Cyber, Security and Privacy Questionnaire
|
|
|
- Gavin Doyle
- 10 years ago
- Views:
Transcription
1 Cyber, Security and Privacy Questionnaire
2 Please note: This is an electronic application. When completed please save and to: Ed McGuire Cyber, Security & Privacy Questionnaire General Information Entity Name: Address: Contact Person: Website Address: Total # of Employees: Date Company Established: Business Type: Individual Partnership LLC Corporation Is the Company Owned, Controlled or Affiliated with another Company? Description of Operations: Rating Information Annual Revenues: Last Year: Next 12 Months: Does the application collect, receive process, transmit, store or maintain any of the following confidential information: Personally Identifiable Information (PII) or Protected Health Information (PHI) Credit/Debit Card Data Social Security Numbers Bank Account Info Driver s License Numbers Medical Records Employee/HR Info Customer Info Corporate Confidential Info? Intellectual Property of Others Other Info Please provide an estimate of the following stored records: Electronic Records containing PII or PHI: Paper or Other Records containing PII or PHI:
3 Risk Management Policies & Procedures Does the applicant employ a Chief Information Officer (CIO)? Does the applicant employ a Chief Security Officers/IT Security Person?. Do you have any of the following written Policies/Procedures? Privacy Policy? (If so, please attach a copy) Network Security Policy? (If so, please attach a copy). Identity Theft Prevention Program?. Breach Incident Response Plan?. Business Continuity/Disaster Recovery Plan?. Laptop/Computer use Policy?. Employee Training regarding Confidential Information?. Network Security & Data Management Do you use Firewall Protection?. Do you use Anti Virus Protection? Use Intrusion Detection Software? Perform System/Info. Backup tapes? Username/Password Management?. Wireless Access Points Secured? Encrypt Sensitive Data in transit? Encrypt Data at Rest on Servers? Pre Test Software Patches? 3 rd Party Network Intrusion Tests? 3 rd Party Privacy Compliance Audits? Does the Applicant encrypt confidential information stored on Portable Devices, such as, laptops, flash drives, back up tapes, smart phones, tablets, etc.? Does the Applicant store any confidential information in The Cloud?. Does the Applicant use any 3 rd party or outsourced vendors to service or store their customer and/or employee data? Regulatory & Compliance Management Do you have procedures in place to comply with the following laws governing confidential information? HIPAA? HITECH Act?. State Notification Laws? State/Federal Privacy Laws?.
4 Graham Leach Bliley Act? Sarbanes Oxley?. FACTA/Red Flags Rules? Payment Card Industry (PCI)?. Website Media Exposure Do you have a procedure to monitor material displayed on your website for copyright, trademark, libel, slander or Invasion of privacy?. Do you have a procedure to remove or deleted offensive/controversial material?. Do you publish a bulletin board, chat room, or social networking on your site?. Past Circumstances/Claims/Breaches Have you ever had a regulatory proceeding or investigation? (if Yes, give details?. During the past 5 years have you had any privacy breach incident or complaint?. During the past 5 years have you had any complaints or litigation pertaining a Network Security or Privacy Breach?. Is the Applicant or any Director, Officer or Employee aware of any circumstance that could give rise to a claim under the proposed coverage?.. Prior Coverage Do you currently carry insurance coverage for Network Security, Privacy or Cyber? If so, please provide the following information: Insurer Name Effective Date Limits Deductible Retro Date Premium In the last 3 years, have you had any similar insurance declined, canceled or non renewed?.
5 Representations The Applicant declares that the above statements and representations are true and correct, and that no facts have been suppressed or misstated. The Applicant understands that any untrue or incorrect statements contained within this application may result in no coverage being available as the result of a loss or the cancellation of coverage back to its inception. All written statements and materials furnished to the Company, in conjunction with this application will be incorporated by reference into this application and made part hereof. This application does not bind the Applicant to buy, or the Company to issue the insurance, but it is agreed that this form shall be the basis of the contract should a policy be issued, and it will be attached to and made part of the policy. The undersigned Applicant declare that if the information supplied on this application changes between the dates of this application and the time when the policy is issued, the Applicant will immediately notify the company of such changes, and the Company may withdraw or modify any outstanding quotations and/or authorization or agreement to bind the insurance. Signature of Producing Agent: Date: Signature of Insured: Date:
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
Zurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
Enterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:
Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned
MISCELLANEOUS ERRORS & OMISSIONS MEDIATECH INSURANCE APPLICATION
MISCELLANEOUS ERRORS & OMISSIONS MEDIATECH INSURANCE APPLICATION 1. APPLICANT INFORMATION 1. Name of Organization or Legal Entity (Applicant) including any subsidiaries: (please show complete name as you
Cyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION
MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION NOTICE: THE POLICY FOR WHICH THIS APPLICATION IS MADE IS A CLAIMS MADE AND REPORTED POLICY SUBJECT TO
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
What would you do if your agency had a data breach?
What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the
HIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application
IRONSHORE INSURANCE COMPANIES One State Street Plaza New York, NY 10004 Tel: 646-826-6600 Toll Free: 877-IRON411 TechDefender SM Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application
CyberEdge Insurance Proposal Form
Note to the Proposer Signing or completing this proposal does not bind the Proposer, or any individual or entity he or she is representing to complete this insurance. Please provide by addendum any supplementary
Privacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box 80278 Portland, OR 97280 503-384-2538 877-376-1981 503-384-2539 Fax
Please Read This business associate audit questionnaire is part of Apgar & Associates, LLC s healthcare compliance resources, Copyright 2014. This questionnaire should be viewed as a tool to aid in evaluating
MEDIATECH APPLICATION
MEDIATECH APPLICATION FOR PURPOSES OF THE INSURANCE COMPANIES ACT (CANADA), THIS DOCUMENT WAS ISSUED IN THE COURSE OF LLOYD S UNDERWRITERS AND LIBERTY MUTUAL INSURANCE COMPANY S INSURANCE BUSINESSES IN
Application for NetProtect 360 Information Risk Insurance (for General Industry)
Application for NetProtect 360 Information Risk Insurance (for General Industry) THIS APPLICATION IS NEITHER AN OFFERING NOR A BINDER OF COVERAGE. ALSO, YOUR COMPLETION OF THIS APPLICATION DOES NOT OBLIGATE
Cyber Extension Proposal Form
Cyber Extension Proposal Form IMPORTANT NOTICE This proposal must be completed and signed by a Principal, Partner or Director of the Proposer. The person completing and signing the form should be authorised
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established
Network Security ProPosal Form Important Please answer all questions from each section and complete in block capitals. Tick the appropriate boxes where necessary and supply any further information requested.
THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK
THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK SECURITY AND THEFT OF DATA COVERAGE APPLICATION Name of Insurance Company to which application is made NOTICE: THIS POLICY PROVIDES CLAIMS MADE COVERAGE.
PRODUCT MANUFACTURER S PROFESSIONAL LIABILITY, INCLUDING COMPUTER NETWORK SECURITY, PRIVACY, MULTIMEDIA AND ADVERTISING LIABILITY APPLICATION
PRODUCT MANUFACTURER S PROFESSIONAL LIABILITY, INCLUDING COMPUTER NETWORK SECURITY, PRIVACY, MULTIMEDIA AND ADVERTISING LIABILITY APPLICATION NOTICE: THE POLICY FOR WHICH THIS APPLICATION IS MADE IS A
BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION
BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION NOTICE: INSURING AGREEMENTS I.A., I.C., I.D. AND I.F. OF THIS POLICY PROVIDE COVERAGE
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
6. Does Applicant encrypt all sensitive and Personally Identifiable Information? Yes No If yes, give details:
Name of Insurance Company to which Application is made (herein called the Insurer ) CORPORATE IDENTITY PROTECTION NOTICE: AMOUNTS INCURRED FOR DEFENSE COSTS, ADMINISTRATIVE EXPENSES, NOTIFICATION COSTS,
Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President [email protected] 2 What s at Risk? $300 billion in
AIG CORPORATE IDENTITY PROTECTION
Name of Insurance Company To Which Application is Made Name of Insurance Company to which Application is made (herein called the Insurer ) AIG CORPORATE IDENTITY PROTECTION NOTICE: AMOUNTS INCURRED FOR
ACE Privacy Protection Privacy & Network Liability Insurance Program Small Business Application
ACE Privacy Protection Privacy & Network Liability Insurance Program Small Business Application NOTICE The Policy for which you are applying is written on a claims made and reported basis. Only claims
Technology, Privacy and Cyber Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION
BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION NOTICE: INSURING AGREEMENTS I.A., I.C., I.D. AND I.F. OF THIS POLICY PROVIDE COVERAGE
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
ACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
MISCELLANEOUS PROFESSIONAL LIABILITY / GENERAL LIABILITY APPLICATION
MISCELLANEOUS PROFESSIONAL LIABILITY / GENERAL LIABILITY APPLICATION COVERAGE PART A PROFESSIONAL LIABILITY INSURANCE COVERAGE THIS APPLICATION IS FOR A CLAIMS MADE INSURANCE POLICY Please read your policy
Professional Liability Errors and Omissions Insurance Application
HCC Specialty 37 Radio Circle Drive Mount Kisco, NY 10549 main (914) 242 7840 facsimile (914) 241 1133 e-mail [email protected] Professional Liability Errors and Omissions Insurance Application THIS IS AN APPLICATION
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
Managing data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013
Updates on HIPAA, Data, IT and Security Technology June 25, 2013 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind, including,
PROPOSAL FORM FOR DIRECTORS AND OFFICERS LIABILITY INSURANCE
PROPOSAL FORM FOR DIRECTORS AND OFFICERS LIABILITY INSURANCE NOTICE: PLEASE READ CAREFULLY. THIS IS A PROPOSAL FOR A CLAIMS-MADE AND REPORTED POLICY. THE POLICY FOR WHICH THIS PROPOSAL IS MADE IS LIMITED
Managing Cyber & Privacy Risks
Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
All Products Application
All Products Application *To be able to save this form after the fields are filled in, you will need to have Adobe Reader 9 or later. If you do not have version 9 or later, please download the free tool
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal
Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies
HIPAA Privacy and Information Security Management Briefing
HIPAA Privacy and Information Security Management Briefing Karen Pagliaro-Meyer Privacy Officer [email protected] (212) 305-7315 Soumitra Sengupta Information Security Officer [email protected] (212)
Internet & Cell Phone Usage Policy
Internet & Cell Phone Usage Policy The Internet usage Policy applies to all Internet & Cell phone users (individuals working for the company, including permanent full-time and part-time employees, contract
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently
Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. [email protected]
Data Security 101 A Lawyer s Guide to Ethical Issues in the Digital Age Christopher M. Brubaker [email protected] November 4-5, 2015 Pennsylvania Bar Institute 21 st Annual Business Lawyers Institute
Case 2:15-cv-03432-DDP-AGR Document 1 Filed 05/07/15 Page 1 of 15 Page ID #:1 UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA
Case :-cv-0-ddp-agr Document Filed 0/0/ Page of Page ID #: 0 Matthew T. Walsh, Esq. (Bar No. ) CARROLL, McNULTY & KULL LLC 00 North Riverside Plaza, Suite 00 Chicago, Illinois 00 Telephone: () 00-000 Facsimile:
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
PII = Personally Identifiable Information
PII = Personally Identifiable Information EMU is committed to protecting the privacy of personally identifiable information of its students, faculty, staff, and other individuals associated with the University.
Dragonshield Proposal Form Broad Form Management Liability Insurance
AIG Insurance Hong Kong Limited Dragonshield Proposal Form Broad Form Management Liability Insurance Notices: In underwriting your application for coverage, the insurer will rely upon the accuracy and
Understanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 [email protected] Disclaimer The views expressed
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
CPM. Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS
CPM INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS Application Form This is an application for a cyber, privacy and media liability package policy aimed at a wide range of companies and professionals. CPM
Sustainable Compliance: A System for Ongoing Audit Readiness
View the Replay on YouTube Sustainable Compliance: A System for Ongoing Audit Readiness FairWarning Executive Webinar Series November 14, 2013 Agenda Sustainable Compliance at St. Charles Health System
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
CSR Breach Reporting Service Frequently Asked Questions
CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
How To Deal With Cloud Computing
A LEGAL GUIDE TO CLOUD COMPUTING INTRODUCTION Many companies are considering implementation of cloud computing services to decrease IT costs while providing the flexibility to scale usage on demand. The
INFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
