Laserfiche WebLink
or involving data or "media" of any <br />kind; or <br />(2) Misalignment, miscalibration, <br />tripping off-line, or any condition <br />which can be corrected by <br />resetting, tightening, adjusting or <br />cleaning, or by the performance of <br />maintenance. <br />However, if an "accident" results, we <br />will pay for the resulting loss, damage <br />or expense caused by that "accident". <br />2. "Antique" or "antiques" means an object <br />having value because its: <br />a. Craftsmanship is in the style or fashion <br />of former times; and <br />b. Age is 100 years old or older. <br />3. "Cloud computing services" means <br />professional, on -demand, self-service data <br />storage or data processing services <br />provided through the Internet or over <br />telecommunications lines. This includes <br />services known as IaaS (infrastructure as a <br />service), PaaS (platform as a service), <br />Saas (software as a service) and NaaS <br />(network as a service). This includes <br />business models know as public clouds, <br />community clouds and hybrid clouds. <br />"Cloud computing services" include private <br />clouds if such services are owned and <br />operated by a third party. <br />4. "Computer equipment" means: <br />a. "Hardware" and related component <br />parts. Component parts include but are <br />not limited to modems, routers, <br />printers, keyboards, monitors, and <br />scanners; <br />b. "Software"; and <br />c. "Protection and control equipment". <br />"Computer equipment" does not mean <br />"Computer equipment" used to operate <br />production -type machinery or equipment. <br />5. "Computer hacking" means an <br />unauthorized intrusion by an individual or <br />group of individuals, whether employed by <br />you or not, into "hardware" or "software", <br />a Web site, or a computer network and <br />that results in but is not limited to: <br />a. Deletion, destruction, generation, or <br />modification of "software"; <br />b. Alteration, contamination, corruption, <br />degradation, or destruction of the <br />integrity, quality or performance of <br />"software"; <br />c. Observation, scanning, or copying of <br />"electronic data", "programs and <br />applications", and "proprietary <br />programs"; <br />Hanover <br />Insurance Group- <br />ODF D785344 5701644 <br />d. Damage, destruction, inadequacy, <br />malfunction, degradation, or corruption <br />of any "hardware" or "media" used <br />with "hardware"'; or <br />e. Denial of access to or denial of <br />services from "hardware", "software", <br />computer network, or Web site <br />including related "software". <br />6. "Computer program" means a set of <br />related electronic instructions, which direct <br />the operation and function of a computer <br />or devices connected to it, which enable <br />the computer or devices to receive, <br />process, store or send "electronic data". <br />7. "Computer Virus" means the introduction <br />into "hardware", "software", computer <br />network, or Web site of any malicious, <br />self -replicating electronic data processing <br />code or other code and that is intended to <br />result in, but is not limited to: <br />a. Deletion, destruction, generation, or <br />modification of "software"; <br />b. Alteration, contamination, corruption, <br />degradation, or destruction of the <br />integrity, quality, or performance of <br />"software"; <br />c. Damage, destruction, inadequacy, <br />malfunction, degradation, or corruption <br />of any "hardware" or "media" used <br />with "hardware"; or <br />d. Denial of access to or denial of <br />services from "hardware", "software", <br />computer network, or Web site <br />including related "software". <br />8. "Counterfeit money" means an imitation of <br />"money" that is intended to deceive and to <br />be taken as genuine. <br />9. "Covered equipment" means Covered <br />Property which, during normal usage, <br />operates under vacuum or pressure, other <br />than the weight of its contents, or that <br />generates, transmits or utilizes energy. <br />"Covered equipment" may utilize <br />conventional design and technology or <br />new or newly commercialized design and <br />technology. <br />"Covered equipment" does not include: <br />a. Structure, foundation, cabinet or <br />compartment; <br />b. Insulating or refractory material; <br />c. Sewer piping, buried vessels or piping, <br />or piping forming a part of a sprinkler <br />or fire suppression system; <br />d. Water piping other than <br />boiler feedwater piping, boiler <br />condensate return piping or <br />391-1003 08 16 Includes copyrighted material of Insurance Services Office, Inc., with its permission <br />ew cF IZAMwagzment])Msian <br />Jy/\'x REVIEWED & APPROVED BY.- <br />V"° <br />--� Risk janagement Analyst <br />