Laserfiche WebLink
PI-ACL-001 (12/18) <br />Computer hardware means the physical components of any computer system including CPU's, memory <br />storage devices, storage media, and input/output devices and other peripheral devices and components <br />including but not limited to cable, connectors, fiber optics, networking equipment, electronic data storage <br />devices, input and output devices, backup facilities, wire, power supply units, keyboards, display monitors <br />and audio speakers. <br />Computer system means an electronic, wireless, web or similar systems (including all computer <br />hardware, computer programs and electronic data) used to process data or information in an analog, <br />digital, electronic or wireless format, including but not limited to, associated input and output devices, data <br />storage devices, networking equipment, wired or wireless peripherals, electronic backup facilities, and <br />media libraries, that is owned or leased, operated and controlled by the insured or operated by an <br />independent contractor authorized to provide Business Process Outsourcing services or outsourced <br />Information Technology services for the insured. <br />Corporate Information Breach means the public disclosure of an organization's non-public information. <br />Cyber Extortion means any threat or connected series of threats communicated to the insured for <br />the purpose of demanding money, securities, or property, including but not limited to threats to <br />release, divulge, disseminate, corrupt, damage or destroy Electronic Data or Electronic Media; <br />introduce malware or malicious code into the insured's computer system; electronically <br />communicate with the insured's customers in order to fraudulently obtain personal information, <br />money, securities or property; or restrict or hinder access to the insured's computer system, <br />Electronic Data or Electronic Media, including but not limited to ransomware. <br />Denial of service means unauthorized or unexpected interference or malicious attack by any person(s) <br />or entity(ies) that restricts or prevents access to a computer system by persons or entities authorized to <br />gain access to the computer system or electronic data. <br />Electronic Data means information, facts, blockchain, crypto currencies, or computer programs stored <br />as or on, created or used on, or transmitted to or from computer software, including but not limited to <br />systems and applications software, hard or floppy disks, CD-ROMs, DVDs, external drives, USB sticks, <br />tapes, drives, cells, microchip, data processing devices, or any other media which are used with <br />electronically controlled equipment. The term computer programs, referred to in the foregoing <br />description of Electronic Data, means a set of related electronic instructions which direct the <br />operations and functions of a computer or device connected to it, which enable the computer or <br />device to receive, process, store, retrieve, or send data. <br />Electronic Media means broadcast or storage media that take advantage of electronic technology. They <br />include television, radio, Internet, fax, Bluetooth, GPS, audio beacons, electronic data, and any other <br />medium that requires electricity or digital encoding of information. <br />.Malicious code means unauthorized and corrupting or harmful computer code, including but not limited <br />to computer viruses, spyware, Trojan horses, worms, logic bombs, and mutations of any of the preceding. <br />Page 2 of 3 <br />oR,N F RiskMougementDMsian <br />@2018 Philadelphia Consolidated Holding Corp. _ REMEWED&APPROVED BY. <br />Risk Management Specialist <br />PI-ACL-001 (12/18) <br />