CyberRisk Tech®
Why You Need the Protection
It takes only one cyber event or data security breach to impair your company’s financial results, or even potentially put you out of business. One resourceful hacker, virus, or system glitch can shut down your entire network within minutes, paralyzing operations and your ability to earn income. One successful hack, lost laptop, or lost paper record can cause a data breach impacting the privacy of customers, employees, and others. Travelers helps protect you from every angle… pre-breach, post-breach and always.
Coverage Highlights
CyberRisk Tech coverage is specifically designed to help protect today’s technology companies in the event of a cyber breach. CyberRisk Tech provides a wide variety of solutions, including coverage for forensic investigations, litigation expenses associated with the breach, regulatory defence expenses/fines, crisis management expenses, business interruption and cyber extortion. CyberRisk Tech protection doesn’t end after a breach occurs. Betterment is an insuring agreement that helps provide coverage for costs to improve a computer system after a security breach, when the improvements are recommended to eliminate vulnerabilities that could lead to a similar breach. In addition to coverage, Travelers provides policyholders innovative value added pre-breach and post-breach risk management services at no additional cost.
Travelers CyberRisk Tech Coverage Includes the Following Insuring Agreements:
Liability Insuring Agreements:
Technology Errors & Omissions
Coverage for claims arising from errors, omissions, or negligent acts by the insured in performance of or failure to perform technology services or that result in the failure of technology products to perform the function or serve the purpose intended, or infringement of copyrighted software code or any other copyrighted element of any part of a software program.
Privacy and Security
Coverage for claims arising from the failure to prevent a privacy breach or any violation of law in connection with such breach, the failure to provide notification of a data breach where required by law, failure to destroy confidential information or any violation of law in connection with such failure, the failure to comply with a privacy policy, unauthorized, unlawful or wrongful collection of confidential information, failure to prevent a security breach that results in the alteration or deletion of confidential information, the inability of authorized users to gain system access, the participation in a DDoS attack, or the transmission of a computer virus.
Media
Coverage for claims arising from copyright infringement, plagiarism, defamation, libel, slander, misappropriation of ideas, improper deep-linking or framing, unfair competition and violation of an individual’s right of privacy or publicity in electronic and printed content.
Regulatory
Coverage for administrative and regulatory proceedings, civil and investigative demands brought by domestic or foreign governmental entities or claims made as a result of privacy and security acts or media acts
Breach Response Insuring Agreements:
Privacy Breach Notification
Coverage for costs to notify and provide services to individuals or entities who have been affected by a data breach. Examples include call center services, notification, credit monitoring and the cost to purchase identity fraud insurance.
Computer and Legal Experts
Coverage for costs associated with analyzing a privacy breach, security breach or cyber extortion threat, containing, or stopping privacy or security breaches, determining whose confidential information was lost, stolen, accessed, or disclosed, certifying the computer system meets payment care security standards, and providing legal services to respond to such breaches.
Betterment
Coverage for costs to improve a computer system after a security breach, when the improvements are recommended to eliminate vulnerabilities that could lead to a similar breach.
Cyber Extortion
Coverage for ransom and related costs associated with responding to threats made to attack a system or to access or disclose confidential information.
Data Restoration
Coverage for costs to restore or recover electronic data, computer programs, or software lost from system damage due to computer virus, denial-of-service attack, or unauthorized access.
Public Relations
Coverage for public relations services to mitigate negative publicity resulting from an actual or suspected privacy and security act, technology act or media act.
Cyber Crime Insuring Agreements:
Computer Fraud
Coverage for loss of money, securities, or other property due to unauthorized system access.
Funds Transfer Fraud
Coverage for loss of money or securities due to fraudulent transfer instructions to a financial institution.
Social Engineering Fraud
Coverage for loss of money or securities due to a person impersonating another and fraudulently providing instructions to transfer funds.
Telecom Fraud
Coverage for amounts charged by a telephone service provider resulting from an unauthorized person accessing or using an insured’s telephone system.
Business Loss Insuring Agreements:
Business Interruption
Coverage for loss of income and expenses to restore operations as a result of a computer system disruption caused by a virus or computer attack, including the voluntary shutdown of systems to minimize the business impact of the event.
Dependent Business Interruption
Coverage for loss of income and expenses to restore operations as a result of an interruption to the computer system of a third party that the insured relies on to run their business.
System Failure
Coverage for loss of income and expenses to restore operations as a result of an accidental, unintentional, and unplanned interruption of an insured’s computer system.
Reputational Harm
Coverage for lost business income that occurs as a result of damage to a business’ reputation when an actual or potential cyber event becomes public.