PI-ACL-001 (12/18)
<br />Computer hardware means the physical components of any computer system including CPU's, memory
<br />storage devices, storage media, and input/output devices and other peripheral devices and components
<br />including but not limited to cable, connectors, fiber optics, networking equipment, electronic data storage
<br />devices, input and output devices, backup facilities, wire, power supply units, keyboards, display monitors
<br />and audio speakers.
<br />Computer system means an electronic, wireless, web or similar systems (including all computer
<br />hardware, computer programs and electronic data) used to process data or information in an analog,
<br />digital, electronic or wireless format, including but not limited to, associated input and output devices, data
<br />storage devices, networking equipment, wired or wireless peripherals, electronic backup facilities, and
<br />media libraries, that is owned or leased, operated and controlled by the insured or operated by an
<br />independent contractor authorized to provide Business Process Outsourcing services or outsourced
<br />Information Technology services for the insured.
<br />Corporate Information Breach means the public disclosure of an organization's non-public information.
<br />Cyber Extortion means any threat or connected series of threats communicated to the insured for
<br />the purpose of demanding money, securities, or property, including but not limited to threats to
<br />release, divulge, disseminate, corrupt, damage or destroy Electronic Data or Electronic Media;
<br />introduce malware or malicious code into the insured's computer system; electronically
<br />communicate with the insured's customers in order to fraudulently obtain personal information,
<br />money, securities or property; or restrict or hinder access to the insured's computer system,
<br />Electronic Data or Electronic Media, including but not limited to ransomware.
<br />Denial of service means unauthorized or unexpected interference or malicious attack by any person(s)
<br />or entity(ies) that restricts or prevents access to a computer system by persons or entities authorized to
<br />gain access to the computer system or electronic data.
<br />Electronic Data means information, facts, blockchain, crypto currencies, or computer programs stored
<br />as or on, created or used on, or transmitted to or from computer software, including but not limited to
<br />systems and applications software, hard or floppy disks, CD-ROMs, DVDs, external drives, USB sticks,
<br />tapes, drives, cells, microchip, data processing devices, or any other media which are used with
<br />electronically controlled equipment. The term computer programs, referred to in the foregoing
<br />description of Electronic Data, means a set of related electronic instructions which direct the
<br />operations and functions of a computer or device connected to it, which enable the computer or
<br />device to receive, process, store, retrieve, or send data.
<br />Electronic Media means broadcast or storage media that take advantage of electronic technology. They
<br />include television, radio, Internet, fax, Bluetooth, GPS, audio beacons, electronic data, and any other
<br />medium that requires electricity or digital encoding of information.
<br />.Malicious code means unauthorized and corrupting or harmful computer code, including but not limited
<br />to computer viruses, spyware, Trojan horses, worms, logic bombs, and mutations of any of the preceding.
<br />Page 2 of 3
<br />oR,N F RiskMougementDMsian
<br />@2018 Philadelphia Consolidated Holding Corp. _ REMEWED&APPROVED BY.
<br />Risk Management Specialist
<br />PI-ACL-001 (12/18)
<br />
|