Data Breach Insurance

 
Your clients trust you to keep their sensitive information safe. But is your data transmitted and stored securely?
Can you afford to protect your customers’ information and your business from the setbacks of a data breach?
 
When a data breach occurs, you need to be ready to respond quickly and effectively to mitigate your exposure to brand damage and legal liability.
 
Coverage Highlights Include:

• Breach-notification and credit-monitoring services, with additional coverage for third-party claims.
• Breach response coverage includes forensic and legal assistance, notification costs, credit-monitoring services for each person notified and loss-negotiation services.
• Identity theft-related fraud-resolution services for individuals enrolled in credit monitoring who become victims of identity theft.
• Retentions as low as $2,500, with higher retentions available.
• Policy also provides reimbursement for cyber extortion expenses as a direct result of cyber extortion threat.
• Provides additional risk management research publications and loss prevention services. Automatic access to online services that provide educational and loss control information relating to compliance with applicable laws, safeguarding sensitive data, preparing to respond to breach incidents and best practices.

You will have unlimited access to:
1. Online compliance materials related to federal and state laws regarding data security, data breaches, and data privacy.
2. Step-by-step procedures to lower risk by understanding the scope of personal information, and how to manage the collection and retention of personal information in your organization.
3. Quarterly newsletter and email news alerts.
4. Online training programs and employee training bulletins.
5. Encryption software download.
6. Procedures to assist you in handling data breaches, preventing data security incidents and responding to a data breach.
7. Expert vendors in data protection. Closed computing, malware and anti-virus protection and network security.
 
Data Breach Examples

© 2015 All Rights Reserved