Page 87 - Hollard Private Portfolio - Version 3.5
P. 87

85
Hollard Private Portfolio – Version 3.5 – 7 May 2024
Cyber insurance
Specific definitions for the Cyber insurance section
The following definitions are used in the Cyber insurance section of this policy.
Child Any financially dependent child as specified in the schedule. Your child includes a
biological child, stepchild, grandchild, a legally fostered child or adopted child who must
be under the age of 18.
Computer systems Any computer, communications system, server, cloud infrastructure, microcontroller,
interconnected electronic, wireless, web, or similar systems (including all hardware,
software, and physical components thereof and the data stored thereon) used to
process data or information in analogue, digital, electronic or wireless format, including
but not limited to associated input and output devices, mobile devices, laptops, tablets,
wearable devices, networking equipment and electronic backup facilities.
This does not include operational technology that monitors or controls devices and
events in business or embedded systems. For example, a monitor system used to change
valves.
Cyber extortion If you receive a legitimate threat or a demand for ransom by a third party to harm your
computer system or if we need to resolve a cyber incident caused by that third party.
Data breach A security breach where someone retrieves, destroys, changes, loses or discloses
personal data unlawfully from your own or outsourced computer system. For example,
someone hacking into your computer system or your email provider to steal personal
data.
Electronic media IT devices that are used to record and store digital data. This includes external drives,
CD-ROMs, DVD-ROMs, magnetic tapes or disks, and USB sticks.
Email spoofing Forging a sender’s address or email header so that the message appears to have been
sent from the legitimate source. For example, changing an email header so that the
email appears to come from your bank.
Express kidnapping The actual abduction and holding of the insured against their will where the victim is
forced to surrender money and/or assets in exchange for their release.
IT infrastructure Communication equipment or facilities that are used to maintain the functioning of
electronic facilities that support computer systems and data.
Legal costs Legal fees including costs for experts, investigations, court appearances, surveys,
examination and procedures that are necessary to defend your case. These legal costs
do not include general expenses such as salaries and overheads.
Lost income Actual net income (income after deductions and tax has been removed) lost for the time
reasonably and necessarily taken off from work but limited to 30 calendar days to fix
your records after a claim event. The lost income for self-employed persons will be based
on the previous year’s tax returns.
Mobile wallet Any virtual wallet that you store money in and which you can use to perform transactions.
This does not include any crypto-currencies, credit bought or earned within a game or
gambling site or a subscription purchased online.
Partner A person who is your permanent life partner and who you have lived with for longer than
12 months, your spouse or civil union partner. Cover only includes your partner if chosen
and shown in your policy schedule.
Personal data Information as defined by applicable data protection laws. This data identifies a person,
for example, a name, identification number, location data including an online identifier
or a physical, genetic, mental, economic, cultural or social identity.
Phishing When someone pretends to be a trustworthy entity in electronic communication to
obtain sensitive information such as usernames, passwords and credit card details.

















































   85   86   87   88   89