or piping forming a part of a sprinkler
<br />or fire suppression system;
<br />c. Observation, scanning, or copying of d. Water piping other than
<br />"electronic data", 'programs and boiler feedwat-e ^i^i^� hnllor
<br />applications", and "proprietary condensate n
<br />programs"; ° Risk MusganmtD[wfnR
<br />n & REVIEWED^&APPRa^V®9'Y:
<br />Risk Management Speaalist
<br />391-1003 08 16 Includes copyrighted material of Insurance Services Office, Inc., with its permissior
<br />
|