Cyber Liability Insurance Data Security, Privacy and Multimedia Protection



Similar documents
Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

Cyber and Data Security. Proposal form

Cyber Extension Proposal Form

1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established

CyberEdge Insurance Proposal Form

CYBER RISK SECURITY, NETWORK & PRIVACY

How To Cover A Data Breach In The European Market

Cyber/ Network Security. FINEX Global

DIRECTORS AND OFFICERS LIABILITY INSURANCE PROPOSAL FORM

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Design & Construct Professional Indemnity Insurance Proposal Form

Mitigating and managing cyber risk: ten issues to consider

MARINE SURVEYORS PROPOSAL FORM PROFESSIONAL INDEMNITY INSURANCE

NZI LIABILITY CYBER. Are you protected?

DESIGN AND CONSTRUCT PROPOSAL FORM PROFESSIONAL INDEMNITY INSURANCE

Enterprise PrivaProtector 9.0

Privacy and Data Breach Protection Modular application form

Trinity Online Application - Terms and Conditions of Use

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE

CYBER/ NETWORK SECURITY

DICKSON MANCHESTER. Charity and Association Liability Proposal Form. Proposal form for Insurance effected through Dickson Manchester & Co Ltd

Marketing & Communications Proposal Form

UK Directors & Officers Liability Insurance Proposal Form (for companies whose turnover exceeds 50 million per annum)

Information Technology. Professional Indemnity. Proposal Form

Intellectual Property Litigation Insurance Proposal Form

Service Schedule for BT Business Lite Web Hosting and Business Lite powered by Microsoft Office 365

What would you do if your agency had a data breach?

Professional Liability Errors and Omissions Insurance Application

MEDIATECH APPLICATION

Electronic business conditions of use

CPM. Application Form INSURANCE FOR CYBER, PRIVACY & MEDIA RISKS

Network Security & Privacy Landscape

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

TERMS & CONDITIONS of SERVICE for MSKnote. Refers to MSKnote Limited. Refers to you or your organisation

Cyber, Security and Privacy Questionnaire

Professional Indemnity Insurance for Security Companies Proposal Form

Kinetic Internet Limited

MISCELLANEOUS ERRORS & OMISSIONS MEDIATECH INSURANCE APPLICATION

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

CONSULTING ENGINEERS PROPOSAL FORM PROFESSIONAL INDEMNITY INSURANCE

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Management Consultants. Professional Indemnity. Proposal Form

Technology, Privacy and Cyber Protection Modular application form

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Service Schedule for CLOUD SERVICES

LAUW Cyber erisks. SME Questionnaire.

ACE DigiTech SM Digital Technology & Professional Liability Small Business Application

SECTION 1 ABOUT THE PROPOSER (Please write in block capitals or cross the appropriate boxes as required)

(Accountants) Proposal Form

Website Hosting Agreement

Professional Indemnity Proposal Form. for. Information Technology Consultants

Firm Registration Form

Zurich Security And Privacy Protection Policy Application

Marketform Miscellaneous Professional Indemnity Proposal Form

PROFESSIONAL INDEMNITY INSURANCE PROPOSAL FORM FOR INSURANCE INTERMEDIARIES

OXFORD UNIVERSITY PRESS ONLINE JOURNALS: INSTITUTIONAL ONLINE AGREEMENT

Understanding the Business Risk

All Products Application

Professional Indemnity Proposal Form. for. Accountants. Address: 5/3352 Pacific Highway Postal: PO Box 976. Springwood QLD 4127 Springwood QLD 4127

Service Schedule for Business Lite powered by Microsoft Office 365

Professional Indemnity Proposal Form Business & Management Consultants

How To Make A Contract Between A Client And A Hoster

Professional Indemnity Proposal Form. for. Finance & Mortgage Brokers

A L L B R I G H T B I S H O P R O W L E Y L I M I T E D T E R M S OF B U S I N E S S

Commercial Online Banking

Professional Trainers, Licensing Assessment and Consultancy Services Professional Indemnity and Public Liability Insurance Proposal Form

Transcription:

Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT systems. Therefore any organisation or sole proprietor is at risk through their use of online networks and systems including exposure to hardware and software. The average cost of an information security incident for small business is currently 60,000 with a reported 27 billion of cyber crime to the UK compared to 6.6 billion from fire risks. Source: Study conducted by the Ponemon Institute 2013 The following will provide evidence how we can all be affected and what impact this can have on daily life. The Marketing Consultant Whilst constructing and developing a client s website they used several logos and images similar to those which had been copyrighted by another entity. Legal proceedings commenced with the claimant demanding damages in excess of 1m. Breach of Copyright cover is available under the Multimedia Insuring Clause. Legal Profession Breach of Contract proceedings commenced in 2007. In April 2009 a hacker obtained sensitive information from the defendants solicitors data files along with the added threat of Denial of Service and offered this to the claimant ultimately this offer was refused. Local Haulage Company The company s IT manager discovered that files had been uploaded onto the company s servers by unidentified third party from a phishing e-mail which ultimately corrupted their data. As a result a breach of services/forensic consultants was required to restore the data contained in the damaged files costing 30,000 and an additional 5,000 for employee time which was covered. High Street Accountant The accountant discovered that an unauthorised third party had gained access to their servers which contained financial records including high profile celebrities. A message was then posted stating the information had been encrypted and a threat this would be published in the public domain. Contact was made with the authorities who ascertained making payment would outweigh encrypting the information. Management Consultant Theft of a senior partners lap top containing sensitive personal data whilst parked at junction. Access was protected by a password but the information not encrypted. Although the details never appeared in the public domain the company notified their clients costing 50,000.

Page 2 of 5 Do you require a Data Security, Privacy and Multimedia Protection Policy? Potential Risk Do you provide a website? Do you hold HR/ payroll data on your network? Do you hold third party data? Do you store sensitive data that is accessible via your web server? Do you allow third party access to your network? Do you allow staff to use the internet or e-mail? Do you transact or communicate any business via a website or e-mail? Do you hold any customers card or personal details on your network? What cover do you need? Potential Exposure Breach of intellectual property rights Misleading advertising Unauthorised access Breach of employees privacy rights Failure to handle, manage, store or destroy data correctly Breach of intellectual property rights Failure to handle, manage, store or destroy data correctly Breach of intellectual property rights or confidentially Potential for that data to be threatened by a hacker - extortion Damage to your computer system due to virus or hacking attack. Consequences to your business due to down time, business interruption exposure Potential for that access to be threatened by a hacker - extortion Damage to your systems due to virus or hacking Damage to third party systems by forwarding a virus Employees hacking your network Damage to your systems due to a virus or hacking attack Lost revenue or assets due to a virus or hacking attack Is cover in place? Data security, privacy and multimedia Data security, privacy and multimedia cover and costs expenses Data breach costs cover Information and communication asset rectification costs cover Data recovery and loss of business income cover Potential for that data to be threatened by a hacker - extortion Data extortion cover

Cyber Liability Insurance Proposal Form Page 3 of 5 Sectors applicable Retail, Telecoms Professional, Media Professional, Financial Institution, E-Commerce, Insurance Broker/Company, Hotels, Staffing/Recruitment Limit of Indemnity in the aggregate costs inclusive 50,000 100,000 250,000 500,000 1,000,000 Deductible Revenue Up to 100,000 175 193 231 308 385 1K*/24hr** 100,101 250,000 245 263 315 420 525 1K/24hr 250,001 500,000 350 376 452 602 752 1K/24hr 500,001 1,000,000 525 569 683 910 1,137 2K/24hr 1,000,001 1,500,000 683 744 893 1,190 1,487 2K/24hr 1,500,001 2,000,000 893 963 1,155 1,540 1,925 2K/24hr 2,000,001 2,500,000 1,050 1,138 1,365 1,820 2,275 5K/24hr 2,500,001 3,000,000 1,208 1,313 1,575 2,100 2,625 5K/24hr 3,000,001 4,000,000 1,575 1,706 2,048 2,730 3,412 5K/24hr 4,000,001 5,000,000 1,873 2,056 2,468 3,290 4,112 5K/24hr 5,000,001 7,500,000 2,625 2,800 3,360 4,480 5,600 10K/24hr 7,500,001 10,000,000 3,325 3,588 4,305 5,740 7,175 10K/24hr 10,000,001 12,500,000 4,025 4,375 5,250 7,000 8,750 15K/24hr 12,500,001 15,000,000 4,550 4,900 5,880 7,840 9,800 15K/24hr Insurance Premium Tax, where applicable, to be added to the premiums shown above. *Excess each and every claim. ** The number of hours that must elapse before the recovery of loss of income can be considered. Step 1: Complete binding information table Inception date Limit of Indemnity Premium Broker contact details

Page 4 of 5 Step 2: Please complete the details below regarding the Insured/Proposer Name of Insured/Proposer Full address of Insured/Proposer Company Number Annual turnover/income (for most recent 12 months, or as projected for new businesses) Step 3: Please confirm that the Insured/Proposer and its subsidiaries: 1 Is all personally identifiable and confidential information that is removed from the Insured s premises in any electronic format encrypted? Yes No If not, then Unencrypted Portable Media Device Exclusion to apply. 2 Does the Insured regularly update (at least monthly) antivirus software and firewalls in place within their networks? Yes No If not, then the proposed insurance will be declined. 3 Does the Insured have a Business Continuity Plan in place that is tested annually, and can the Insured confirm that their systems can be back up and running within 12 hours of a breach? Yes No If not, the BI section is deleted. 4 Is the Insured PCI (Payment Card Industry) compliant? Yes No N/A 5 Has the Insured recently carried out an IT security audit and effected all recommendations and requirements from this? Yes No If the Insured has answered Yes, please provide a copy of the audit. 6 Does the Insured use a third party to host their data? Yes No If Yes, please advise their name and the city/country they are based. 7 In the past 5 years has the Insured ever had a security or privacy issue that is reasonably likely to have given rise to a loss or claim under this proposed insurance policy had it been in force? Yes No If Yes, please refer to Underwriters providing full details of the loss or claim.

Page 5 of 5 Please read the following carefully before signing and dating the Declaration It is essential that every Insured or Proposer when seeking a quotation to take out or renew any insurance discloses to Insurers all material facts and information (including all material circumstances) which might influence the judgement of an Insurer in assessing whether or not to accept the risk and on what terms. The obligation to provide this information continues up until the time that there is a completed contract of insurance. Failure to do so entitles the Insurers, if they so wish, to avoid the contract of insurance from inception and so enables them to repudiate liability there under. If you have any doubt as to what constitutes a material fact or circumstance please do not hesitate to ask for advice. Step 4: Complete the Declaration We hereby warrant that: To the best of our knowledge and belief the foregoing particulars and statements are true and that no material fact has been withheld. They and other written statements made by us or on our behalf for the purpose of the proposed insurance shall be the basis of and incorporated in the contract between us and the company. We hereby undertake to declare any material alterations or amendments to the foregoing particulars and statements which occur prior to the commencement of the contract of insurance. Signed on behalf of the Insured Print name Position held Date Important: Failure to disclose material facts could result in your policy being invalidated. Material facts are those which might influence the acceptance or assessment of your proposal. If you are in doubt as to whether a fact is material you should disclose it. Step 5: Please e-mail the completed form to: enquiries@rmkltd.co.uk RMK Insurance Consultants Ltd, Suite 11, 351 London Road, Hadleigh, Essex, SS7 2BT T: 01702 555560 F: 01702 555528 www.rmkinsurance.com RMK Insurance Consultants are authorised and regulated by the Financial Conduct Authority. Cyber Liability 07/14 T2