Skip to Content

Policy wording and guidance

Below are our four main insuring agreements and key definitions along with some guidance around their practical application

Key insuring agreements and guidance

Policy wording

{{Business interruption loss}} that the {{insured organization}} sustains as a result of a {{security breach}} or {{system failure}} that the {{insured}} first discovers during the {{policy period}}.

Policy guidance

Business Interruption Loss includes certain losses that are sustained as a result of the actual interruption of an Insured’s business operations caused by a covered cyber event.   

Examples where this coverage may be triggered include: 

  • A ransomware attack shuts down an entire hospital which is therefore unable to accept emergency patients.
  • A system glitch causes a retailer’s point of sale systems to unexpectedly go offline, preventing the retailer from making any sales.
  • A manufacturer’s network is attacked and the attack causes systems to go down and draws manufacturing to halt.
  • A denial of service attack targets a retailer’s website, halting online sales. 

Examples where this coverage may not be triggered include:

  • Salaries of employees who are idle/unproductive during the time in which systems are interrupted (but this will be included in the assessment of any lost income / profit as a result of a loss of sales arising out of a covered event).   
Policy wording

{{Dependent business loss}} that the {{insured organization}} sustains as a result of a {{dependent security breach}} or a {{dependent system failure}} that the {{insured}} first discovers during the {{policy period}}.

Policy guidance

Dependent Business Loss includes certain losses that are sustained as a result of the interruption of an Insured’s business operations caused by a dependent covered cyber event.

Circumstances triggering this coverage may include:

  • A ransomware attack shuts down your cloud provider’s entire network, and as a result, you have downstream interruption to your business operations.
  • A covered cyber event causes the platform of a third-party hosting provider to be shut down, causing downstream impact to a company’s ability to operate.
  • A covered cyber event shuts down the production of a third-party supplier, which has a direct downstream effect on a company precluding it from completing production and meeting customer demand.

Examples where this coverage may not be triggered include:

  • A network outage impacts a company with whom you have no contract. There is a downstream impact on your business. Because you do not have a contract with the company hit with the outage, this does not trigger your policy and hence any impact on your business will not attract coverage.
  • A customer’s network is shut down, and it does not operate and therefore has no demand for your company’s services. The customer does not qualify as a dependent business and therefore loss associated with this incident does not trigger your coverage.
Policy wording

{{Data recovery costs}} that the {{insured organization}} incurs as a direct result of a {{security breach}} that the {{insured}} first discovers during the {{policy period}}.

Policy guidance

Data Recovery Costs includes certain costs incurred to restore software or electronic data impacted by a covered cyber event. 

Examples of costs that may fall under this definition include: 

  • Costs to work with a third party to restore information from backup data.
  • Costs to hire temporary labor to run decryption keys or reimage certain impacted devices.
  • Overtime costs paid to IT employees to restore from backups.
  • Expenses for an external consultant to determine whether electronic information can be restored or replaced. 

Examples of costs that do not fall under this definition include: 

  • Amounts associated with the value of lost data that is not restored.
  • Costs to purchase additional hardware.
  • Costs to restore data that belongs to a 3rd party or is not part of your Computer System.
  • Expenses incurred to restore information that is not “Data.”
  • Amounts paid as ransom (see Cyber Extortion loss section of policy for more information).
  • Amounts paid to upgrade or enhance any systems, including migration to a Cloud environment. 
Policy wording

{{Cyber extortion loss}} that the {{insured organization}} incurs as a result of an {{extortion threat}} first made against the {{insured organization}} during the {{policy period}}.

Policy guidance

Examples of costs that may fall under this definition include: 

  • Amounts paid by you, with Beazley’s prior written consent, to threat actors in order to obtain a decryption key to recover from a ransomware incident resulting from a covered Extortion Threat.
  • Amounts paid by you, with Beazley’s prior written consent to retain a third-party consultant to provide services to negotiate with a threat actor, test a decryption key, perform due diligence on a threat actor, or perform other specified services. 

Examples of costs that do not fall under this definition include: 

  • Amounts incurred to restore a 3rd party’s systems or data that is not your Computer Systems.
  • Credit card processing fees incurred by you to pay a third party consultant.
  • Loan origination fees incurred by you to a third party consultant or crypto currency vendor to purchase cryptocurrency to facilitate a ransom payment. 
  • Amounts incurred without Beazley’s prior written consent.
  • Costs to perform decryption or restoration of impacted systems. 
Additional Insured
Additional insured means any person or entity that the insured organization has agreed in writing to add as an additional insured under this Policy prior to the commission of any act for which such person or entity would be provided coverage under this Policy, but only to the extent the insured organization would have been liable and coverage would have been afforded under the terms and conditions of this Policy had such claim been made against the insured organization.
Breach Notice Law
Breach notice law means any statute or regulation that requires notice to persons whose personal information was accessed or reasonably may have been accessed by an unauthorized person. breach notice law also includes any statute or regulation requiring notice of a data breach to be provided to governmental or regulatory authorities.
Breach Response Services

Breach response services means the following fees and costs in response to an actual or reasonably suspected data breach or security breach:

  1. for an attorney to provide necessary legal advice to the insured organization to evaluate its obligations pursuant to breach notice laws or a merchant services agreement and in connection with providing the breach response services described below;
  2. for a computer security expert to determine the existence, cause and scope of an actual or reasonably suspected data breach, and if such data breach is actively in progress on the insured organization's computer systems, to assist in containing it;
  3. for a PCI Forensic Investigator to investigate the existence and extent of an actual or reasonably suspected data breach involving payment card data and for a Qualified Security Assessor to certify and assist in attesting to the insured organization's PCI compliance, as required by a merchant services agreement;
  4. to notify those individuals whose personally identifiable information was potentially impacted by a data breach exceeding the notified individuals threshold;
  5. to provide a call center to respond to inquiries about a data breach that exceeds the notified individuals threshold;
  6. to provide a credit monitoring, identity monitoring or other solution listed in the Information Packet to individuals whose personally identifiable information was potentially impacted by a data breach exceeding the notified individuals threshold; and
  7. public relations and crisis management costs directly related to mitigating harm to the insured organization which are approved in advance by the Underwriters in their discretion.

Breach response services will be provided by providers listed in the Information Packet, will be subject to the terms and conditions of this Policy and the Information Packet, and will not include any internal salary or overhead expenses of the insured organization. Breach response services also includes assistance from the BBR Services Team and access to education and loss prevention tools.

Business Interruption Loss

Business interruption loss means:

  1. income loss;
  2. forensic expenses; and
  3. extra expense;

Actually sustained during the period of restoration as a result of the actual interruption of the insured organization’s business operations caused by a security breach or system failure. Coverage for business interruption loss will apply only after the waiting period has elapsed.

Business interruption loss will not include (i) loss arising out of any liability to any third party; (ii) legal costs or legal expenses; (iii) loss incurred as a result of unfavorable business conditions; (iv) loss of market or any other consequential loss; (v) dependent business loss; or (vi) data recovery costs.

Claim

Claim means:

  1. a written demand received by any insured for money or services;
  2. with respect to coverage provided under the Regulatory Defense & penalties insuring agreement only, institution of a regulatory proceeding against any insured; and
  3. with respect to coverage provided under part 1. of the data & Network Liability insuring agreement only, a demand received by any insured to fulfill the insured organization's contractual obligation to provide notice of a data breach pursuant to a breach notice law;

Multiple claims arising from the same or a series of related, repeated or continuing acts, errors, omissions or events will be considered a single claim for the purposes of this Policy. All such claims will be deemed to have been made at the time of the first such claim.

Claims Expenses

Claims expenses means:

  1. all reasonable and necessary legal costs and expenses resulting from the investigation, defense and appeal of a claim, if incurred by the Underwriters, or by the insured with the prior written consent of the Underwriters; and
  2. the premium cost for appeal bonds for covered judgments or bonds to release property used to secure a legal obligation, if required in any claim against an insured; provided the Underwriters will have no obligation to appeal or to obtain bonds.

claims expenses will not include any salary, overhead, or other charges by the insured for any time spent in cooperating in the defense and investigation of any claim or circumstance that might lead to a claim notified under this Policy, or costs to comply with any regulatory orders, settlements or judgments.

Computer Systems

Computer systems means computers, any software residing on such computers and any associated devices or equipment:

  1. operated by and either owned by or leased to the insured organization; or
  2. with respect to coverage under the Breach Response and Liability insuring agreements, operated by a third party pursuant to written contract with the insured organization and used for the purpose of providing hosted computer application services to the insured organization or for processing, maintaining, hosting or storing the insured organization's electronic data.
Continuity Date

Continuity date means:

  1. the continuity date listed in the Declarations; and
  2. with respect to any subsidiaries acquired after the continuity date listed in the Declarations, the date the named insured acquired such subsidiary.
Control Group
Control group means any principal, partner, corporate officer, director, general counsel (or most senior legal counsel) or risk manager of the insured organization and any individual in a substantially similar position.
Criminal Reward Fund
Criminal reward funds means any amount offered and paid by the insured organization with the Underwriters' prior written consent for information that leads to the arrest and conviction of any individual(s) committing or trying to commit any illegal act related to any coverage under this Policy; but will not include any amount based upon information provided by the insured, the insured's auditors or any individual hired or retained to investigate the illegal acts. All criminal reward funds offered pursuant to this Policy must expire no later than 6 months following the end of the policy period.
Cyber Extortion Loss

Cyber extortion loss means:

  1. any extortion payment that has been made by or on behalf of the insured organization with the Underwriters' prior written consent to prevent or terminate an extortion threat; and
  2. reasonable and necessary expenses incurred by the insured organization with the Underwriters' prior written consent to prevent or respond to an extortion threat}.
Damages

Damages means a monetary judgment, award or settlement, including any award of prejudgment or post-judgment interest; but damages will not include:

  1. future profits, restitution, disgorgement of unjust enrichment or profits by an insured, or the costs of complying with orders granting injunctive or equitable relief;
  2. return or offset of fees, charges or commissions charged by or owed to an insured for goods or services already provided or contracted to be provided;
  3. taxes or loss of tax benefits;
  4. fines, sanctions or penalties;
  5. punitive or exemplary damages or any damages which are a multiple of compensatory damages, unless insurable by law in any applicable venue that most favors coverage for such punitive, exemplary or multiple damages;
  6. discounts, coupons, prizes, awards or other incentives offered to the insured's customers or clients;
  7. liquidated damages, but only to the extent that such damages exceed the amount for which the insured would have been liable in the absence of such liquidated damages agreement;
  8. fines, costs or other amounts an insured is responsible to pay under a merchant services agreement; or
  9. any amounts for which the insured is not liable, or for which there is no legal recourse against the insured.
Data
Data means any software or electronic data that exists in computer systems and that is subject to regular back-up procedures.
Data Breach
data breach means the theft, loss, or unauthorized disclosure of personally identifiable information or third party information that is in the care, custody or control of the insured organization or a third party for whose theft, loss or unauthorized disclosure of personally identifiable information or third party information the insured organization is liable.
Data Recovery Costs

Data recovery costs means the reasonable and necessary costs incurred by the insured organization to regain access to, replace, or restore data, or if data cannot reasonably be accessed, replaced, or restored, then the reasonable and necessary costs incurred by the insured organization to reach this determination.

Data recovery costs will not include: (i) the monetary value of profits, royalties, or lost market share related to data, including but not limited to trade secrets or other proprietary information or any other amount pertaining to the value of data; (ii) legal costs or legal expenses; (iii) loss arising out of any liability to any third party; or (iv) cyber extortion loss.

Dependent Business
Dependent business means any entity that is not a part of the insured organization but which provides necessary products or services to the insured organization pursuant to a written contract.
Dependent Business Loss

Dependent business loss means:

  1. income loss; and
  2. extra expense;

    actually sustained during the period of restoration as a result of an actual interruption of the insured organization's business operations caused by a dependent security breach or dependent system failure. Coverage for dependent business loss will apply only after the waiting period has elapsed.

    dependent business loss will not include (i) loss arising out of any liability to any third party; (ii) legal costs or legal expenses; (iii) loss incurred as a result of unfavorable business conditions; (iv) loss of market or any other consequential loss; (v) business interruption loss; or (vi) data recovery costs.
Dependent Security Breach
Dependent security breach means a failure of computer security to prevent a breach of computer systems operated by a dependent business.
Dependent System Failure

Dependent system failure means an unintentional and unplanned interruption of computer systems operated by a dependent business.

Dependent system failure will not include any interruption of computer systems resulting from (i) a dependent security breach, or (ii) the interruption of computer systems that are not operated by a dependent business.

Digital Currency

Digital currency means a type of digital currency that:

  1. requires cryptographic techniques to regulate the generation of units of currency and verify the transfer thereof;
  2. is both stored and transferred electronically; and
  3. operates independently of a central bank or other central authority.
Education and Loss Prevention Tools

Education and loss prevention tools means information and services made available by the Underwriters from time to time and includes access to beazleybreachsolutions.com, a dedicated portal through which insureds can access news and information regarding breach response planning, data and network security threats, best practices in protecting data and networks, offers from third party service providers, and related information, tools and services. insureds will also have access to communications addressing timely topics in data security, loss prevention and other areas.

Extortion Payment
Extortion payment means money, digital currency, marketable goods or services demanded to prevent or terminate an extortion threat.
Extortion Threat

Extortion threat means a threat to:

  1. alter, destroy, damage, delete or corrupt data;
  2. perpetrate the unauthorized access or use of computer systems;
  3. prevent access to computer systems or data;
  4. steal, misuse or publicly disclose data, personally identifiable information or third party information;
  5. introduce malicious code into computer systems or to third party computer systems from computer systems; or
  6. interrupt or suspend computer systems;

    unless an extortion payment is received from or on behalf of the insured organization.
Extra Expense
Extra expense means reasonable and necessary expenses incurred by the insured organization during the period of restoration to minimize, reduce or avoid income loss, over and above those expenses the insured organization would have incurred had no security breach, system failure, dependent security breach or dependent system failure occurred.
Financial Institution
Financial institution means a bank, credit union, saving and loan association, trust company or other licensed financial service, securities broker-dealer, mutual fund, or liquid assets fund or similar investment company where the insured organization maintains a bank account.
Forensic Expenses
Forensic expenses means reasonable and necessary expenses incurred by the insured organization to investigate the source or cause of a business interruption loss.
Fraudulent Instruction

Fraudulent instruction means the transfer, payment or delivery of money or securities by an insured as a result of fraudulent written, electronic, telegraphic, cable, teletype or telephone instructions provided by a third party, that is intended to mislead an insured through the misrepresentation of a material fact which is relied upon in good faith by such insured.

Fraudulent instruction will not include loss arising out of:

  1. fraudulent instructions received by the insured which are not first authenticated via a method other than the original means of request to verify the authenticity or validity of the request;
  2. any actual or alleged use of credit, debit, charge, access, convenience, customer identification or other cards;
  3. any transfer involving a third party who is not a natural person insured, but had authorized access to the insured's authentication mechanism;
  4. the processing of, or the failure to process, credit, check, debit, personal identification number debit, electronic benefit transfers or mobile payments for merchant accounts;
  5. accounting or arithmetical errors or omissions, or the failure, malfunction, inadequacy or illegitimacy of any product or service;
  6. any liability to any third party, or any indirect or consequential loss of any kind;
  7. any legal costs or legal expenses; or
  8. proving or establishing the existence of fraudulent instruction.
Funds Transfer Fraud

Funds transfer fraud means the loss of money or securities contained in a transfer account at a financial institution resulting from fraudulent written, electronic, telegraphic, cable, teletype or telephone instructions by a third party issued to a financial institution directing such institution to transfer, pay or deliver money or securities from any account maintained by the insured organization at such institution, without the insured organization's knowledge or consent.

Funds transfer fraud will not include any loss arising out of:

  1. the type or kind covered by the insured organization's financial institution bond or commercial crime policy;
  2. any actual or alleged fraudulent, dishonest or criminal act or omission by, or involving, any natural person insured;
  3. any indirect or consequential loss of any kind;
  4. punitive, exemplary or multiplied damages of any kind or any fines, penalties or loss of any tax benefit;
  5. any liability to any third party, except for direct compensatory damages arising directly from funds transfer fraud;
  6. any legal costs or legal expenses; or proving or establishing the existence of funds transfer fraud;
  7. the theft, disappearance, destruction of, unauthorized access to, or unauthorized use of confidential information, including a PIN or security code;
  8. any forged, altered or fraudulent negotiable instruments, securities, documents or instructions; or
  9. any actual or alleged use of credit, debit, charge, access, convenience or other cards or the information contained on such cards.
Income Loss

Income loss means an amount equal to:

  1. net profit or loss before interest and tax that the insured organization would have earned or incurred; and
  2. continuing normal operating expenses incurred by the insured organization (including payroll), but only to the extent that such operating expenses must necessarily continue during the period of restoration.
Individual Contractor
Individual contractor means any natural person who performs labor or service for the insured organization pursuant to a written contract or agreement with the insured organization. The status of an individual as an individual contractor will be determined as of the date of an alleged act, error or omission by any such individual contractor.
Insured

Insured means:

  1. the named insured, and solely with respect to the Data & Network Liability, Breach Response, Regulatory Defense & Penalties and Payment Card Liabilities & Costs insuring agreements, any subsidiaries of the named insured (together the “insured organization”);
  2. an employee or volunteer worker of the named insured (or the insured organization if applicable) but only while acting within the scope of his or her duties as such;
  3. if the named insured is a joint venture or partnership, any partner or member with respect to his or her liability as such;
  4. if the named insured is other than an individual, partnership or joint venture, any executive officer, director, stockholder, medical director, manager, administrator or employed physician of the organization so designated while acting within the scope of his or her duties as such. However, in relation to the Professional Liability, General Liability, Products/Completed Operations Liability, Fire Legal Liability and Medical Payments insuring agreements, coverage for any employed physician.
  5. any person who previously qualified as an insured under the Medical Payments insuring agreement prior to the termination of the required relationship with the named insured, but solely with respect to:
    1. the Professional Liability insuring agreement, with respect to professional services performed on behalf of the named insured;
    2. the General Liability, with respect to Products/Completed Operations Liability, Fire Legal Liability and Medical Payments insuring agreements, an accident arising solely out of the named insured’s products or operations occurring prior to the termination of the required relationship with the named insured;
    3. the Data & Network Liability, Breach Response, Regulatory Defense & Penalties and Payment Card Liability & Costs insuring agreements, with respect to the performance of his or her duties as such on behalf of the insured organization;
    4. the Employee Benefits Liability insuring agreements, with respect to administration of the insured’s employee benefits program.
  6. in relation to the Professional Liability, General Liability, Products/Completed Operations Liability, Fire Legal Liability and Medical Payments insuring agreements, any independent contractor and/or agent of the named insured. If the independent contractor is a physician, coverage is contingent on any such physician being an employed physician.
  7. in relation to part 1. of the General Liability insuring agreement, any landlord, owner, or property manager of the designated premises; or any tradeshow or convention sponsor or operator; or any lessor of equipment. However, coverage provided to these insureds, shall apply solely:
    1. to claims first made against the insured during the policy period or any extended reporting period (if applicable);
    2. for claims arising out the named insured’s occupancy of, or failure to maintain the designated premises, but solely with respect to the products, goods or operations of the named insured and only if liability for such claim is determined to be solely the negligence or responsibility of the named insured; and
    3. for accidents at, on or upon that portion of the designated premises which is occupied by the named insured and taking place during the term of the named insured’s lease/occupancy of such designated premises.
  8. in relation to parts 2. and 3 of the General Liability insuring agreement:
    1. The named insured;
    2. Any other person using a hired automobile with the named insured’s permission solely when such hired automobile is being used for the insured’s business purposes.
    3. With respect to a non-owned automobile, any partner, executive officer, employee or volunteer of the insured solely when such non-owned automobile is being used for the insured’s business purposes.
    4. Any other person or organization, but only with respect to their liability because of any acts or omission of an insured under parts (a), (b), or (c) above.
  9. any entity for which the insured has assumed such entity’s liability in a written contract or agreement (an “additional insured”) that is also named in a claim if all of the following conditions are met:
    1. The claim against the additional insured seeks damages for which the insured has assumed liability;
    2. This Insurance applies to such liability assumed by the insured;
    3. The obligation to defend the additional insured has also been assumed by the insured in the same contract or agreement;
    4. The allegations in the claim and the information known about the incident are such that no conflict appears to exist between the interests of the insured and the interests of the additional insured;
    5. The additional insured and the insured ask us to conduct and control the defense of that additional insured against such claim and agree that we can assign the same counsel to defend the insured and the additional insured;
    6. The additional insured agrees in writing to:
      1. Cooperate with us in the investigation, settlement or defense of the claim;
      2. Immediately send us copies of any demands, notices, summonses or legal papers received in connection with the claim;
      3. Notify any other insurer whose coverage is available to the additional insured; and
      4. Cooperate with us with respect to coordinating other applicable insurance available to the additional insured; and
    7. The additional insured provides us with written authorization to:
      1. Obtain records and other information related to the claim; and
      2. Conduct and control the defense of the additional insured in such claim.
Insured Organization
Insured organization means the named insured and solely with respect to the Data & Network Liability, Breach Response, Regulatory Defense & Penalties and Payment Card Liabilities & Costs insuring agreements, any subsidiaries of the named insured.
Loss

Loss means breach response services, business interruption loss, claims expenses, criminal reward funds, cyber extortion loss, damages, data recovery costs, dependent business loss, PCI fines and expenses and costs, penalties, loss covered under the eCrime insuring agreement and any other amounts covered under this Policy.

Multiple losses arising from the same or a series of related, repeated or continuing acts, errors, omissions or events will be considered a single loss for the purposes of this Policy.

With respect to the Breach Response and First Party loss insuring agreements, all acts, errors, omissions or events (or series of related, repeated or continuing acts, errors, omissions or events) giving rise to a loss or multiple losses in connection with such insuring agreements will be deemed to have been discovered at the time the first such act, error, omission or event is discovered.

Media Liability

Media liability means one or more of the following acts committed by, or on behalf of, the insured organization in the course of creating, displaying, broadcasting, disseminating or releasing media material to the public:

  1. defamation, libel, slander, product disparagement, trade libel, infliction of emotional distress, outrage, outrageous conduct, or other tort related to disparagement or harm to the reputation or character of any person or organization;
  2. a violation of the rights of privacy of an individual, including false light, intrusion upon seclusion and public disclosure of private facts;
  3. invasion or interference with an individual's right of publicity, including commercial appropriation of name, persona, voice or likeness;
  4. plagiarism, piracy, or misappropriation of ideas under implied contract;
  5. infringement of copyright;
  6. infringement of domain name, trademark, trade name, trade dress, logo, title, metatag, or slogan, service mark or service name;
  7. improper deep-linking or framing;
  8. false arrest, detention or imprisonment;
  9. invasion of or interference with any right to private occupancy, including trespass, wrongful entry or eviction; or
  10. unfair competition, if alleged in conjunction with any of the acts listed in parts 5. or 6. above.
Media Material
Media material means any information, including words, sounds, numbers, images or graphics, but will not include computer software or the actual goods, products or services described, illustrated or displayed in such media material.
Merchant Services Agreement
Merchant services agreement means any agreement between an insured and a financial institution, credit/debit card company, credit/debit card processor or independent service operator enabling an insured to accept credit card, debit card, prepaid card or other payment cards for payments or donations.
Money
Money means a medium of exchange in current use authorized or adopted by a domestic or foreign government as a part of its currency.
Named Insured
Named insured means the named insured listed in the Declarations.
Notified Individuals Threshold
Notified individuals threshold means the number of individual persons listed in the Declarations.
PCI Fines and Expenses and Costs
PCI fines and expenses and costs means the monetary amount owed by the insured organization under the terms of a merchant services agreement as a direct result of a suspected data breach. With the prior consent of the Underwriters, PCI fines and expenses and costs includes reasonable and necessary legal costs and expenses incurred by the insured organization to appeal or negotiate an assessment of such monetary amount. PCI fines and expenses and costs will not include any charge backs, interchange fees, discount fees or other fees unrelated to a data breach.
Penalties

Penalties means:

  1. any monetary civil fine or penalty payable to a governmental entity that was imposed in a regulatory proceeding; and
  2. amounts which the insured is legally obligated to deposit in a fund as equitable relief for the payment of consumer claims due to an adverse judgment or settlement of a regulatory proceeding (including such amounts required to be paid into a "Consumer Redress Fund");

    but will not include: (a) costs to remediate or improve computer systems; (b) costs to establish, implement, maintain, improve or remediate security or privacy practices, procedures, programs or policies; (c) audit, assessment, compliance or reporting costs; or (d) costs to protect the confidentiality, integrity and/or security of personally identifiable information or other information.

    The insurability of penalties will be in accordance with the law in the applicable venue that most favors coverage for such penalties.
Period of Restoration
Period of restoration means the 180-day period of time that begins upon the actual and necessary interruption of the insured organization's business operations.
Personally Identifiable Information

Personally identifiable information means:

  1. any information concerning an individual that is defined as personal information under any breach notice law; and
  2. an individual's drivers license or state identification number, social security number, unpublished telephone number, and credit, debit or other financial account numbers in combination with associated security codes, access codes, passwords or PINs; if such information allows an individual to be uniquely and reliably identified or contacted or allows access to the individual's financial account or medical record information.

    but will not include information that is lawfully made available to the general public.
Policy Period
Policy period means the period of time between the inception date listed in the Declarations and the effective date of termination, expiration or cancellation of this Policy and specifically excludes any Optional Extension Period or any prior policy period or renewal period.
Privacy Policy
Privacy policy means the insured organization's public declaration of its policy for collection, use, disclosure, sharing, dissemination and correction or supplementation of, and access to personally identifiable information.
Regulatory Proceeding
Regulatory proceeding means a request for information, civil investigative demand, or civil proceeding brought by or on behalf of any federal, state, local or foreign governmental entity in such entity's regulatory or official capacity.
Securities
Securities means negotiable and non-negotiable instruments or contracts representing either money or tangible property that has intrinsic value.
Security Breach

Security breach means a failure of computer security to prevent:

  1. unauthorized access or use of computer systems, including unauthorized access or use resulting from the theft of a password from computer systems or from any insured;
  2. a denial of service attack affecting computer systems;
  3. with respect to coverage under the Liability insuring agreements, a denial of service attack affecting computer systems that are not owned, operated or controlled by an insured; or
  4. infection of computer systems by malicious code or transmission of malicious code from computer systems.
Subsidiary

Subsidiary means any entity:

  1. which, on or prior to the inception date of this Policy, the named insured owns, directly or indirectly, more than 50% of the outstanding voting securities ("Management Control"); and
  2. which the named insured acquires Management Control after the inception date of this Policy; provided that:
    1. the revenues of such entity do not exceed 15% of the named insured's annual revenues; or
    2. if the revenues of such entity exceed 15% of the named insured's annual revenues, then coverage under this Policy will be afforded for a period of 60 days, but only for any claim that arises out of any act, error, omission, incident or event first occurring after the entity becomes so owned. Coverage beyond such 60 day period will only be available if the named insured gives the Underwriters written notice of the acquisition, obtains the written consent of Underwriters to extend coverage to the entity beyond such 60 day period and agrees to pay any additional premium required by Underwriters.

This Policy provides coverage only for acts, errors, omissions, incidents or events that occur while the named insured has Management Control over an entity.

System Failure

System failure means an unintentional and unplanned interruption of computer systems.

System failure will not include any interruption of computer systems resulting from (i) a security breach, or (ii) the interruption of any third party computer system.

Telephone Fraud
Telephone fraud means the act of a third party gaining access to and using the insured organization's telephone system in an unauthorized manner.
Third Party Information
Third party information means any trade secret, data, design, interpretation, forecast, formula, method, practice, credit or debit card magnetic strip information, process, record, report or other item of information of a third party not insured under this Policy which is not available to the general public.
Transfer Account
Transfer account means an account maintained by the insured organization at a financial institution from which the insured organization can initiate the transfer, payment or delivery of money or securities.
Unauthorized Access
Unauthorized access or use means the gaining of access to or use of computer systems by an unauthorized person(s) or the use of computer systems in an unauthorized manner.
Unauthorized Disclosure
Unauthorized disclosure means the disclosure of (including disclosure resulting from phishing) or access to information in a manner that is not authorized by the insured organization and is without knowledge of, consent or acquiescence of any member of the control group.
Waiting Period
Waiting period means the period of time that begins upon the actual interruption of the insured organization's business operations caused by a security breach, system failure, dependent security breach or dependent system failure, and ends after the elapse of the number of hours listed as the waiting period in the Declarations.

Key definitions and guidance

Policy wording

{{Income loss}} means an amount equal to:

  1. net profit or loss before interest and tax that the insured organization would have earned or incurred; and
  2. continuing normal operating expenses incurred by the insured organization (including payroll), but only to the extent that such operating expenses must necessarily continue during the period of restoration. 
Policy guidance

{{Income loss}} involves the quantifiable financial impact to a business caused by a covered cyber event, focused on impact to revenues or sales. {{Income loss}} is often measured using outside forensic accounting experts, and the policy will cover the costs for certain of these amounts, up to a specified limit. 

The starting point for measuring income loss is to assess what revenue was lost (and not made up) because of the interruption in operations caused by the covered cyber event. If you have all of the same revenue to cover your normal operating expenses, then there is no Income Loss under this definition – although there may be {{extra expense}} that was incurred to avoid an income loss or {{forensic expense}} or data recovery costs incurred in connection with a covered cyber event.   

If there was a decrease in revenue during the period of restoration caused by a covered cyber event, the next step after quantifying that impact is to determine how the decrease in revenue affected the company’s bottom line. These impacts can manifest in two ways: 

  1. The company may lose a certain amount of net profit for each dollar of revenue lost.
  2. If a company loses sales, in addition to losing profit for each sale, the company also may not receive revenue that is used to pay its fixed operating expenses that cannot be avoided (such as unavoidable payroll, rent, taxes, etc.).   

While we aim to understand how your unique business works, our forensic accounting experts apply Generally Accepted Accounting Principles methodology to measure your potential loss. 

Amounts that are not included in the {{income loss}} definition include: 

  • Expenses that are above-and-beyond normal operating expenses (although such amounts may be covered elsewhere under the policy, such as for extra expense or data recovery costs).
  • Normal operating expenses that are not necessary to continue, such as for outsourced services that are not necessary to continue (such as cleaning expenses which are not required for an office that is temporarily shut down).
  • Variable or non-continuing expenses, such as cost of goods sold or costs of supplies.
  • Sales that are delayed but not lost.
Policy wording

{{Extra expense}} means reasonable and necessary expenses incurred by the {{insured organization}} during the {{period of restoration}} to minimize, reduce or avoid {{income loss}}, over and above those expenses the {{insured organization}} would have incurred had no {{security breach}}, {{system failure}}, {{dependent security breach}} or {{dependent system failure}} occurred.

Policy guidance

{{Extra expense}} includes certain amounts incurred to minimize, reduce or avoid {{income loss}}, provided that such amounts are over and above those expenses the {{insured organization}} would have incurred had no covered cyber event occurred, provided that those amounts are actually sustained during the {{period of restoration}} as a result of the actual interruption of the {{insured organization}}’s business operations caused by a covered cyber event.   

Examples of {{extra expense}} include:  

  • Overtime (beyond normal overtime) paid to employees who work additional shifts to maintain business operations for a company.
  • Incident travel expenses or mileage paid for employees working on responding to the incident to maintain business operations.
  • Meals purchased for employees or contractors directly involved in responding to the covered cyber event. 
  • Costs for an outside consultant to create temporary work-arounds while other recovery efforts are ongoing.
  • Premium costs for expedited shipping made necessary from outage.
  • Costs of substitute products or services necessary to meet customer demand. 

Examples of amounts that are not {{extra expense}}s include: 

  • Amounts paid for hardware (except to the extent the policy expressly provides coverage for hardware and only on the terms specified by the policy).
  • Ordinary payroll expenses (although such expenses might be covered within {{income loss}}).
  • Amounts paid to remediate network security.
  • Prepaid or extended services.
  • Service credits.
  • Costs or expenses caused by an event, but which were not incurred to minimize, reduce, or avoid Income Loss.  
Policy wording

{{Forensic expenses}} means reasonable and necessary expenses incurred by the {{insured organization}} to investigate the source or cause of a {{business interruption loss}}. 

Policy guidance

{{Forensic expenses}} includes certain amounts incurred to investigate an interruption, provided that those amounts are actually sustained during the {{period of restoration}} as a result of the actual interruption of the {{insured organization}}’s business operations caused by a {{security breach}} or {{system failure}}.  

Examples of {{forensic expenses}} include: 

  • Overtime (beyond normal overtime) paid to employees who work additional shifts to investigate a covered cyber event.
  • Costs for an outside computer forensic consultant retained to focus on an outage, apart from the investigation work covered under the Breach Response Services coverage. 

The information contained on these web pages (including, but not limited to, examples of claims, loss scenarios and guidance) are offered only for discussion and illustration purposes. The information contained herein is not to be relied on in any particular situation when pursuing coverage. Coverage depends on applicable law and the actual facts of each incident, claim or loss, and the terms, conditions and exclusions of each individual policy. Please refer to theapplicable policy for a description of the scope and limitations of coverage contained in that policy. Policy language may vary and certain terms may not be available in all jurisdictions.