About Data Breach Insurance

Data breaches and compromises of customer and employee data continue to be reported at a high frequency. When a breach occurs, you need to be ready to respond quickly and effectively to mitigate exposure to brand damage and legal liability.
 
Current insurance products often provide an inadequate solution to the unique challenges posed by data breaches. Cyber coverage provides what we believe is the insurance market's most comprehensive solution to data breaches and information security exposures.
 
Cyber coverage is unique in offering a turnkey solution to data breaches: a solution that provides a separate limit of coverage and does not erode the third-party liability coverage.
 
Coverage Highlights Include:

  • Breach notification and credit monitoring services, with additional coverage for third-party claims 
  • Breach response coverage includes forensic and legal assistance, notification costs, credit monitoring services for each person notified, and loss negotiation services
  • Identity theft-related fraud resolution services for individuals enrolled in credit monitoring who become victims of identity theft
  • Retentions as low as $2,500, with higher retentions available
  • Reimbursement for cyber extortion expenses as a direct result of cyber extortion threat
  • Additional risk management research publications and loss prevention services
  • Automatic access to online services that provide educational and loss control information relating to compliance with applicable laws, safeguarding sensitive data, preparing to respond to breach incidents, and best practices

You will have unlimited access to: 

  • Online compliance materials related to federal and state laws regarding data security, data breaches, and data privacy
  • Step-by-step procedures to lower risk by understanding the scope of personal information, and how to manage the collection and retention of personal information in your organization
  • Quarterly newsletter and email news alerts
  • Online training programs and employee training bulletins
  • Encryption software download
  • Procedures to assist in handling data breaches, preventing data security incidents, and responding to a data breach
  • Expert vendors in data protection (closed computing, malware and anti-virus protection, and network security)

 

Data breach flyer

 

 

 

© 2015 All Rights Reserved