Coverage Definitions

Below you can find a list of coverages included in P100 product:

Coverage

Common Language Description

Field

CoverageId

SECURITY BREACH EXPENSE

Coverage for losses and expenses directly associated with recovery activities in the aftermath of a cyber incident. This can include investigation and forensic services, notification to customers, call center services, overtime salaries, post-event monitoring services such as credit monitoring for impacted customers and more.

securityBreachExpenseLimit

1

SECURITY BREACH LIABILITY

Coverage for third party liability directly due to a cyber incident and that the insured becomes legally obligated to pay. This includes defense expenses, compensatory damages, and settlement amounts, and fines or penalties assessed against the insured by a regulatory agency or government entity, or for non-compliance with the Payment Card Industry Data Security Standards.

securityBreachLiabilityLimit

0

EXTORTION THREATS

Coverage for loss resulting from an extortion threat that is discovered during the policy period. This can include approved firms and resources that determine the validity and severity of threat, interest costs associated with borrowing for the ransom demand, reward payment that leads to conviction and arrest of party responsible, the ransom payment and other reasonable expenses.

extortionThreatsLimit

2

RESTORATION OF ELECTRONIC DATA

Coverage for the costs to replace or restore electronic data or computer programs in the aftermath of an incident. This can also include the cost of data entry, reprogramming and computer consultation services to restore lost assets.

restorationOfElectronicsDataLimit

3

BUSINESS INCOME AND EXTRA EXPENSE

Coverage for the losses and costs associated with the inability to conduct business due to a cyber incident or an extortion threat. Business income includes net income that would have been earned or incurred. Note that business interruptions due to system failure or voluntary shutdown are not covered.

businessIncomeCoverage

4

PUBLIC RELATIONS EXPENSE

Coverage for the fees and costs to restore reputation in response to negative publicity following a cyber incident or a security breach. This includes, for example, the fees associated with the hiring of a public relations firm that handles external communications related to the breach.

publicRelationsExpenseLimit

5

COMPUTER AND FUNDS TRANSFER FRAUD

Coverage for the losses due to a fraudulent computer operation that causes money (or other property) to be transferred from an insured’s account. This also covers losses incurred by a fraudulent instruction directing a financial institution to debit money from the insured’s transfer account.

computerFraudLimit

6

RANSOM PAYMENTS

Coverage for the reimbursement of the monetary
value of any ransom payment made by the insured
to a third party in response to a ransom demand to
resolve an extortion threat.

ransomPaymentLimit

11

SOCIAL ENGINEERING

Coverage for a loss resulting from a social engineering incident where the insured is
intentionally misled to transfer money to a person, place or account directly from good faith reliance
upon an instruction transmitted via email by an imposter. A documented verification procedure requirement needs to have been completed in order to be provided coverage

socialEngEndorsement

7

Contingent Business Interruption Loss

Coverage for the income loss and extra expenses due to the actual and measurable interruption or degradation in performance of a service provider’s computer system. This would also include a voluntary shutdown of computer systems when such action is taken to minimize, avoid or reduce further damage as a result of a covered incident.

CONTINGENT_BI

HARDWARE REPLACEMENT COSTS

Coverage for the cost to replace computers or any
associated devices or equipment operated by the
insured that are unable to function as intended due
to corruption or destruction of software or firmware,
resulting from a cyber incident.

hardwareReplCostSubLimit

8

TELECOMMUNCIATIONS FRAUD

Coverage for the cost of unauthorized calls or
unauthorized use of the insured’s telephone
system’s bandwidth, including but not limited to
phone bills.

telecomsFraudSubLimit

9

POST BREACH REMEDIATION COVERAGE

Coverage for labor costs incurred to resolve
vulnerabilities or weaknesses in the insured’s
computer system that are identified by an
independent security firm after a cyber incident.
Identified upgrades or improvements must reduce
the probability or potential damage of a future
incident to qualify.

postBreachRemediationSubLimit

10

WEBSITE MEDIA CONTENT LIABILITY

Website Media Liability provides coverage for a loss and defense expenses from intellectual property infringement, other than patent infringement, related to media content on the company website or its social media accounts only.

websiteMediaContentLiabilitySubLimit

12

Extortion Threats & Ransom Payment

Coverage for loss and defense expenses as a result of an investigation, demand or Regulatory Proceeding, brought by or on behalf of an administrative or regulatory agency, or any federal, state, local or foreign governmental entity in an official capacity.

EXTORTION_THREATS_AND_RANSOM_PAYMENT_V5

16

Business Income, Contingent Business Income & Extra Expense

Coverage for the losses and costs associated with the inability to conduct business due to a cyber incident or an extortion threat. Business income includes net income that would have been earned or incurred. Note that business interruptions due to system failure or voluntary shutdown are not covered.

BI_EXTRA_EXPENSE_V5

17

Additional Insureds

ADDITIONAL_INSURED

18

Enhanced Business and Contingent Business Income inclusive of System Failure

Endorsement that removes the E-Commerce restriction for BI and CBI within the base form, and expands triggers to systems failure.

enhancedBusinessAndCbiWithSystemFailure

21

Enhanced Business and Contingent Business Income

Endorsement that removes the E-Commerce restriction for BI and CBI within the base form.

enhancedBusinessAndCbi

22

Service Fraud and cryptojacking

Endorsement covering an expanded set of telecommunications fraud including cloud consumption, along with cryptojacking.

serviceFraudAndCryptojackingSubLimit

23

Dedicated Breach Costs Endorsement

Allows an insured to purchase a
separate limit for breach cost expense
coverage.

dedicatedBreachCostsEndorsementSubLimit

24

Reverse Social Engineering Endorsement

Enhances the base language for Social Engineering coverage to provide additional coverage for incidents involving cyber attacks that preys on the Insured’s vulnerabilities and manipulates any party of the Insured (employees) to assist in a cyber attack, by helping the attacker.

reverseSocialEngineeringEndorsement

26