Our Products

Technology Errors and Omissions

Protecting our customers for costs to defend and resolve liability claims alleging failure to provide their technology service or product eg. breach of contract, avoidance of counter claim, efficacy of product.

Privacy and Security Liability

Protecting our customers for costs to defend and resolve liability claims as a result of a security or privacy event eg. theft or altering of data, virus or malware attack, denial of service attack.

Crisis Management Costs

Covering your costs following a security or privacy event eg. notification costs, credit monitoring costs, public relations costs, call centre costs, forensic analysis costs.

Cyber Extortion

Covering the monies and response costs associated with an extortion demand perpetrated against your network eg. ransomware attacks, threat of denial of service attack, threat to take down key production line.

Cyber Business Interruption

Covering your loss of income following a security or privacy event eg. after theft or altering of data, virus or malware attack, denial of service attack.

Data Restoration

Covering your costs for data restoration and re-creation following a security or privacy event eg. after theft or altering of data, virus or malware attack, denial of service attack.

Multimedia Liability

Protecting our customers for costs to defend and resolve liability claims as a result of a multimedia wrongful act eg. breach of copyright, defamation, plagiarism.

Regulatory Proceedings and Fines

Covering your legal costs and regulatory fines (where legally admissible) following a security or privacy event eg. after theft or altering of data, virus or malware attack, denial of service attack.

PCI DSS Fines

Covering your PCI contractual costs and regulatory fines following a security or privacy event eg. after theft or altering of data, virus or malware attack, denial of service attack.

Reputational Harm

Covering your loss of contract or public relations costs following an adverse media event that is linked to a security or privacy event that you have suffered eg. after theft or altering of data, virus or malware attack, denial of service attack.

Bricking

Covering your costs to reinstate your computer hardware following a security or privacy event eg. after theft or altering of data, virus or malware attack, denial of service attack.

Social Engineering

Covering the fraudulent request of a hacker to you for monetary funds or information to be transferred to them eg. via email, telephone.