Higher and lower limits and retentions available on the Customize Coverage page.
Multimedia Content Liability Coverage
Technology Errors and Omissions Coverage
Business Interruption & Extra Expenses Coverage
Digital Asset Restoration Coverage
Sorry! You cannot add: Technology Errors and Omissions
Before customizing your coverage, we’ll just need to ask you a few more questions.
- Get new option (different limit, retention, coverages)
- This quote requires further review.
- Get new option (different limit, retention, coverages)
Limit | $250,000 |
Retention | $2,500 |
Coverage Period | Nov 26, 2018 - Nov 26, 2019 |
Network and Information Security Liability
|
Regulatory Defense and Penalties
|
An employee loses a laptop with the private data of your customers or a hacker breaches your computer’s defenses and steals your data. These events can trigger mandatory reporting obligations, or worse, resulting in your company being sued. We help you resolve these incidents, including hiring legal counsel and covering legal judgments.
Data breaches are damaging enough, but they can also result in state and federal investigations and penalties to your business. We’ll cover the costs to manage any investigation as well as any penalties levied against you (subject to applicable law).
Thanks to the Internet, any company with a public website is subject to the same exposures and litigation of a traditional media company. We’ll indemnify you against claims for defamation, invasion of privacy, trademark and copyright infringement, and other multimedia wrongful acts.
Your customers’ credit card information was stolen. Don’t worry. We’ll cover any PCI fines or assessments made against you. If you weren’t aware, all businesses that accept or store credit card information are subject to the Payment Card Industry’s Data Security Standards (PCI DSS).
A hacker gains access to an industrial control system or Internet-connected device. The attack may come from cyberspace, but the physical impact is real. We cover the costs of defense and any liability you incur when a failure in your security results in physical damage or injury.
Sub-limit may apply; see your policy for details.
A hacker gains access to an industrial control system or Internet-connected device. A resulting system failure triggers the release of pollutants. We cover the costs to defend you and any liability you might have to a 3rd party resulting in the release of pollutants.
Sub-limit may apply; see your policy for details.
If a technology product or service that you sell doesn't work as intended, or worse, results in losses for your customers, you could find yourself at the end of a lawsuit. We help you resolve these situations by covering the costs of defense and any legal liability you incur from such an error or omission.
Incidents happen. When they do, we’re ready to help you recover and maintain the confidence of your customers. We’ll provide expert counsel, and cover the costs of forensics, notification, and incident response efforts to help make you whole.
For limits $5 million or less, the limit for this coverage is separate from and in addition to the Aggregate Policy Limit of Liability
When an incident occurs, it’s often more than just your data that is damaged. In your time of crisis, we’ll provide and cover the costs of consultants, public relations, and notification services so that you can control the narrative.
A hacker has encrypted all of your files and won’t unlock them until you pay a ransom. Not to worry, we’ll cover the costs to get you up and running again.
A hacker uses a denial of service attack to take down your website. Your cloud provider goes down as the result of a network outage. We not only cover your lost income, but any extra expenses to get your business back online.
Your network is hit by a ransomware attack. Your data may be held hostage, but your business doesn’t have to be. We’ll cover the costs to fix the problem and restore data that is corrupted or lost.
A funds transfer request is sent to your controller by someone pretending to be the CEO. The funds may be out the door, but at least you’re not out of pocket—we’ve got you covered.
Sub-limit and separate retention may apply; see your policy for details.
When an incident occurs, it’s often more than just your data that is damaged. In your time of crisis, we’ll provide and cover the costs of consultants, public relations, and notification services so that you can control the narrative.
Reputation Repair coverage enhances Crisis Management coverage, with expanded coverage for advertising and media purchases and consulting costs to help you preserve customer confidence and protect your brand.
A malware infection alters the firmware of your computers. Their integrity may be comprised, but your business won’t be. We cover the costs to repair or replace any affected systems.
Sub-limit may apply; see your policy for details.
A hacker gains access to your cloud infrastructure (network, servers, telephony, etc.) and drives up your bill mining for virtual currencies. We'll reimburse you for the loss incurred as a result of these malicious acts.
Sub-limit may apply; see your policy for details.
A hacker gains access to an industrial control system or Internet-connected device. The attack may come from cyberspace, but the physical impact is real. We help you recover, by covering your business interruption losses and extra expenses (including tangible property) to restore your business operations to normal.
Sub-limit may apply; see your policy for details.