Page 75 - Hollard Private Portfolio - Version 3.3
P. 75

 Cyber insurance
  Examples
○ You click on a link in an email or open an attachment which contains malware. The malware installs ransomware on your device and encrypts your data. A ransom demand is received asking you to make payment to decrypt your data.
○ You receive a request to pay a ransom demand, failing which your private photos and texts will be published online
Our cover:
We will cover the costs for IT experts to confirm the validity of the demand and as appropriate try restore your systems and data. If required, we will cover the ransom demand as well as other reasonable costs that may be incurred by you to resolve the incident.
○ Third party liability
– Network security
You can be held legally liable for damages to a third party if you failed to prevent a cyber incident on your computer system or other internet-connected components. We will cover the following expenses after a cyber incident:
• The amounts which you are liable to pay for resultant damages to a third parties’ computer system.
• Legal costs.
• The reasonable costs for an expert to investigate and report the reasons and circumstances of the cyber incident.
○ Data and privacy breach liability
You can be held legally liable for damages to a third party when data breach of personal data occurs or if you failed to comply with the applicable data protection laws. We will cover the following expenses after a data breach incident:
– The claimed amounts which you are legally liable to pay to a third party.
– Legal costs.
– The reasonable costs for an expert to investigate and report the reasons and circumstances of the data breach.
○ Data and privacy breach by a third party
We will cover your legal costs if you claim damages from a third party for a data breach of your personal data. We will pay on condition that the third party acknowledges the data breach event to you in writing or publicly in the media.
 Example
Your device is hacked or infected with malware that causes damage to another person’s device or data. As a result, this person takes legal action against you for the damages they suffered.
 Example
Your device or personal email address is hacked, and personal data of other people is stolen. This information is then used fraudulently. As a result, these people take legal action against you for the damages they suffered.
 Example
A company which stores your information is hacked and as a result, your personal information is stolen and identity theft is committed against you.
Our cover:
We will cover your legal costs to seek damages against the company where your personal information was stolen from.
 Hollard Private Portfolio – Version 3.3 – 9 Feb 2023 73







































































   73   74   75   76   77