Zurich Security And Privacy Protection Policy Application



Similar documents
Enterprise PrivaProtector 9.0

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

6. Does Applicant encrypt all sensitive and Personally Identifiable Information? Yes No If yes, give details:

ACE Advantage PRIVACY & NETWORK SECURITY

What would you do if your agency had a data breach?

TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application

Lenders Property Reporting Policy

AIG CORPORATE IDENTITY PROTECTION

ACE DigiTech SM Digital Technology & Professional Liability Small Business Application

BY COMPLETING THIS APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH THE INSURANCE COMPANY INDICATED ABOVE (THE INSURER ).

Travelers Casualty and Surety Company of America Hartford, Connecticut APPLICATION

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION

Travel Agents & Tour Operators Professional Liability Insurance Application

MULTIMEDIA SM LIABILITY Application for Advertising Agencies

MISCELLANEOUS PROFESSIONAL LIABILITY APPLICATION

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION

BY COMPLETING THIS APPLICATION YOU ARE APPLYING FOR COVERAGE WITH EXECUTIVE RISK SPECIALTY INSURANCE COMPANY (THE UNDERWRITER )

FARM EQUIPMENT MANUFACTURERS ASSOCIATION - FEMA APPLICATION FOR PRODUCT LIABILITY INSURANCE

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

Professional Risk Facilities,

DIRECTORS AND OFFICERS LIABILITY-NOT FOR PROFIT ORGANIZATION APPLICATION

Homeland Insurance Company of New York Homeland Insurance Company of Delaware (Stock companies owned by the OneBeacon Insurance Group)

SAFETY NET SHORT FORM INTERNET LIABILITY INSURANCE APPLICATION

NON PROFIT MANAGEMENT LIABILITY APPLICATION

APPLICATION FOR EMPLOYEE BENEFIT PLAN FIDUCIARY INSURANCE

MISCELLANEOUS PROFESSIONAL LIABILITY AND PREMISES LIABILITY INSURANCE APPLICATION

APPLICATION FOR THE HARTFORD NON-PROFIT CHOICE SM ALL COVERAGE PARTS

BEAZLEY BREACH RESPONSE INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES SHORT FORM APPLICATION

THE HARTFORD PROFESSIONAL CHOICE LIABILITY POLICY INSURANCE APPLICATION

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION

All Products Application

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION

COURT REPORTERS ERRORS AND OMISSIONS INSURANCE APPLICATION CLAIMS MADE POLICY

INVESTMENT COMPANY BOND APPLICATION

IRONSHORE INSURANCE COMPANIES One State Street Plaza, 7 th Floor New York, New York Tel: Toll Free: 877-IRON411

MOTOR CARRIER APPLICATION FOR TRUCKERS INSURANCE FOR NON-TRUCKING LIABILITY AND VEHICLE PHYSICAL DAMAGE COVERAGE

MOTOR CARRIER QUESTIONNAIRE FOR TRUCKERS INSURANCE FOR NON-TRUCKING LIABILITY AND VEHICLE PHYSICAL DAMAGE COVERAGE

Miscellaneous Professional Liability Application

ANALYTICAL TESTING LABORATORY ERRORS AND OMISSIONS INSURANCE APPLICATION CLAIMS MADE POLICY

ACE Privacy Protection Privacy & Network Liability Insurance Program Small Business Application

Title Agents Professional Liability Application

APPLICATION FOR A FINANCIAL INSTITUTION BOND, STANDARD FORM NO. 25 FOR INSURANCE COMPANIES

Personal Lines Insurance Agents Professional Liability

UNDERWRITTEN IN FEDERAL INSURANCE COMPANY OR VIGILANT INSURANCE COMPANY A. GENERAL INFORMATION

BY COMPLETING THIS NEW BUSINESS APPLICATION YOU ARE APPLYING FOR COVERAGE WITH FEDERAL INSURANCE COMPANY OR VIGILANT INSURANCE COMPANY (THE COMPANY )

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY APPLICATION

NON OWNED & HIRED AUTO

New Business Application. Real Estate Professional Liability (E&O) Insurance

Specified Professions Professional Liability Product

MISCELLANEOUS PROFESSIONAL LIABILITY INSURANCE

ERRORS & OMISSIONS INSURANCE APPLICATION

CONSULTANTS ERRORS AND OMISSIONS INSURANCE APPLICATION CLAIMS MADE POLICY

ERRORS & OMISSIONS INSURANCE APPLICATION

Personal Lines Insurance Agents Professional Liability

GENERAL LIABILITY SUPPLEMENTAL APPLICATION

APPLICATION FOR EMPLOYED LAWYERS PROFESSIONAL LIABILITY INSURANCE

JEWELRY APPRAISERS ERRORS AND OMISSIONS INSURANCE APPLICATION CLAIMS MADE POLICY

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY

EMPLOYMENT PRACTICES LIABILITY INSURANCE MAINFORM APPLICATION

Hudson Insurance Company 100 William Street, New York, NY 10038

Property/Casualty Insurance Renewal Survey Multi-State

APPLICATION FOR INSURANCE AGENTS AND BROKERS ERRORS & OMISSIONS LIABILITY INSURANCE

REAL ESTATE RELATED ERRORS & OMISSIONS APPLICATION

TORUS NATIONAL INSURANCE COMPANY Harborside Financial Center Plaza 5, Suite 2900 Jersey City, New Jersey

Specified Professions Professional Liability Product

PRODUCT MANUFACTURER S PROFESSIONAL LIABILITY, INCLUDING COMPUTER NETWORK SECURITY, PRIVACY, MULTIMEDIA AND ADVERTISING LIABILITY APPLICATION

APPLICATION FOR DIRECTORS AND OFFICERS LIABILITY INSURANCE POLICY INCLUDING EMPLOYMENT PRACTICES LIABILITY COVERAGE

MPL SECURE: MISCELLANEOUS PROFESSIONAL AND NETWORK SECURITY LIABILITY INSURANCE POLICY

EMPLOYMENT PRACTICES LIABILITY INSURANCE RENEWAL APPLICATION

Miscellaneous Professional Liability Application

Berkley Insurance Company

Artisan Contractors Application

Eidyia Insurance Services

Transcription:

Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE AGAINST THE INSURED AND REPORTED TO THE INSURER DURING THE POLICY PERIOD OR EXTENDED REPORTING PERIOD (IF APPLICABLE) ARE COVERED SUBJECT TO THE POLICY PROVISIONS. THE LIMITS OF LIABILITY STATED IN THE POLICY ARE REDUCED, AND MAY BE EXHAUSTED, BY DEFENSE EXPENSES. DEFENSE EXPENSES ARE ALSO APPLIED AGAINST THE RETENTION, IF ANY. PLEASE READ THE POLICY CAREFULLY AND DISCUSS ANY QUESTIONS YOU MAY HAVE WITH YOUR INSURANCE AGENT OR BROKER. I. DIRECTIONS Please submit the following information with this application: 1. Copy of most recent financial statements (10-K, annual report) 2. Five (5) years of loss runs valued within the past six (6) months 3. List of all litigation threatened or pending which could potentially affect the coverage for which you are applying 4. Copy of the privacy policies currently in use throughout the applicant's organization 5. Executive Summary of most recent Network Security Audit or PCI DSS Audit (if applicable) II. NOTICE OF DISCLOSURE FOR AGENT & BROKER COMPENSATION If you want to learn more about the compensation Zurich pays agents and brokers visit: http://www.zurichnaproducercompensation.com or call the following toll-free number: (866) 903-1192. This tice is provided on behalf of Zurich American Insurance Company and its underwriting subsidiaries. Page 1 of 9

III. GENERAL INFORMATION Applicant & Subsidiaries Applicant Name: Mailing Address: Ownership: Public Private Year Established:. of Employees: Website: Risk Manager: Email Address: Name of all subsidiaries or affiliates (please insert attachment if too numerous): Is applicant controlled, owned, affiliated or associated with any other firm, corporation or company? If so, please describe: During the past five (5) years: Has the name of the applicant been changed? Has any other business been acquired, merged or consolidated with the applicant? If so, please describe: Requested Coverage Requested Coverage(s): A. Security and Privacy Liability Coverage Regulatory Proceeding Defense Coverage Requested Limits of Liability: Requested Retentions/ Waiting Period: each Claim each Regulatory Proceeding B. Privacy Breach Costs Coverage each Privacy Event C. Business Income Loss and Dependent Business Income Coverage The greater of or hours (the Waiting Hours Retention) each Security Event D. Digital Asset Replacement Expenses Coverage each Security Event E. Cyber Extortion Threat and Reward Payments Coverage Reward Payments Coverage each Cyber Extortion Threat (excluding reward payments) NIL F. Internet Media Liability Coverage each Claim Page 2 of 9

Requested Retroactive Dates: Security and Privacy Liability Coverage: IV. APPLICANT PROFILE Revenue Internet Media Liability Coverage: Year US International Total Projected Current V. BUSINESS ACTIVITIES 1. Does the applicant allow online purchases, bill payment, banking or trading? If yes, what portion of the applicant's revenue is received through the online distribution channel? ne 0-2% 3-10% 11-25% 26-100% 2. What types of personal information does the applicant collect, process, and store (please check all that apply)? Business and Customer Information Healthcare Information Social Security Numbers Credit Card Information Financial Account Information Intellectual Property/Trade Secrets 3. Does the applicant transfer sensitive information with personal identifiers across international borders? 4. Does the applicant outsource any of its primary business functions to a third party? If so, please indicate: Human Resources Customer Service Marketing Business Development Information Technology Internal Audit Other 5. Does the applicant share personal information with business partners, vendors, or other third parties to provide products or services? VI. ORGANIZATION & GOVERNANCE 1. Does a senior executive have formal, enterprise-wide responsibility for records and information management? If so, please indicate the job title of the executive: Chief Privacy Officer Chief Information Security Officer Other Title: Page 3 of 9

2. Are security risk assessments conducted on at least an annual basis to validate that organizational security policies are being followed? 3. Are privacy risk assessments conducted on at least an annual basis to validate that organizational privacy policies are being followed? 4. Are the results of risk assessments shared with executive management and key issues and exposures formally tracked until remediated and resolved? 5. Has the applicant identified all relevant legal, regulatory and industry supported compliance frameworks that are applicable to the applicant's organization and do the applicant's policies reflect these requirements? 6. Does the applicant have a formal policy covering records and information management in place? 7. Has the applicant formally documented and operationalized the following policies (please check all that apply)? Access Control Alerting Asset Management Data Classification Data Disposal Human Resources Security Logging Media Handling Monitoring Network Security Physical Security Privacy Security Vendor Management Vulnerability Management 8. Is a list maintained of all vendors with whom personal information is shared or to whom network access is provided? 9. Do all vendor contracts convey security and privacy obligations and expectations, including the maintenance of professional liability and network risk coverage? 10. In all cases, does the applicant's hiring process include the following investigations: criminal convictions, educational background, credit check, drug testing, and work history? If hiring procedures are only required in some cases, please describe when such procedures are required: 11. Is the applicant subject to the Payment Card Industry Data Security Standard (PCI DSS v1.2)? If "", please indicate merchant level: 12. Has the applicant achieved PCI compliance? If "", please provide the date of the latest certification: 1 2 3 4 Page 4 of 9

13. What percentage of the applicant's most recent PCI audit was identified as adequate or in place? % 14. For those standards that were identified as inadequate or not in place, how many have been successfully implemented since the last audit? VII. NETWORK SECURITY 1. Are systems, applications and supporting infrastructure that collect, process, or store personal information segregated from the rest of the network? 2. Is firewall technology used at all internet points of presence and do formal firewall configuration standards exist? 3. Are firewalls installed between all wireless networks and system components that process or store personal information? 4. Are wireless transmissions protected using WPA/WPA2, IPSEC, or SSL? 5. Are intrusion detection and prevention systems (network and host based) utilized and are the signatures and anomalies updated on a frequent basis? 6. Does a formal change management process exist that takes into account security and privacy risks for things such as application deployments (code and content) and system or infrastructure changes (e.g. patch installation, firewall rule-set changes)? 7. Are internal and external vulnerability scans and penetration tests (network and application layer) conducted on a periodic basis and the vulnerabilities identified, tracked and remediated? 8. Do all users of systems, applications and supporting infrastructure that collect, process, or store personal information have a unique ID? 9. Is 2-factor authentication utilized for all remote access (e.g. VPN) to the internal network? 10. Do password policies and procedures exist that outline strong password requirements (e.g. change of passwords on a periodic basis, use of numeric and alphabetic characters, prohibition of previously used passwords)? 11. Is user access to systems, applications and supporting infrastructure that collect, process, or store personal information removed in a timely manner upon employee termination, job change, or cancellation of a third party vendor agreement? 12. Do removable media handling procedures exist for the internal or external distribution of media that contain personal information? VIII. DATA MANAGEMENT 1. Does an inventory exist of all systems, applications and supporting infrastructure (e.g. servers, databases) that collect, process, or store personal information? 2. Do security configuration standards and procedures exist for new system components (e.g. operating systems, software applications, network devices)? 3. Do procedures exist to monitor for new vulnerabilities within system components and apply the latest security patches within one month? 4. Does the applicant utilize anti-virus software on all systems commonly affected by viruses, particularly personal computers and servers? 5. Does the applicant's anti-virus programs detect, remove, and protect against other forms of malicious software, including spyware and adware? 6. Do procedures exist to operationalize the proper disposal of personal information and data and have they been implemented in compliance with the organization's confidential data disposal policy? Page 5 of 9

7. Is commercial grade technology employed to encrypt all sensitive business and consumer information: Transmitted within the applicant's organization or to other public networks? At rest in relational databases and other network locations? Maintained on employee laptops and other mobile equipment? Physically transmitted by hard drive, tape or other media within the applicant's organization or to third parties, including data storage management companies? IX. INCIDENT RESPONSE 1. Are system and security logs in place on all systems that collect, process, or store personal information? 2. Are automated tools in place that aggregate and correlate log information and send out alerts based upon identified thresholds? 3. Has a formal data breach plan been prepared and implemented? If so, does this plan include (please check all that apply): formal assignment of responsibility for the applicant organization's response? identification of an external forensic investigation resource? a communications plan for customers or other affected individuals? a preferred credit monitoring services vendor, with pre-negotiated rates? X. BUSINESS CONTINUITY PLANNING 1. Does a business continuity and disaster recovery plan exist? 2. Are the business continuity and disaster recovery plans tested at least annually and updated accordingly? 3. Are system backup and recovery procedures documented and tested for all missioncritical systems? 4. Are the applicant's systems backed up on a daily or more regular basis? XI. INCIDENT HISTORY 1. In the past three years, has the applicant sustained any significant systems intrusion, data theft or other loss of data? *If so, please attach a detailed description of the circumstance(s). 2. In the past three years, has the applicant been notified by any third party that Personally Identifiable Information has been compromised from the applicant's systems? *If so, please attach a detailed description of the circumstance(s). 3. In the past three years, has the applicant notified customers that their Personally Identifiable Information was compromised from the applicant's systems? *If so, please attach a detailed description of the circumstance(s). 4. Has the applicant ever been the subject of an investigation by a regulatory or other government agency arising out of a privacy issue? *If so, please attach a detailed description of the circumstance(s). XII.INTERNET MEDIA (please complete only if Internet Media Liability coverage is being requested) 1. Are policies or procedures in place to screen internet content for potential infringement of third party intellectual property rights? 2. Are policies or procedures in place to screen internet content for elements that may lead to personal injury torts including but not limited to libel, slander, and defamation? Page 6 of 9

3. Does the applicant require contractors, vendors or others who provide the organization with copyrightable material to perform any of the following (check all that apply): Legally assign or license their rights to any copyrightable material Warrant that their work does not violate another party's IP rights Indemnify the applicant for IP infringement claims Hold the applicant harmless for IP infringement claims 4. Does the applicant's web site(s) allow third party networking capabilities including but not limited to social networking or blogs? 5. Does the applicant maintain coverage through the advertising injury or personal injury coverage part of the applicant's Commercial General Liability policy? 6. In the past three years, has the applicant received notice of the applicant's infringement on any third party intellectual property rights? *If so, please provide an attachment with a description of such infringement. XIII.APPLICANT HISTORY Prior Coverage Please list any similar insurance carried during the past three (3) years. If none, check here: NA Policy Period Carrier Limit of Liability Deductible Premium Retroactive Date Claims History 1. In the past three years, has the applicant been declined any similar security and privacy insurance, or has the applicant's insurer cancelled any previous security and privacy insurance? *If so, please attach a detailed description of the circumstances. 2. Have any claims been made against the applicant or any of its former or current directors, officers, employees, subsidiaries or independent contractors with regard to the coverage sought in the past three years? *If so, please attach a detailed description of the claim(s). 3. Is the applicant or any of its former or current directors, officers, employees, subsidiaries or independent contractors aware of any acts, errors, omissions or other circumstances, which may reasonably result in a claim relative to the insurance sought? *If so, please attach a detailed description. Page 7 of 9

XIV.FRAUD NOTICES Prior to signing this application, review the following statutory fraud notices as they may apply to the applicant's place of domicile: ANY PERSON WHO KNOWINGLY AND WITH INTENT TO DEFRAUD ANY INSURANCE COMPANY OR ANOTHER PERSON FILES AN APPLICATION FOR INSURANCE OR STATEMENT OF CLAIM CONTAINING ANY MATERIALLY FALSE INFORMATION, OR CONCEALS FOR THE PURPOSE OF MISLEADING INFORMATION CONCERNING ANY FACT MATERIAL THERETO, COMMITS A FRAUDULENT INSURANCE ACT, WHICH IS A CRIME AND SUBJECTS THE PERSON TO CRIMINAL AND [NY: SUBSTANTIAL] CIVIL PENALTIES. (NOT APPLICABLE IN CO, DC, FL, HI, MA, NE, OH, OK, OR, VT OR WA; IN LA, ME, TN, AND VA, INSURANCE BENEFITS MAY ALSO BE DENIED) APPLICABLE IN COLORADO - IT IS UNLAWFUL TO KNOWINGLY PROVIDE FALSE, INCOMPLETE, OR MISLEADING FACTS OR INFORMATION TO AN INSURANCE COMPANY FOR THE PURPOSE OF DEFRAUDING OR ATTEMPTING TO DEFRAUD THE COMPANY. PENALTIES MAY INCLUDE IMPRISONMENT, FINES, DENIAL OF INSURANCE, AND CIVIL DAMAGES. ANY INSURANCE COMPANY OR AGENT OF AN INSURANCE COMPANY WHO KNOWINGLY PROVIDES FALSE, INCOMPLETE, OR MISLEADING FACTS OR INFORMATION TO A POLICY HOLDER OR CLAIMANT FOR THE PURPOSE OF DEFRAUDING OR ATTEMPTING TO DEFRAUD THE POLICY HOLDER OR CLAIMANT WITH REGARD TO A SETTLEMENT OF AWARD PAYABLE FROM INSURANCE PROCEEDS SHALL BE REPORTED TO THE COLORADO DIVISION OF INSURANCE WITHIN THE DEPARTMENT OF REGULATORY AGENCIES. APPLICABLE IN DISTRICT OF COLUMBIA - WARNING: IT IS A CRIME TO PROVIDE FALSE OR MISLEADING INFORMATION TO AN INSURER FOR THE PURPOSE OF DEFRAUDING THE INSURER OR ANY OTHER PERSON. PENALTIES INCLUDE IMPRISONMENT AND/OR FINES. IN ADDITION, AN INSURER MAY DENY INSURANCE BENEFITS, IF FALSE INFORMATION MATERIALLY RELATED TO A CLAIM WAS PROVIDED BY THE APPLICANT. APPLICABLE IN FLORIDA - ANY PERSON WHO KNOWINGLY AND WITH INTENT TO INJURE, DEFRAUD, OR DECEIVE ANY INSURER FILES A STATEMENT OF CLAIM OR AN APPLICATION CONTAINING ANY FALSE, INCOMPLETE, OR MISLEADING INFORMATION IS GUILTY OF A FELONY OF THE THIRD DEGREE. APPLICABLE IN HAWAII - FOR YOUR PROTECTION, HAWAII LAW REQUIRES YOU TO BE INFORMED THAT PRESENTING A FRAUDULENT CLAIM FOR PAYMENT OF A LOSS OR BENEFIT IS A CRIME PUNISHABLE BY FINES OR IMPRISONMENT, OR BOTH. APPLICABLE IN MASSACHUSETTS, NEBRASKA, OREGON AND VERMONT - ANY PERSON WHO KNOWINGLY AND WITH INTENT TO DEFRAUD ANY INSURANCE COMPANY OR ANOTHER PERSON FILES AN APPLICATION FOR INSURANCE OR STATEMENT OF CLAIM CONTAINING ANY MATERIALLY FALSE INFORMATION, OR CONCEALS FOR THE PURPOSE OF MISLEADING INFORMATION CONCERNING ANY FACT MATERIAL THERETO, COMMITS A FRAUDULENT INSURANCE ACT, WHICH IS A CRIME AND MAY SUBJECT THE PERSON TO CRIMINAL AND CIVIL PENALTIES. APPLICABLE IN OHIO - ANY PERSON WHO, WITH INTENT TO DEFRAUD OR KNOWING THAT HE/SHE IS FACILITATING A FRAUD AGAINST AN INSURER, SUBMITS AN APPLICATION OR FILES A CLAIM CONTAINING A FALSE OR DECEPTION STATEMENT IS GUILTY OF INSURANCE FRAUD. APPLICABLE IN OKLAHOMA - WARNING: ANY PERSON WHO KNOWINGLY, AND WITH INTENT TO INJURE, DEFRAUD OR DECEIVE ANY INSURER, MAKES ANY CLAIM FOR THE PROCEEDS OF AN INSURANCE POLICY CONTAINING ANY FALSE, INCOMPLETE OR MISLEADING INFORMATION IS GUILTY OF A FELONY. APPLICABLE IN OREGON - ANY PERSON WHO KNOWINGLY AND WITH INTENT TO DEFRAUD ANY INSURANCE COMPANY OR ANOTHER PERSON FILES AN APPLICATION FOR INSURANCE OR STATEMENT OF CLAIM CONTAINING ANY MATERIALLY FALSE INFORMATION, OR CONCEALS FOR THE PURPOSE OF MISLEADING INFORMATION CONCERNING ANY FACT MATERIAL THERETO, COMMITS A FRAUDULENT INSURANCE ACT, WHICH MAY BE A CRIME AND MAY SUBJECT THE PERSON TO CRIMINAL AND CIVIL PENALTIES. APPLICABLE IN WASHINGTON - IT IS A CRIME TO KNOWINGLY PROVIDE FALSE, INCOMPLETE, OR MISLEADING INFORMATION TO AN INSURANCE COMPANY FOR THE PURPOSE OF DEFRAUDING THE COMPANY. PENALTIES INCLUDE IMPRISONMENT, FINES, AND DENIAL OF INSURANCE BENEFITS. Page 8 of 9

XV.SIGNATURES The undersigned represents that every effort has been made to facilitate the proper completion of this application. The discovery of any fraud, intentional concealment, or misrepresentation of any material fact will render this Policy, if issued, void at inception. Receipt and review of this application does not bind the Insurer to provide this insurance. It is agreed by the undersigned and the Insurer that the particulars and statements made in this application, together with all attachments to this application and any other materials submitted to the Insurer (all of which attachments and materials shall be deemed attached to the policy as if physically attached thereto) shall be the representations of the applicant and the prospective Insureds. It is further agreed by the undersigned and the prospective Insureds that this policy, if issued, is issued in reliance upon the truth of such representations that are incorporated into and made part of this policy. After inquiry of all prospective Insureds, the undersigned authorized officer of the applicant represents that the statements set forth in this application and its attachments and other materials submitted to the Insurer are true and correct and that no material or relevant facts have been suppressed or misstated. Signing of this application does not bind the applicant or the Insurer. The undersigned further declares that any event taking place between the date this application was signed and the effective date of the insurance applied for which may render inaccurate, untrue, or incomplete any information in this application, will immediately be reported in writing to the Insurer and the Insurer may withdraw or modify any outstanding quotations and /or authorization or agreement to bind the insurance. Applicant Applicant Name and Title: Applicant Signature: Date: Agent/Broker Agent/Broker: Address: Date: License Number: Page 9 of 9