Specifications include, but are not limited to: The cyber exposures to be covered under network privacy and security coverage should include the following. • Hostile action or a threat of hostile action with the intent to affect, alter, copy, corrupt, destroy, disrupt, damage, or provide unauthorized access/unauthorized use of a computer system, including exposing or publicizing confidential electronic data or causing electronic data to be inaccessible; • Computer viruses, Trojan horses, worms, and any other type of malicious or damaging code; • Dishonest, fraudulent, malicious, or criminal use of a computer system by a person, whether identified or not, and whether acting alone or in collusion with other persons, to affect, alter, copy, corrupt, delete, disrupt, or destroy a computer system or obtain financial benefit for any party or to steal or take electronic data; • Denial of service for which the Contractor is responsible that results in the degradation of or loss of access to Internet or network activities or normal use of a computer system; • Loss of service for which the Contractor is responsible that results in the inability of a third party, which is authorized to do so, to gain access to a computer system and conduct normal Internet or network activities; • Access to a computer system or computer system resources by an unauthorized person or an authorized person in an unauthorized manner; and • Loss or disclosure of PII or confidential information no matter how such loss occurs