Cyber Risk Proposal Form

Similar documents
CYBER RISK INSURANCE. Proposal Form

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

Cyber ERM Proposal Form

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

Privacy and Data Breach Protection Modular application form

Cyber, Data Risk and Media Insurance Application form

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No

Cyber Security Insurance Proposal Form

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

APPLICATION FOR DATA BREACH AND PRIVACY LIABILITY, DATA BREACH LOSS TO INSURED AND ELECTRONIC MEDIA LIABILITY INSURANCE

Cyber Liability A New Must Have Coverage for Your Soccer Organization

Computer Cyber Insurance

Combined Liability Insurance for Financial Technology Companies Proposal Form

Cyber Comprehensive Insurance

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional

Cyber ERM Proposal Form

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

CPM. Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

CPM. Esurance TM CPM Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

Cyber & Privacy Liability and Technology E&0

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No. Most Recent Twelve (12) months: (ending: / )

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION

SENIOR CARE CYBER-LIABILITY, CRISIS MANAGEMENT AND REPUTATIONAL HARM SUPPLEMENTAL APPLICATION

INFORMATION AND CYBER SECURITY POLICY V1.1

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

Section 1 - Errors and Omission

CyberEdge. Proposal Form

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

A GUIDE TO CYBER RISKS COVER

Application - All States

Allocating Risk for Privacy and Data Security in Commercial Contracts and Related Insurance Implications

Professional Indemnity Insurance for Accountants Proposal Form

Professional Indemnity Insurance for Security Companies Proposal Form

BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

Cyber breaches: are you prepared?

ExecSurance TM. ML Application Form MANAGEMENT LIABILITY INSURANCE

SECURITY POLICY 1. Security of Services. 2. Subscriber Security Administration. User Clearance User Authorization User Access Limitations

Professional Indemnity Insurance for Surveyors (and related professions) Proposal Form

REF STANDARD PROVISIONS

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

Ball State University

Cyber Liability Launch Event Moscow

DATA PROCESSING ADDENDUM

TECHNOLOGY ERRORS and OMISSIONS LIABILITY INSURANCE APPLICATION FORM SECTION 1 - APPLICANT INFORMATION

Cyber Risks & Insurance

Cyber Risk Mitigation

AXIS PRO PRIVASURE INSURA

ZURICH LAWYERS PROFESSIONAL LIABILITY INSURANCE APPLICATION

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016

Professional Indemnity Insurance for the Designing and Consulting Department of Contractors Proposal Form

HIPAA Compliance Guide

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

Protecting Against the High Cost of Cyberfraud

Name Years in position Years experience Qualifications

Cyber Risk Insurance Policy Application

Cyber-Insurance: Fraud, Waste or Abuse?

March 1. HIPAA Privacy Policy

Miscellaneous Professional Liability Insurance Application

Cyber Risk Insurance. Frequently Asked Questions

LICENSE AGREEMENT. Security Software Solutions

NEW CYBER RULES FOR NEW YORK-BASED BANKING, INSURANCE AND FINANCIAL SERVICE FIRMS HAVE FAR-REACHING EFFECTS

Payment Card Industry (PCI) Data Security Standard Validation Requirements

ASX CLEAR OPERATING RULES Guidance Note 10

STEPPING INTO THE BREACH A GUIDE TO CYBER AND DATA INSURANCE

CPM. Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

Cyber Enhancement Endorsement

Cyber Liability: New Exposures

MentorcliQ Data Processing Agreement

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

SERVICE/PRODUCTS ALLOCATION/DESCRIPTION OF OPERATIONS to be completed by all

IT Data Destruction Risks vs. Rewards. Corey Dehmey Director of Sustainability AERC Recycling Solutions

NZI LIABILITY CYBER. Are you protected?

ELECTRONIC COMMERCE (E-COMMERCE)

2.0. Application Form INSURANCE FOR SOCIAL MEDIA COMPANIES

BREACH MITIGATION EXPENSE COVERAGE

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

PRIVACY AND CYBER SECURITY

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

Evanston Insurance Company Markel American Insurance Company Markel Insurance Company

THE HARTFORD CYBERCHOICE 2.09 SM

University Data Policies

NAPBS BACKGROUND SCREENING AGENCY ACCREDITATION PROGRAM ACCREDITATION STANDARD AND AUDIT CRITERIA Version 2.0. Potential Verification for Onsite Audit

DATA COMPROMISE COVERAGE RESPONSE EXPENSES AND DEFENSE AND LIABILITY

Cyber Risks & Cyber Insurance

(PLEASE PRINT OR TYPE) 1. Full Name of Insured: Address: City State Zip. Area Code/Phone Fax# . Mailing Address:

DATA PROTECTION ADDENDUM


AWS GDPR DATA PROCESSING ADDENDUM

CYBER AND PRIVACY INSURANCE

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Terms and Conditions

H 7789 S T A T E O F R H O D E I S L A N D

IT Risk in Credit Unions - Thematic Review Findings


COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

Credit Card Handling Security Standards

Transcription:

Cyber Risk Proposal Form Company or trading name Address Postcode Country Telephone Email Website Date business established Number of employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned responsibility for your global obligations under Data Protection and Privacy legislation? Yes No Desired Coverages Limits Covers required Network Security and Privacy Liability Multimedia Liability Privacy Regulatory Defence and Penalties Business Interruption and Additional Costs of Working Crisis Management Cyber Extortion

Financial information Gross Annual Revenue Last Year Current Year Next Year (estimated) of gross annual revenue account for by sales or operations through your website of annual transactions paid by debit/credit card Average Transaction value Percentage of last year s gross annual revenue generated from: 2014/15 IT system budget Network and Data Security Do you store, process and or transmit any Sensitive Data on Credit card information Customer Information Your Computer System (Tick all that apply) Healthcare information Money/Securities information Do you process payments on behalf of others, including Trade Secrets Intellectual Property Assets

e-commerce transactions? Yes No Do you outsource any part of Your network, computer system or information security functions? Tick all that apply Data center hosting Managed Security Data Processing Application service Provider Alert log monitoring Offsite backup and storage Do you require all vendors to whom You outsource data processing or hosting functions (e.g. data backup, application service providers etc) to demonstrate adequacy of their IT systems? Yes No If Yes, please indicate method of verification Do you have strict user revocation procedures on user accounts and inventoried recovery of all information assets following employee termination? Yes No Do you have anti-virus software on all computer devices, servers and networks that are updated in accordance with the software providers recommendations? Yes No Do you have firewalls and intrusion monitoring detection in force to prevent and monitor unauthorised access? Yes No Do you have access control procedures and hard drive encryption to prevent unauthorised exposure of data on all laptops, PDAs, smartphones (e.g. Blackberry) and homebased PCs? Yes No Is your network configured to ensure that access to sensitive data is limited to properly authorised requests? Yes No Is all sensitive and confidential information stored on your databases, servers and data files encrypted? Yes No Do you have a document retention and destruction policy within your organisation? Yes No Vendor name providing services Crime Risk Proposal

Do you provide awareness training for employees in data privacy and security, including legal liability issues, social engineering issues (e.g. phishing etc)? Yes No If Yes, please describe the medium and frequency of such training Do you have strict user revocation procedures on user accounts and inventoried recovery of all information assets following employee termination? Yes No 1 2 3 4 Do you have anti-virus software on all computer devices, servers and networks that are updated in accordance with the software providers recommendations? Yes No Incident Response / Crisis Containment Do you have a security incident response plan in case of a security breach? Yes No Does your security incident response plan include alternative options to account for incapacitated third party outsourcing providers who you depend on? Yes No Have you identified all regulatory and industry compliance frameworks? Yes No Please provide details on the following compliance frameworks: Gramm-Leach Bliley Act 1999 Yes No Date of latest audit Health Insurance Portability and Accountability Act of 1996 Yes No Date of latest audit Payment Card Industry (PCI) Data Security Standard Yes No If Yes, what level requirement Date of latest audit Do You have a Business Continuity Plan (BCP) and Disaster Recovery (DR) Plan? Yes No

12h or less 13-24h More than 24h Crime Risk Proposal How long does it take to restore your operation after a computer attack or other loss/corruption of data? Indicate time after which the inability of staff to access your internal computer network and systems would have a significant impact on your business Immediately After 12h After 48h After 6h After 24h Is the operation and connectivity of your computer network business critical? Yes No Indicate time after which the inability for customers to access your website would have a significant impact on your business Immediately After 12h After 48h After 6h After 24h Briefly describe your recovery/ contingency plans to avoid business interruption due to IT system failure, and/or alternative working procedures (interdependency, outsourcing etc)

Historical Information Has any insurer ever cancelled or non-renewed a policy that provided the same or similar coverage as the insurance sought? Yes No Are You aware of any actual or alleged fact, circumstance, situation, error or omission, or issue which might give rise to a Claim against You under the insurance sought? Yes No If Yes, please explain Are you aware of any circumstances or incidents that have resulted in any claim against you and/or a claim against any insurance policy that provides the type of coverage being requested in this application? Yes No Have you or any past or present principal, partner, director or employee been subject to any disciplinary action or governmental action or investigation as a result of professional activities? Yes No During the past three years, have You experienced an interruption or suspension of Your computer system for any reason (not including downtime for planned maintenance), which exceeded 4 hours? Yes No Have you ever suffered an intentional breach of IT security, network damage, system corruption, or loss of data? Yes No Have you ever sustained a material or significant system intrusion, tampering, virus or malicious code attack, loss of data, hacking incident, data theft or similar incident or situation? Yes No During the last three years has any customer or other person or entity alleged that their personal data has been compromised? Yes No During the last three years have you notified customers that their information was or may have been compromised? Yes No Have You reported any occurrences, claims or losses to any Insurer in the past 5 years that provided the same or similar insurance to the Insurance Sought? Yes No

Declaration We Hereby declare that the statement made by us in this Questionnaire and proposal are, to be best of our knowledge and belief, complete and true, and we hereby agree that this Questionnaire and Proposal forms the basis and is part of any policy issued in connection with the above risk(s). It is agreed that the insurers are liable in accordance with the terms of the policy only and that the insured will not lodge any other claim of whatsoever nature. The insurers undertake to deal with this information in strict confidence. Signature of Proposer: Date: Liability does not begin until this proposal has been accepted by the Company and the premium paid, except as provided by any official cover note by the Company