Cyber Insurance

Your reasonable losses and expenses that may result from cyber incidents during the period of insurance. Cover is dependent on the cover option you choose, and the limits shown in your policy schedule. The annual claim limit will apply irrespective of the number of claims that you submit.

You may claim for incidents such as: Theft of funds, Identity theft, Data restoration, Cyberbullying, cyberstalking and loss of reputation, Cyber extortion, Third party liability and Data and privacy breach by a third party.

Computer systems Information technology and communications systems which include hardware, IT infrastructure, software, and electronic media to manage electronic data. This does not include operational technology that monitors or controls devices and

events in business or embedded systems. For example, a monitor system used to change valves

Cyber extortion If you receive a legitimate threat or a demand for ransom by a third party to harm your computer system or if we need to resolve a cyber incident caused by that third party

Cyber incident A malicious act that has a negative impact on your computer systems, including hacking, extortion, theft of data or malware

Data breach A security breach where someone retrieves, destroys, changes, loses, or discloses personal data unlawfully from your own or outsourced computer system. For example, someone hacking into your computer system or your email provider to steal personal data

Electronic media IT devices that are used to record and store digital data. This includes external drives, CD-ROMs, DVD-ROMs, magnetic tapes or disks, and USB sticks

Email spoofing Forging an email header so that the message appears to have been sent from the legitimate source. For example, changing an email header so that the email appears to come from your bank

IT infrastructure Communication equipment or facilities that are used to maintain the functioning of electronic facilities that support computer systems and data

Legal costs Legal fees including costs for experts, investigations, court appearances, surveys, examination, and procedures that are necessary to defend your case. These legal costs do not include general expenses such as salaries and overheads

Lost income Actual income lost for the time reasonably and necessarily taken off from work to fix your records after a claim event. The lost Income for self-employed persons will be based on the previous year’s tax returns

Mobile wallet Any virtual wallet that you store money in and which you can use to perform transactions. This does not include any crypto-currencies, credit bought or earned within a game or gambling site or a subscription purchased online

Personal data Information as defined by applicable data protection laws. This data identifies a person, for example, a name, identification number, location data including an online identifier or a physical, genetic, mental, economic, cultural or social identity

Phishing When someone pretends to be a trustworthy entity in electronic communication to obtain sensitive information such as usernames, passwords and credit card details