My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
LINEAR SYSTEMS 3 -2014
Clerk
>
Contracts / Agreements
>
L
>
LINEAR SYSTEMS 3 -2014
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
7/23/2015 2:27:38 PM
Creation date
1/29/2015 3:53:24 PM
Metadata
Fields
Template:
Contracts
Company Name
LINEAR SYSTEMS
Contract #
A-2014-237
Agency
POLICE
Council Approval Date
10/21/2014
Expiration Date
6/30/2017
Insurance Exp Date
4/25/2016
Destruction Year
2022
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
88
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
But does not Include overhead <br />a "computer virus" or by "computer <br />transmission lines, overhead <br />hacking ". <br />distribution lines, overhead <br />(2) <br />We cover corruption, distortion, <br />transformers or any other <br />deletion, damage or destruction of <br />overhead service equipment or <br />your "electronic data" caused by or <br />similar (however mounted and <br />resulting from a "computer virus" or <br />whatever mounted upon) <br />by "computer hacking ". <br />equipment. <br />(3) <br />We do not cover: <br />The definitions of Business Income <br />(a) Loss of proprietary use of any <br />and Extra Expense contained in the <br />"electronic data" that have been <br />Business Income and Extra <br />copied, scanned or altered; <br />Expense Additional Coverages also <br />apply to this Utility Services <br />(b) Loss of or reduction In economic <br />Additional Coverage. <br />or market value of any "electronic <br />data" that have been copied, <br />dd. Deferred Payments <br />scanned or altered; <br />(1) We will pay for your interest in <br />(c) Theft from your "electronic data" <br />lost or damaged Personal <br />of confidential Information through <br />Property sold by you under a <br />the observation of the "electronic <br />conditional sale or trust <br />data" by accessing covered <br />agreement or any installment or <br />"hardware" or your computer <br />deferred payment plan after <br />network without any alteration or <br />delivery to buyers. The loss or <br />other physical loss or damage to <br />damage must be caused by a <br />the records or programs. <br />Covered Cause of Loss. <br />Confidential information includes, <br />(2) The most we will pay for loss <br />but is not limited to, customer <br />under this Additional Coverage is <br />Information, processing methods <br />$5,000. When a total loss to that <br />or trade secrets; or <br />property occurs, deferred <br />(d) Unauthorized transfer of funds <br />payments are valued on the <br />from an account owned by you or <br />amount shown on your books as <br />In which you have an interest <br />due from the buyer. When a <br />caused in whole or in part by <br />partial loss to that property <br />"computer hacking ", a "computer <br />occurs and the buyer refuses to <br />virus ", or other malicious <br />continue payment, forcing you to <br />intrusion into a computer system <br />repossess, deferred payments <br />or network wherever located. <br />are valued as follows: <br />(4) <br />Special Computer Virus or Computer <br />(a) If the realized value of the <br />Hacking Exclusions <br />repossessed property Is <br />greater than or equal to the <br />Except as provided under Additional <br />amount shown on your books <br />Coverage Computer Virus or <br />as due from the buyer, we will <br />Computer Hacking, we do not pay for: <br />make no payment; but <br />(a) Any direct or indirect loss or <br />(b) If the realized value of the <br />damage; or <br />repossessed property is less <br />(b). Loss of access, loss of use or <br />than the amount shown on <br />loss of functionality; or <br />your books as due from the <br />(c) Consequential loss <br />buyer, we will pay the <br />difference, <br />caused by a "computer virus" or by <br />When loss occurs and the buyer <br />"computer hacking ". <br />continues to pay you, there will be no <br />(5) <br />The most we will pay for loss of or <br />loss payment. <br />damage to computer "hardware" or <br />This Additional Coverage is not <br />"software" In any one occurrence <br />subject to the Limits of Insurance of <br />under this Additional Coverage l <br />The most we for all <br />l <br />Section I - Property. <br />cover . pay <br />covered losses to computer <br />ea. Virus and Hacking Coverage <br />"hardware" or "software" under this <br />(1) We cover direct loss to covered <br />Additional Coverage during each <br />"hardware" and "software" caused by <br />separate 12 -month period of this <br />391 -1003 06 09 Includes copyrighted material <br />of Insurance Services Page 26 of 66 <br />17,970 Office, Inc. with Its <br />permission <br />
The URL can be used to link to this page
Your browser does not support the video tag.