Page 71 - Hollard Private Portfolio - Version 3.3
P. 71

 Cyber insurance
  Specific definitions for the Cyber insurance section
The following definitions are used in the Cyber insurance section of this policy.
Child
Computer systems
Cyber extortion Cyber incident Data breach
Electronic media Email spoofing
IT infrastructure Legal costs
Lost income Mobile wallet
Partner Personal data
Phishing You
Your financially dependent child under the age of 21, or under 25 years if a full- time student even if they do not reside with you
Information technology and communications systems which include hardware, IT infrastructure, software and electronic media to manage electronic data
This does not include operational technology that monitors or controls devices and events in business or embedded systems. For example, a monitor system used to change valves
If you receive a legitimate threat or a demand for ransom by a third party to harm your computer system or if we need to resolve a cyber incident caused by that third party
A malicious act that has a negative impact on your computer systems, including hacking, extortion, theft of data or malware
A security breach where someone retrieves, destroys, changes, loses or discloses personal data unlawfully from your own or outsourced computer system. For example, someone hacking into your computer system or your email provider to steal personal data
IT devices that are used to record and store digital data. This includes external drives, CD-ROMs, DVD-ROMs, magnetic tapes or disks, and USB sticks
Forging an email header so that the message appears to have been sent from the legitimate source. For example, changing an email header so that the email appears to come from your bank
Communication equipment or facilities that are used to maintain the functioning of electronic facilities that support computer systems and data
Legal fees including costs for experts, investigations, court appearances, surveys, examination and procedures that are necessary to defend your case. These legal costs do not include general expenses such as salaries and overheads
Actual income lost for the time reasonably and necessarily taken off from work to fix your records after a claim event. The lost Income for self-employed persons will be based on the previous year’s tax returns
Any virtual wallet that you store money in and which you can use to perform transactions. This does not include any crypto-currencies, credit bought or earned within a game or gambling site or a subscription purchased online
A person who is your permanent life partner who you have lived with for longer than 12 months, your spouse or civil union partner
Information as defined by applicable data protection laws. This data identifies a person, for example, a name, identification number, location data including an online identifier or a physical, genetic, mental, economic, cultural or social identity
When someone pretends to be a trustworthy entity in electronic communication to obtain sensitive information such as usernames, passwords and credit card details
Includes yourself, your partner and a maximum of three children
 Hollard Private Portfolio – Version 3.3 – 9 Feb 2023 69







































































   69   70   71   72   73