Capacity

Capacity

  • US$ 25,000,000 per event and in the annual aggregate per policy

Security

  • Tokio Marine Kiln Syndicates 510 & 1880

Territories

  • Chile
  • Argentina
  • Colombia
  • Peru
  • Ecuador
  • Paraguay
  • Uruguay
  • Bolivia
  • Guatemala
  • Honduras
  • El Salvador
  • Costa Rica
  • Panama
  • Nicaragua
  • Dominican Republic
  • Beliza
  • Jamaica
  • Mexico

Coverages – Overview of Cover

Data Breach

  • Coverage for the theft of trade secrets resulting from a privacy breach, security breach or acts of cyber terrorism
  • Privacy breaches that are not linked to or triggered by a computer or electronic data breach, so customers are covered for paper file or other privacy breaches
  • Can claim incident response expenses for actual and suspected breaches
  • Costs to notify customers following a data breach, even where not required by law.

Reputational Harm

  • Responds to all types of media events
  • Business interruption loss calculation is based on an established Gross Earnings form
  • Public relations expenses to restore the brand.

Business Interruption

  • Business interruption covers total, partial and intermittent interruption
  • Contingent business interruption is covered as standard – the business interruption resulting from the failure of a third party’s computer system
  • The business interruption indemnity period is up to the date of full system restoration plus
  • An automatic 30 days thereafter, subject to a maximum of 365 days
  • Extra expense incurred within the waiting period are subject to a monetary retention
  • Ability to reduce waiting period to six hours
  • Business interruption triggers include: Power failure if the power supply is under the direct operational control of the Insured, Administrative and programming errors in the use of the computer system, Privacy breach and Security breach.
  • Business interruption loss calculation is based on an established Gross Earnings form.

24 Hour Cyber Incident Hotline – CyberScout

Calling the 24-hour emergency hotline will give you immediate access to a leading recognised breach response firm who will;

  • Provide clear advice on any immediate steps that need to be taken
  • Where appropriate, promptly engage first class IT forensic expertise to: Establish the precise nature of the incident, Safeguard your digital assets, Get your systems back up and running, Preserve critical evidence, which may be needed to help defend third party claims or regulatory proceedings.

Following these initial steps, a breach response firm will then be on hand to:

  • Provide further guidance on how best to handle initial enquiries from data subjects
  • Liaise with law enforcement and the media
  • Where appropriate, robustly defend any resultant third party claims or regulatory proceedings ensure compliance with all relevant state privacy and data breach notification laws.

Cyber Risks

Business Appetite

  • Manufacturing
  • Professional services
  • Financial services (excl. managing funds)
  • Insurance Companies
  • Hospital – Medical Services – Pharmacy
  • Retail & General Commerce
  • Real estate Agriculture
  • Construction
  • Mining
  • Oil & Gas
  • Power & Utilities

Excluded Activities

  • Manufacturing
  • Professional services
  • Financial services (excl. managing funds)
  • Insurance Companies
  • Hospital – Medical Services – Pharmacy
  • Retail & General Commerce
  • Real estate Agriculture
  • Construction
  • Mining
  • Oil & Gas
  • Power & Utilities
  • Logistics
  • Pre-paid currency cards and digital wallets
  • Adult Entertainment / Online Dating
  • Advertising
  • Airlines & Airports
  • Background Checking Services
  • Behavioural Marketing
  • Biometric Data Services
  • Business Process Outsourcing (BPO)
  • Call Center
  • Credit Unions
  • Cryptocurrency
  • Dating Websites / Mobile Apps
  • Debt Collection
  • Education (schools, colleges and universities) Gambling / Casinos
  • Government-owned Entities / Municipalities Hotels
  • Media
  • Online Gaming
  • Payment Processors / Billing Services Publishing Houses
  • Social Services
  • Stock Exchange Technology companies*
  • Telecommunications

Wordings

  • TMK Cyber CTRL

Challenged Activities

  • Large Groups
  • Banks (only XOL)
  • Wholsale

“Technology companies” includes the following:

  • Cloud, Data Hosts & Infrastructure as a Service (IaaS)
  • Data Aggregators
  • IT Consultancy
  • IT Service Providers
  • Managed Service Providers (MSP)
  • Mobile Application Developers
  • Software Developer & Software as a Service (SaaS)

Contact – XS Cyber Risks