Page 86 - Hollard Private Portfolio - Version 3.4
P. 86

 Specific definitions for the Cyber insurance section
The following definitions are used in the Cyber insurance section of this policy.
Child
Computer systems
Cyber extortion Data breach
Electronic media Email spoofing
IT infrastructure Legal costs
Lost income Mobile wallet Partner Personal data Phishing
You
Your financially dependent child under the age of 21, or under 25 years if a full- time student even if they do not reside with you. Cover only includes your children if chosen and shown in your schedule.
Information technology and communications systems which include hardware, IT infrastructure, software and electronic media to manage electronic data.
This does not include operational technology that monitors or controls devices and events in business or embedded systems. For example, a monitor system used to change valves.
If you receive a legitimate threat or a demand for ransom by a third party to harm your computer system or if we need to resolve a cyber incident caused by that third party.
A security breach where someone retrieves, destroys, changes, loses or discloses personal data unlawfully from your own or outsourced computer system. For example, someone hacking into your computer system or your email provider to steal personal data.
IT devices that are used to record and store digital data. This includes external drives, CD-ROMs, DVD-ROMs, magnetic tapes or disks, and USB sticks.
Forging an email header so that the message appears to have been sent from the legitimate source. For example, changing an email header so that the email appears to come from your bank.
Communication equipment or facilities that are used to maintain the functioning of electronic facilities that support computer systems and data.
Legal fees including costs for experts, investigations, court appearances, surveys, examination and procedures that are necessary to defend your case. These legal costs do not include general expenses such as salaries and overheads.
Actual income lost for the time reasonably and necessarily taken off from work to fix your records after a claim event. The lost Income for self-employed persons will be based on the previous year’s tax returns.
Any virtual wallet that you store money in and which you can use to perform transactions. This does not include any crypto-currencies, credit bought or earned within a game or gambling site or a subscription purchased online.
A person who is your permanent life partner who you have lived with for longer than 12 months, your spouse or civil union partner. Cover only includes your partner if chosen and shown in your policy schedule.
Information as defined by applicable data protection laws. This data identifies a person, for example, a name, identification number, location data including an online identifier or a physical, genetic, mental, economic, cultural or social identity.
When someone pretends to be a trustworthy entity in electronic communication to obtain sensitive information such as usernames, passwords and credit card details.
Includes yourself, your partner (if chosen) and a maximum of three children (if chosen and shown in your policy schedule).
Cyber insurance
   84
Hollard Private Portfolio – Version 3.4 – 17 Aug 2023








































































   84   85   86   87   88