Similar documents
Cyber Security Liability:

At the Heart of Cyber Risk Mitigation

Cyber Risks & Insurance

Data Breach Program Pricing Companies with revenues less than $1,000,000

NZI LIABILITY CYBER. Are you protected?

Cyber-Insurance: Fraud, Waste or Abuse?


Your defence toolkit. How to combat the cyber threat

PRIVACY AND CYBER SECURITY

Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

IDENTITY THEFT COVERAGE ON INSURANCE POLICIES SPONSORED BY

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

A GUIDE TO CYBER RISKS COVER

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

Cyber breaches: are you prepared?

Cyber Liability A New Must Have Coverage for Your Soccer Organization

TERMS AND CONDITIONS OF USE

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Electronic Commerce and Cyber Risk

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

Cyber Risks & Cyber Insurance

Cyber Liability Insurance. Data Security, Privacy and Multimedia Protection

Cyber Liability: New Exposures

FM Global. First-Party Property Cyber Coverage

Fraud and Cyber Insurance Discussion. Will Carlin Ashley Bauer

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

Privacy and Data Breach Protection Modular application form

Directors & Officers Insurance 101

Cyber, Data Risk and Media Insurance Application form

Cyber Risk Insurance. Frequently Asked Questions

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

STEPPING INTO THE A GUIDE TO CYBER AND DATA INSURANCE BREACH

Protecting Against the High Cost of Cyberfraud

Cyber Enhancement Endorsement

Managing E-Commerce Risks

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Cyber Risk Proposal Form

Cyber Insurance for Lawyers

NON-PROFIT INSURANCE 101. Presented by Jamie Saunders and Jeff McCann

Chubb Cyber Enterprise Risk Management

Virus Protection and Personal Internet & Identity Theft Coverage Terms and Conditions

Does the Applicant provide data processing, storage or hosting services to third parties? Yes No

ACORD 834 (2014/12) - Cyber and Privacy Coverage Section

CPM. Esurance TM CPM Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Data Breach Financial Protection Program Terms and Conditions

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

Providing greater coverage for the greater good.

Data Security Addendum for inclusion in the Contract between George Mason University (the University ) and the Selected Firm/Vendor

CPM. Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

HOW TO INSURE CYBER RISKS? Oulu Industry Summit

One Tower Square Hartford, Connecticut (A Stock Insurance Company, herein called the Company)

Terms and Conditions of 2b App Service

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

Cybersecurity Privacy and Network Security and Risk Mitigation

Cyber Risk & Insurance

FIDELITY INSURANCE REQUIREMENTS IN RESPECT OF COMMUNITY SCHEMES (INCLUDING BODIES CORPORATE)

Hartford Steam Boiler (HSB) data security products for Commercial Lines.

"$& % ,* %646?/7-2159;7;4A! +=;32>>6;9/7 )6/0676?A,8/77 "<<761/?6;9

Crawford Cyber Risk Services. A definitive solution for cyber-related events

Cyber Security & Insurance Solution Karachi, Pakistan

Mobile Check Deposit Disclosure & Agreement

NEXTIVA DRIVE SERVICE TERMS & CONDITIONS

(1) "Consumer" means an individual who resides in the District of Columbia.

Evaluating Your Company s Data Protection & Recovery Plan

PENSOFT PAYROLL HOSTED SOLUTION AGREEMENT

PROMOTION NAME: Student Insurance Services Sweepstakes Program ( Sweepstakes ) DATES: Starts 10/15/16 Ends 3/31/17 at 11:59 p.m.

TERMS OF USE. Unless otherwise noted, all tickets, goods, and services sold on the TicketBiscuit platform adhere to a NO REFUNDS, NO EXCHANGES policy.

APPLICATION for: TechGuard Liability Insurance Claims Made Basis. Underwritten by Underwriters at Lloyd s, London

RIMS Cyber Presentation

ACS SCHOOLS POLICY WORDING

2.0. Application Form INSURANCE FOR SOCIAL MEDIA COMPANIES

MANAGING DATA BREACH

No purchase necessary to enter or win. Product purchase will not enhance chances of winning a prize.

THE HARTFORD CYBERCHOICE 2.09 SM

Tax-Related Identity Theft

Jason B. Freeman, J.D., CPA

SENIOR CARE CYBER-LIABILITY, CRISIS MANAGEMENT AND REPUTATIONAL HARM SUPPLEMENTAL APPLICATION

CPM. Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

DEBUNKING MYTHS FOR CYBER INSURANCE

TERMS OF USE AGREEMENT

An Overview of Cyber Insurance at AIG

Running With Scissors Trends Suggest that Cyber Loss are On Track to Becoming One of the Most Significant Exposures Facing Companies In Years

When The Wind Blows: Renewable Energy Risk Management Strategies

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

INFORMATION AND CYBER SECURITY POLICY V1.1

About these Terms and Conditions

TERMS 1. OUR PRODUCTS AND SERVICES 2. INFORMATION SERVICES 3. INSTALLED SOFTWARE

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION

RESTRICTIONS ON USE OF INFORMATION AND CONTENT

CGC WIN BIG WITH PRO SERIES FILL & FINISH CONTEST CONTEST RULES

ProtoType 2.0 Manufacturing E&O with CyberInfusion

Cyber Liability Insurance for Sports Organizations

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

MEDIATECH INSURANCE APPLICATION THIS APPLICATION IS FOR A CLAIMS MADE POLICY PLEASE INDICATE WHICH COVERAGES ARE REQUIRED Technology and Professional

Property business interruption Policy wording

Personal Information Protection Act Breach Reporting Guide

Cyber Risk Mitigation

Professional Indemnity and Cyber Insurance for Technology Companies Summary of cover

Transcription:

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a result, a number of customers bring a claim against the insured for allowing access to their personal information. Damages and defense costs for covered lawsuits. Communications! &! Media Liability A lawsuit is brought against the insured by a competitor alleging that their online marketing content and product branding have been plagiarized and their trademarks infringed upon. Damages and defense costs for covered lawsuits. Regulatory! Defense Expenses An insured with offices nationwide suffers a major data breach involving thousands of customers. As a result, Attorneys General in multiple states bring a regulatory action against the insured. Costs for responding to regulatory claims stemming from the data breach.

Insuring! Agreement Security Breach! Remediation! & Notification! Expense Claim! Scenario A skilled cyber criminal hacks into the insured s internal processing system. Names, Addresses and credit card information for over 500,000 of the insured s customers are captured out of the system. Coverage! Response Costs for hiring a breach response firm to find and fix the breach, assist with notice requirements and expenses, provide credit monitoring and a call center for impacted individuals, and obtaining an ID Fraud policy for affected victims. Computer Program! & Electronic! Data! Restoration! Expenses A computer virus totally destroys the insured s operating system software and data. Costs for repair and restoration of the insured s computer programs and electronic data. Computer! Fraud An organized crime ring gains unauthorized access to the insured s accounts payable in their computer system, and alters the bank routing information on outgoing payments. The result: $1 million transferred to the crime ring s account. Direct loss of the insured s money, securities, or other property.

Insuring! Agreement Funds Transfer! Fraud Claim! Scenario The insured receives an email that appeared to be from its bank but was not. The insured s employee opened the email, which activated a computer virus called a Trojan Horse that read key strokes from their computer. The perpetrator used this means to obtain banking and password information and initiate a fraudulent electronic wire transfer from the insured s bank account. Coverage! Response The insured s funds that were fraudulently transferred from its bank account. E-Commerce! Extortion The insured receives a series of notes which threaten to hack into its customer database and disclose all of the contact information to the general public. Money or securities paid to the extortioner. Business Interruption & Additional Expenses A company s server is infected by a severe virus As a result, the insured s website is not available to customers for an extended period of time. The net profit that would have been earned (or net losses that would have been avoided) resulting from the computer system disruption.

&