Cyber, Security and Privacy Questionnaire



Similar documents
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

Zurich Security And Privacy Protection Policy Application

Enterprise PrivaProtector 9.0

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

MISCELLANEOUS ERRORS & OMISSIONS MEDIATECH INSURANCE APPLICATION

Cyber and Data Security. Proposal form

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

What would you do if your agency had a data breach?

HIPAA/HITECH Compliance Using VMware vcloud Air

TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application

CyberEdge Insurance Proposal Form

Privacy and Data Breach Protection Modular application form

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

MEDIATECH APPLICATION

Application for NetProtect 360 Information Risk Insurance (for General Industry)

Cyber Extension Proposal Form

Client Security Risk Assessment Questionnaire

1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

PRODUCT MANUFACTURER S PROFESSIONAL LIABILITY, INCLUDING COMPUTER NETWORK SECURITY, PRIVACY, MULTIMEDIA AND ADVERTISING LIABILITY APPLICATION

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

6. Does Applicant encrypt all sensitive and Personally Identifiable Information? Yes No If yes, give details:

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

AIG CORPORATE IDENTITY PROTECTION

ACE Privacy Protection Privacy & Network Liability Insurance Program Small Business Application

Technology, Privacy and Cyber Protection Modular application form

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Security Controls What Works. Southside Virginia Community College: Security Awareness

Top Ten Technology Risks Facing Colleges and Universities

ACE Advantage PRIVACY & NETWORK SECURITY

MISCELLANEOUS PROFESSIONAL LIABILITY / GENERAL LIABILITY APPLICATION

Professional Liability Errors and Omissions Insurance Application

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Small Business IT Risk Assessment

Managing data security and privacy risk of third-party vendors

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

PROPOSAL FORM FOR DIRECTORS AND OFFICERS LIABILITY INSURANCE

Managing Cyber & Privacy Risks

plantemoran.com What School Personnel Administrators Need to know

All Products Application

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

The Impact of HIPAA and HITECH

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

HIPAA Privacy and Information Security Management Briefing

Internet & Cell Phone Usage Policy

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Case 2:15-cv DDP-AGR Document 1 Filed 05/07/15 Page 1 of 15 Page ID #:1 UNITED STATES DISTRICT COURT FOR THE CENTRAL DISTRICT OF CALIFORNIA

Altius IT Policy Collection Compliance and Standards Matrix

PII = Personally Identifiable Information

Dragonshield Proposal Form Broad Form Management Liability Insurance

Understanding the Business Risk

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

CPM. Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

Sustainable Compliance: A System for Ongoing Audit Readiness

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

CSR Breach Reporting Service Frequently Asked Questions

Data Breach and Senior Living Communities May 29, 2015

How To Deal With Cloud Computing

INFORMATION SECURITY FOR YOUR AGENCY

Transcription:

Cyber, Security and Privacy Questionnaire www.fbinsure.com

Please note: This is an electronic application. When completed please save and email to: Ed McGuire emcguire@fbinsure.com Cyber, Security & Privacy Questionnaire General Information Entity Name: Address: Contact Person: Website Address: Total # of Employees: Date Company Established: Business Type: Individual Partnership LLC Corporation Is the Company Owned, Controlled or Affiliated with another Company? Description of Operations: Rating Information Annual Revenues: Last Year: Next 12 Months: Does the application collect, receive process, transmit, store or maintain any of the following confidential information: Personally Identifiable Information (PII) or Protected Health Information (PHI) Credit/Debit Card Data Social Security Numbers Bank Account Info Driver s License Numbers Medical Records Employee/HR Info Customer Info Corporate Confidential Info? Intellectual Property of Others Other Info Please provide an estimate of the following stored records: Electronic Records containing PII or PHI: Paper or Other Records containing PII or PHI:

Risk Management Policies & Procedures Does the applicant employ a Chief Information Officer (CIO)? Does the applicant employ a Chief Security Officers/IT Security Person?. Do you have any of the following written Policies/Procedures? Privacy Policy? (If so, please attach a copy) Network Security Policy? (If so, please attach a copy). Identity Theft Prevention Program?. Breach Incident Response Plan?. Business Continuity/Disaster Recovery Plan?. Laptop/Computer use Policy?. Employee Training regarding Confidential Information?. Network Security & Data Management Do you use Firewall Protection?. Do you use Anti Virus Protection? Use Intrusion Detection Software? Perform System/Info. Backup tapes? Username/Password Management?. Wireless Access Points Secured? Encrypt Sensitive Data in transit? Encrypt Data at Rest on Servers? Pre Test Software Patches? 3 rd Party Network Intrusion Tests? 3 rd Party Privacy Compliance Audits? Does the Applicant encrypt confidential information stored on Portable Devices, such as, laptops, flash drives, back up tapes, smart phones, tablets, etc.? Does the Applicant store any confidential information in The Cloud?. Does the Applicant use any 3 rd party or outsourced vendors to service or store their customer and/or employee data? Regulatory & Compliance Management Do you have procedures in place to comply with the following laws governing confidential information? HIPAA? HITECH Act?. State Notification Laws? State/Federal Privacy Laws?.

Graham Leach Bliley Act? Sarbanes Oxley?. FACTA/Red Flags Rules? Payment Card Industry (PCI)?. Website Media Exposure Do you have a procedure to monitor material displayed on your website for copyright, trademark, libel, slander or Invasion of privacy?. Do you have a procedure to remove or deleted offensive/controversial material?. Do you publish a bulletin board, chat room, or social networking on your site?. Past Circumstances/Claims/Breaches Have you ever had a regulatory proceeding or investigation? (if Yes, give details?. During the past 5 years have you had any privacy breach incident or complaint?. During the past 5 years have you had any complaints or litigation pertaining a Network Security or Privacy Breach?. Is the Applicant or any Director, Officer or Employee aware of any circumstance that could give rise to a claim under the proposed coverage?.. Prior Coverage Do you currently carry insurance coverage for Network Security, Privacy or Cyber? If so, please provide the following information: Insurer Name Effective Date Limits Deductible Retro Date Premium In the last 3 years, have you had any similar insurance declined, canceled or non renewed?.

Representations The Applicant declares that the above statements and representations are true and correct, and that no facts have been suppressed or misstated. The Applicant understands that any untrue or incorrect statements contained within this application may result in no coverage being available as the result of a loss or the cancellation of coverage back to its inception. All written statements and materials furnished to the Company, in conjunction with this application will be incorporated by reference into this application and made part hereof. This application does not bind the Applicant to buy, or the Company to issue the insurance, but it is agreed that this form shall be the basis of the contract should a policy be issued, and it will be attached to and made part of the policy. The undersigned Applicant declare that if the information supplied on this application changes between the dates of this application and the time when the policy is issued, the Applicant will immediately notify the company of such changes, and the Company may withdraw or modify any outstanding quotations and/or authorization or agreement to bind the insurance. Signature of Producing Agent: Date: Signature of Insured: Date: