Page 112 - Hollard Private Portfolio
P. 112
Cyber insurance
○ Data and privacy breach liability
You can be held legally liable for damages to a third party when data breach of personal data occurs or if you failed to comply with the applicable data protection laws. We will cover the following expenses after a data breach incident:
– The claimed amounts which you are legally liable to pay to a third party.
– Legal costs.
– The reasonable costs for an expert to investigate and report the reasons and circumstances of the data breach.
○ Data and privacy breach by a third party
We will cover your legal costs if you claim damages from a third party for a data breach of your personal data. We will pay on condition that the third party acknowledges the data breach event to you in writing or publicly in the media.
Example
Your device or personal email address is hacked, and personal data of other people is stolen. This information is then used fraudulently. As a result, these people take legal action against you for the damages they suffered.
Example
A company which stores your information is hacked and as a result, your personal information is stolen and identity theft is committed against you.
Our cover:
We will cover your legal costs to seek damages against the company where your personal information was stolen from.
Specific exclusions – What we do not cover
Specific exclusions are in addition to the exclusions set out in the General exclusions section. We will not pay a claim for any of the benefits set out in the Cyber insurance section of this policy that was caused by or related to any of the following specific exclusions:
○ Events which occurred or which you knew could lead to a claim before the cover start date.
○ Failure or interruption of IT infrastructure or related services not under your control such as telecommunication,
internet service, satellite, cable, electricity, gas or water providers.
○ Acts of terrorism. This exclusion does not apply to cyber terrorism where someone damages, disrupts or accesses your computer systems for religious or political purposes, to influence the government or to put the public in fear.
110
Hollard Private Portfolio – Version 3.0.0 – 20 April 2020