Call Policy Administration on
0861 767 778 or email
cyber@itoo.co.za
Call Claims on
0861 767 778 or email
cyber_claims@itoo.co.za
Overview | Description | ||
---|---|---|---|
Incident response costs(Incident mitigation) | Costs to respond to a systems security incident, including:
| ||
Privacy liability(3rd party cover) | Defence and settlement of liability claims arising from compromised information. | ||
Network security liability(3rd party cover) | Defence and settlement of liability claims resulting from a system security incident affecting systems and data as well as causing harm to third-party systems and data. | ||
Media liability(3rd party cover) | Defence and settlement of liability claims resulting from disseminated content (including social media content) including:
| ||
Regulatory fines(1st party cover) | Fines imposed by a government regulatory body due to an information privacy breach. | ||
Business interruption(1st party cover) | Loss of income and increased cost of working as a result of a systems security incident. | ||
Data restoration(1st party cover) | Costs to restore, re-collect or replace data lost, stolen or corrupted due to a systems security incident. | ||
Cyber extortion(1st party cover) | Costs to investigate and mitigate a cyber extortion threat. Where required, costs to comply with a cyber extortion demand. | ||
Initial Response Phase(Optional extensions - risk specific) | Expenses for specialists to contain and manage an incident, for a pre-determined time without a deductible being applicable. | ||
Outsourced service provider(Optional extensions - risk specific) | Cover for exposure to named outsourced service providers including:
| ||
Theft of Funds(Optional extensions - risk specific) | Unrecoverable loss of money, belonging to or for which you are legally responsible, as a direct result of a system security incident by a third party. Cryptocurrency losses are excluded. | ||
Payment card industry fines and penalties(Optional extensions - risk specific) | Cover for direct monetary fines, penalties, assessments, chargebacks, reimbursements and fraud recoveries which you become legally obligated to pay in terms of a merchant services agreement as a direct result of a network security breach resulting from non-compliance with PCI-DSS. Reasonable costs to demonstrate your ability to prevent a future breach as required by your merchant services agreement. | ||
Phone phreaking(Optional extensions - risk specific) | Call and/or bandwidth usage costs you are legally obligated to pay as a result of unauthorised use of your telecommunications system by a third party. | ||
Physical damage(Optional extensions - risk specific) | Costs to replace or repair direct physical damage of tangible property belonging to or rented, leased or hired by you as a direct result of a system security incident, e.g. hacker turns off a water pump which causes material damage – because the causation was a hack traditional policy would not trigger but a cyber policy could respond. |
Costs to respond to a systems security incident, including:
Defence and settlement of liability claims arising from compromised information.
Defence and settlement of liability claims resulting from a system security incident affecting systems and data as well as causing harm to third-party systems and data.
Defence and settlement of liability claims resulting from disseminated content (including social media content) including:
Fines imposed by a government regulatory body due to an information privacy breach.
Loss of income and increased cost of working as a result of a systems security incident.
Costs to restore, re-collect or replace data lost, stolen or corrupted due to a systems security incident.
Costs to investigate and mitigate a cyber extortion threat. Where required, costs to comply with a cyber extortion demand.
Expenses for specialists to contain and manage an incident, for a pre-determined time without a deductible being applicable.
Cover for exposure to named outsourced service providers including:
Unrecoverable loss of money, belonging to or for which you are legally responsible, as a direct result of a system security incident by a third party. Cryptocurrency losses are excluded.
Cover for direct monetary fines, penalties, assessments, chargebacks, reimbursements and fraud recoveries which you become legally obligated to pay in terms of a merchant services agreement as a direct result of a network security breach resulting from non-compliance with PCI-DSS.
Reasonable costs to demonstrate your ability to prevent a future breach as required by your merchant services agreement.
Call and/or bandwidth usage costs you are legally obligated to pay as a result of unauthorised use of your telecommunications system by a third party.
Costs to replace or repair direct physical damage of tangible property belonging to or rented, leased or hired by you as a direct result of a system security incident, e.g. hacker turns off a water pump which causes material damage – because the causation was a hack traditional policy would not trigger but a cyber policy could respond.
Our cyber insurance offering includes a defined incident response process including a wide range of experienced specialists with a local presence as well as global experience and expertise, spanning the following key areas:
All iTOO business must be done via independent brokers so please ask your broker to contact us if you’d like to get a quote for a cybersecurity insurance policy.
Attacks such as ransomware can affect any company and every industry. Smaller companies are often a target for hackers, particularly if they’re found to have less sophisticated IT infrastructure. The issue is that smaller companies can be severely impacted following a breach, as they have to absorb the high incident response costs. Compromises at larger companies tend to yield larger data sets for theft and breaking into the news, which can also boost a hacker’s reputation.
There are many ways to mitigate the risk of cyber threats such as staff education, encryption, bring-your-own-device policies and password policies, however, even the most diligent businesses can be exposed to a cyber-attack.
Having the latest technology, firewalls and encryption will reduce the risks of a breach occurring however, many cyber threats originate internally from employee mistakes (misplacing a laptop, or not disposing of confidential information securely). Having state-of-the-art protection is not a 100% guarantee against an incident occurring, which makes a cyber insurance policy highly recommended.
You’re the custodian of the data and remain responsible for any data lost in a breach. Look to use a cloud service provider that can provide reasonable assurance that your data will be protected, however, there’s still a chance your business could be held liable for data compromised from the cloud environment (the same would apply for other outsourced providers you use and share data with).