ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

Similar documents
Cyber Risk Proposal Form

Privacy and Data Breach Protection Modular application form

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

Cyber, Data Risk and Media Insurance Application form

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

Cyber Liability A New Must Have Coverage for Your Soccer Organization

Cyber ERM Proposal Form

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection

CPM. Esurance TM CPM Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

REF STANDARD PROVISIONS

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional

CPM. Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

Evanston Insurance Company Markel American Insurance Company Markel Insurance Company

Technology E&O, Cyber and Privacy Insurance

AXIS PRO PRIVASURE INSURA

Section 1 - Errors and Omission

Cyber Comprehensive Insurance

CYBER RISK INSURANCE. Proposal Form

ACORD 23 (2016/03) - Vehicle or Equipment Certificate of Insurance

Cyber-Insurance: Fraud, Waste or Abuse?

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No. Most Recent Twelve (12) months: (ending: / )

Cyber Risks & Cyber Insurance

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

AXIS PRO TechNet Solutions Renewal Application

Cyber Liability: New Exposures

PRIVACY AND CYBER SECURITY

ACORD 35 (2017/05) - CANCELLATION REQUEST / POLICY RELEASE

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

Cyber Insurance 2017:

HP INC. COMPUTER & PERIPHERAL PRODUCTS PARTS ONLY TIER SELF- MAINTAINER AGREEMENT FOR UNITED STATES

Cyber Risks & Insurance

Cyber Risk Mitigation

Payment Card Industry (PCI) Data Security Standard Validation Requirements. For Approved Scanning Vendors (ASV)

H 7789 S T A T E O F R H O D E I S L A N D

SENIOR CARE CYBER-LIABILITY, CRISIS MANAGEMENT AND REPUTATIONAL HARM SUPPLEMENTAL APPLICATION

Payment Card Industry (PCI) Data Security Standard Validation Requirements

THE HARTFORD CYBERCHOICE 2.09 SM

Cyber Security Insurance Proposal Form

Application - All States

Cyber ERM Proposal Form


NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit

LICENSE AGREEMENT. Security Software Solutions

AXIS PRO TechNet Solutions TM Application

2.0. Application Form INSURANCE FOR SOCIAL MEDIA COMPANIES

Cyber Enhancement Endorsement

CPM. Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

Protecting Against the High Cost of Cyberfraud

ACORD 1 (2016/10) - PROPERTY LOSS NOTICE

Name Years in position Years experience Qualifications

CyberEdge. Proposal Form

Visa s Approach to Card Fraud and Identity Theft

SPRINT CLOUDCOMPUTE INFRASTRUCTURE SERVICES PRODUCT ANNEX

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

BREACH MITIGATION EXPENSE COVERAGE


TERMS AND CONDITIONS OF SERVICE 1. DEFINITIONS: Affiliate means any entity which directly or indirectly owns or controls, is controlled by, or is

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

South Carolina General Assembly 122nd Session,

SUMMARY: The Federal Trade Commission ( FTC or Commission ) requests public

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

Microsoft Online Subscription Agreement/Open Program License Agreement Amendment for HIPAA and HITECH Act Amendment ID MOS13

Cyber Security Liability:

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

AETNA BETTER HEALTH OF KENTUCKY

Information Security and Third-Party Service Provider Agreements

Data Processing Appendix

RIMS Cyber Presentation

Cyber Liability Launch Event Moscow

Record Management & Retention Policy

What we will cover. Best Practices in Insurance and Risk Management. This session driven by pub revision. Publication goals:

Miscellaneous Professional Liability Insurance Application

User Agreement 1. Your Rights.

Professional Indemnity Insurance for Security Companies Proposal Form

TECHNOLOGY ERRORS and OMISSIONS LIABILITY INSURANCE APPLICATION FORM SECTION 1 - APPLICANT INFORMATION

ZURICH LAWYERS PROFESSIONAL LIABILITY INSURANCE APPLICATION

Computer Cyber Insurance

Allocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications

INFORMATION AND CYBER SECURITY POLICY V1.1

FIDELITY INFORMATION SERVICES, LLC

TERMS AND CONDITIONS OF USE

DATA PROTECTION ADDENDUM

Terms and Conditions of Straal Payment Gateway Service (valid from )

CYBER AND PRIVACY INSURANCE

Reviewing and Drafting IT Agreements

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016

EXCERPT. Do the Right Thing R1112 P1112

UNITED OF OMAHA Contracting Checklist

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

Marketing and Media Services E&O Application

BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

COLUMBIA UNIVERSITY DATA CLASSIFICATION POLICY

Cyber Risk Insurance. Frequently Asked Questions

Transcription:

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section ACORD 834, Cyber and Privacy Coverage Section, is used to apply for cyber and privacy coverage. The form was designed to be used in conjunction with ACORD 825, Professional / Specialty Insurance Application. This form must be attached to ACORD 825 for a completed application submission. Section Name Field Name Form Page 1 IDENTIFICATION SECTION Agency Customer ID Enter identifier: The customer's identification number assigned by the producer (e.g., agency or brokerage). IDENTIFICATION SECTION Date Enter date: The date on which the form is completed. (MM/DD/YYYY) IDENTIFICATION SECTION Agency Enter text: The full name of the producer / agency. IDENTIFICATION SECTION IDENTIFICATION SECTION Policy Number Carrier Enter identifier: The identifier assigned by the insurer to the policy, or submission, being referenced exactly as it appears on the policy, including prefix and suffix symbols. If required for self-insurance, the self-insured license or contract number. Enter text: The insurer's full legal company name(s) as found in the file copy of the policy. Use the actual name of the company within the group to which the policy has been issued. This is not the insurer's group name or trade name. IDENTIFICATION SECTION NAIC Cide Enter code: The identification code assigned to the insurer by the NAIC. IDENTIFICATION SECTION Named Insured Enter text: The named insured(s) as it / they will appear on the policy declarations page. IDENTIFICATION SECTION DBA Enter text: The name by which an organization is doing business. Cyber Liability Limit Enter limit: The Cyber Liability coverage limit amount. Cyber Liability Retention Enter amount: The Cyber Liability coverage retention amount. Cyber Liability Annual E-Business Interruption and Extra Expenses Limit E-Business Interruption and Extra Expenses Retention E-Business Interruption and Extra Expenses Annual Enter amount: The Cyber Liability coverage annual modified premium charged. Enter limit: The E-Business Interruption and Extra Expenses coverage limit amount. Enter amount: The E-Business Interruption and Extra Expenses coverage retention amount. Enter amount: The E-Business Interruption and Extra Expenses coverage annual modified premium charged. ACORD 834 (2014/12) rev. 05-29-2014 Page 1 of 12

Electronic Data Restoration Expense Limit Electronic Data Restoration Expense Retention Electronic Data Restoration Expense Annual Enter limit: The Electronic Data Restoration Expense coverage limit amount. Enter amount: The Electronic Data Restoration Expense coverage retention amount. Enter amount: The Electronic Data Restoration Expense coverage annual modified premium charged. E-Threat Expenses Limit Enter limit: The E-Threat Expenses coverage limit amount. E-Threat Expenses Retention E-Threat Expenses Annual Enter amount: The E-Threat Expenses coverage retention amount. Enter amount: The E-Threat Expenses coverage annual modified premium charged. E-Vandalism Limit Enter limit: The E-Vandalism Expenses coverage limit amount. E-Vandalism Retention Enter amount: The E-Vandalism Expenses coverage retention amount. E-Vandalism Annual Privacy Notification Expenses Limit Privacy Notification Expenses Retention Privacy Notification Expenses Annual Crisis Management Expenses Limit Crisis Management Expenses Retention Crisis Management Expenses Annual Enter amount: The E-Vandalism Expenses coverage annual modified premium charged. Enter limit: The Privacy Notification Expenses coverage limit amount. Enter amount: The Privacy Notification Expenses coverage retention amount. Enter amount: The Privacy Notification Expenses coverage annual modified premium charged. Enter limit: The Crisis Managements Expenses coverage limit amount. Enter amount: The Crisis Managements Expenses coverage retention amount. Enter amount: The Crisis Managements Expenses coverage annual modified premium charged. Reward Expenses Limit Enter limit: The Reward Expenses coverage limit amount. Reward Expenses Retention Enter amount: The Reward Expenses coverage retention amount. Reward Expenses Annual Enter amount: The Reward Expenses coverage annual modified premium charged. Other Coverage Enter amount: The other coverage description. ACORD 834 (2014/12) rev. 05-29-2014 Page 2 of 12

Other Coverage Limit Enter limit: The other coverage limit amount. Other Coverage Retention Enter amount: The other coverage retention amount. Other Coverage Annual Enter amount: The other coverage annual modified premium charged. Other Coverage Enter amount: The other coverage description. Other Coverage Limit Enter limit: The other coverage limit amount. Other Coverage Retention Enter amount: The other coverage retention amount. Other Coverage Annual Effective Date Enter amount: The other coverage annual modified premium charged. Enter date: The effective date of the policy. The date that the terms and conditions of the policy commence. (MM/DD/YYYY) Expiration Date Enter date: The date on which the terms and conditions of the policy will expire. (MM/DD/YYYY) Requested Retroactive Date Enter date: The requested retroactive date if the policy was issued on a Claims Made basis. Separate Defense Costs Limit Enter amount: The limit amount for separate defense costs. Inside Check the box (if applicable): Indicates the defense limit is inside. Outside Check the box (if applicable): Indicates the defense limit is outside. Name Title Telephone Number Extension E-Mail Address Is network security contact employed by applicant? Company Name Enter text: The full name of the contact person. Enter text: The title of the network security contact in the organization or his relationship to the organization. Enter number: The network security contact primary telephone number including area code. Enter number: The network security contact phone number extension. Enter text: The network security contact's primary e-mail address. "Is Network security contact employed by applicant?" Enter text: The company name that employs the network security contact. ACORD 834 (2014/12) rev. 05-29-2014 Page 3 of 12

GENERAL INFORMATION GENERAL INFORMATION GENERAL INFORMATION GENERAL INFORMATION Does the applicant anticipate establishing or entering into any related or unrelated ventures which are a material change in operations in the next twelve (12) months? Explanation Does the applicant anticipate providing any new e-commerce products or services in the next twelve (12) months? Explanation Does the applicant provide technology services or products to third parties? "Does the applicant anticipate establishing or entering into any related or unrelated ventures which are a material change in operations in the next twelve (12) months?" Enter text: An explanation of any related or unrelated ventures that the applicant anticipates establishing or entering which are a material change in operations in the next twelve (12) months. "Does the applicant anticipate providing any new e-commerce products or services in the next twelve (12) months?" Enter text: An explanation of any new e-commerce products or services that the applicant anticipates providing in the next twelve (12) months. "Does the applicant provide technology services or products to third parties?" ACORD 834 (2014/12) rev. 05-29-2014 Page 4 of 12

Form Page 2 Section Name Field Name IDENTIFICATION SECTION Agency Customer ID Enter identifier: The customer's identification number assigned by the producer (e.g., agency or brokerage). ACORD 834 (2014/12) rev. 05-29-2014 Page 5 of 12

THIRD PARTY BUSINESS TRANSACTIONS THIRD PARTY BUSINESS TRANSACTIONS THIRD PARTY BUSINESS TRANSACTIONS Do third parties rely on the availability of the applicant's web site(s) in order to transact business? Business-to-Business Dependent Revenue Business-to-Business Dependent Revenue Does the applicat's web site(s) include copyrighted material owned by another party? If "yes", has the applicant received written permission to use the copyrighted material? Does the applicant allow placement of another vendor's hypertext link on its web site? If "yes", has the applicant obtained written consent from the other web site's owner to link to their site? Does the applicant's web site use the content of another web site and surround with frames? If "yes', is any associated trademark or advertising included? If "yes", is it made clear that the content does not belong to the applicant's business? "Do third parities rely on the availability of the applicant's web site(s) in order to transact business?" Enter amount: The business-to-business dependent revenue. Enter amount: The business-to-consumer dependent revenue. "Does the applicant's web site(s) include copyrighted material owned by another party?" "Has the applicant received written permission to use the copyrighted material?" Enter Y for a Yes response. Input N for No response. Indicates the response the question, "Does the applicant allow placement of another vendor's hypertext link on its web site?" "Has the applicant obtained written consent from the other web site's owner to link to their site?" "Does the applicant's web site use the content of another web site and surround with frames?" "Is any associated trademark or advertising included?" "Is it made clear that the content does not belong to the applicant's business?" ACORD 834 (2014/12) rev. 05-29-2014 Page 6 of 12

Does the applicant use metatags to control its web site positioning and description in search engine results? If "yes", do these metatags use competitor names, trademarks, or other identifiers that could be contstrued as infringing the intellectual property of another or create initial interest confusion? Does the applicant own a federally registered trademark in the applicant's domain name? If "no", has the applicant conducted a trademark search to determine whether their domain name infringes a trademark held by a third party? Does general councel approval all licensing and/or consent agreements to use the intellectual property of another? Is there centralized control over web site(s) development? Is there a formal process in place for general counsel approval of web site content, including banner advertising? "Does the applicant use metatags to control its web site positioning and description in search engine results?" "Do these metatags use competitor names, trademarks, or other identifiers that could be construed as infringing the intellectual property of another or create initial interest confusion?" Enter Y for a Yes response. Input N for No response. Indicates the response to question, "Does the applicant own a federally registered trademark in the applicant's domain name?" "Has the applicant conducted a trademark search to determined whether their domain name infringes a trademark held by a third party?" "Does general counsel approve all licensing and/or consent agreements to use the intellectual property of another?" "Is there centralized control over web site(s) development?" "Is there a formal process in place for general counsel approval of web site content, including banner advertising?" ACORD 834 (2014/12) rev. 05-29-2014 Page 7 of 12

PRIVATE POLICIES AND PRIVATE POLICIES AND PRIVATE POLICIES AND PRIVATE POLICIES AND PRIVATE POLICIES AND PRIVATE POLICIES AND Does the applicant's web site(s) include a forum (such as bulletin board or comment posting area) that includes communications from third parties? If "yes", does the applicant have a process to screeen postings by third parties? Does the applicant have procedures in place to ensure compliance with privacy legislation? Does the applicant collect, receive, transmit, or store confidential customer information (e.g., Social Security number, driver's license number, bank account number, credit or debit card number, etc.)? If "yes", does the applicant sell, share or otherwise disclose this personal information to third parties? Does the applicant have a privacy policy posted on all of their web sites? If "yes", has the privacy policy been reviewed and approved by general counsel? Is client sensitive information on mobile devices encrypted while in transit and at rest? "Does the applicant's web site(s) include a forum (such as bulletin board or comment posting area) that includes communications from third parties?" "Does the applicant have a process to screen postings by third parties?" "Does the applicant have procedures in place to ensure compliance with privacy legislation (such as the health insurance portability and accountability - HIPAA, the Gramm-Leach-Bliley Act or other applicable legislation) with respect to the protection of confidential information?" "Does the applicant collect, receive, transmit, or store confidential customer information (e.g., social security number, drivers' license number, bank account number, credit or debit card number, etc.)?" "Does the applicant sell, share or otherwise disclose this personal information to third parities?" "Does the applicant have a privacy policy posted on all of their web sites?" "Has the privacy policy been reviewed and approved by general counsel?" "Is client sensitive information on mobile devices encrypted while in transit and at rest?" ACORD 834 (2014/12) rev. 05-29-2014 Page 8 of 12

PRIVATE POLICIES AND INFORMATION SECURITY POLICIES AND INFORMATION SECURITY POLICIES AND INFORMATION SECURITY POLICIES AND INFORMATION SECURITY POLICIES AND INFORMATION SECURITY POLICIES AND INFORMATION SECURITY POLICIES AND THIRD PARTY SERVICE PROVIDERS THIRD PARTY SERVICE PROVIDERS THIRD PARTY SERVICE PROVIDERS Is applicant PCI compliant? Does the applicant maintain an information systems security policy? Does the applicant have a laptop security policy? Does the applicant store sensitive data on web servers? Does the applicant have a computer security breach incident response plan (IRP)? Are penetration tests conducted on the applicant's network at least annually? Does the applicant utilize firewalls, anti-intrusion and anti-virus software/programs? Is the infrastructure of the applicant's web site hosted by a third party, or is the content of the applicant's website managed by a third party? Does the applicant use the services of an application service provider (ASP)? Does the applicant outsource infrastructure operations? "Is applicant PCI compliant?" "Does the applicant maintain an information systems security policy?" "Does the applicant have a laptop security policy?" "Does the applicant store sensitive data on web servers?" "Does the applicant have a computer security breach incident response plan (IRP)?" "Are penetration tests conducted on the applicant's network at least annually?" "Does the applicant utilize firewalls, anti-intrusion and anti-virus software / programs?" "Is the infrastructure of the applicant's web site hosted by a third party, or is the content of the applicant's website managed by a third party?" "Does the applicant use the services of an application service provider (ASP)?" "Does the applicant outsource infrastructure operations?" ACORD 834 (2014/12) rev. 05-29-2014 Page 9 of 12

THIRD PARTY SERVICE PROVIDERS THIRD PARTY SERVICE PROVIDERS THIRD PARTY SERVICE PROVIDERS AUDITING PRACTICES AUDITING PRACTICES AUDITING PRACTICES Does the applicant use the services of a third party for off-site backup and/or archiving of electronic data? Does the applicant require resolution of non-compliance issues within a stipulated time period? If you responded "yes" to any of the above questions 1-5: Does the agreement require a level of security commensurate with the applicant's information systems security policy? Has the applicant had an external network security assessment conducted within the last twelve (12) months? If "yes", who conducted the assessment? If "yes', have all critical recommendations been complied with? "Does the applicant use the services of a third party for off-site backup and/or archiving of electronic data?" "Does the applicant require resolution of non-compliance issues within a stipulated time period?" "Does the agreement require a level of security commensurate with the applicant's information systems security policy?" "Has the applicant had an external network security assessment conducted within the last twelve (12) months?" Enter text: The name of the person who conducted the audit assessment. "Have all critical recommendations been complied with?" Form Page 3 Section Name Field Name IDENTIFICATION SECTION Agency Customer ID Enter identifier: The customer's identification number assigned by the producer (e.g., agency or brokerage). ACORD 834 (2014/12) rev. 05-29-2014 Page 10 of 12

REPRESENTATION: PRIOR REPRESENTATION: PRIOR REPRESENTATION: PRIOR REPRESENTATION: PRIOR REPRESENTATION: PRIOR REPRESENTATION: PRIOR REPRESENTATION: PRIOR Has the applicant at any time during the past three (3) years put its insurance carrier on notice of any potential or actual losses under its prior insurance program that may have fallen under the scope of the proposed coverage? Was the applicant specifically targeted for such computer attacks? If there were targeted attacks, were the reasons disclosed for these targeted attacks? What were the direct costs associated with all computer attacks? Have any of the computer attacks resulted in unauthorized access to, or corruption or data? Has the applicant experienced a security breach that required notification of customers or other third parties? Does any person or entity proposed for coverage have any prior knowledge of facts, circumstances or situations which he or she has reason to believe may give rise to any claim that may fall within the scope of the proposed coverage? "Has the applicant at any time during the past three (3) years put its insurance carrier on notice of any potential or actual losses under its prior insurance program that may have fallen under the scope of the proposed coverage?" "Was the applicant specifically targeted for such computer attacks?" "If there were targeted attacks, were the reasons disclosed for these targeted attacks?" Enter amount: The direct costs associated with all computer attacks. "Have any of the computer attacks resulted in unauthorized access to, or corruption or erasure of data?" "Has the applicant experienced a security breach that required notification of customers or other third parties?" "Does any person or entity proposed for coverage have any prior knowledge of facts, circumstances or situations which he or she has reason to believe may give rise to any claim that my fall within the scope of the proposed coverage?" SIGNATURE Name Enter text: The named insured(s) as it / they will appear on the policy declarations page. ACORD 834 (2014/12) rev. 05-29-2014 Page 11 of 12

SIGNATURE Signature Sign here: Accommodates the signature of the applicant or named insured. SIGNATURE Authorized Representative Title Enter text: The title of the individual in the organization or his relationship to the organization. SIGNATURE Date Enter date: The date the form was signed by the named insured. (MM/DD/YYYY) SIGNATURE Name Enter text: The named insured(s) as it / they will appear on the policy declarations page. SIGNATURE Signature Sign here: Accommodates the signature of the applicant or named insured. SIGNATURE Authorized Representative Title Enter text: The title of the individual in the organization or his relationship to the organization. SIGNATURE Date Enter date: The date the form was signed by the named insured. (MM/DD/YYYY) SIGNATURE SIGNATURE SIGNATURE SIGNATURE SECTION Producer's Name Producer's Signature National Producer Number State Producer License Number Enter text: The name of the authorized representative of the producer, agency and/or broker that signed the form. Sign here: Accommodates the signature of the authorized representative (e.g., producer, agent, broker, etc.) of the company(ies) listed on the document. This is required in most states. Enter identifier: The National Producer Number (NPN) as defined in the National Insurance Producer Registry (NIPR). Note: The NPN is not the same as the producer state license number. Enter identifier: The State License Number of the producer. SIGNATURE Date Enter date: The date the producer signed the form. ACORD 834 (2014/12) rev. 05-29-2014 Page 12 of 12