Page 89 - Hollard Private Portfolio - Version 3.4
P. 89

 Cyber insurance
  Examples
You browse to a website that installs a programme on your device that encrypts your files, photos and software.
You borrow a memory stick or hard drive which is infected with malware. The malware damages your device and you need to reformat your hard drive, reinstall your operating system and restore all data from your backup.
Your cover
We will cover the costs to restore your data and software and to replace parts of the computer should it be necessary.
○ Identity theft
Identity theft happens when a person, other than your partner or immediate family, illegally uses your identity
document or confidential information relating to your identity.
For the purpose of this clause immediate family means: Your partner, and your and your partner’s parents,
children and siblings.
– Identity theft of personal data over the internet can result in additional expenses and lost income.
– We will cover the following expenses after an identity theft incident if we give our written consent:
▪ Costs to reapply for a loan or credit applications which the credit provider rejected due to a
bad credit rating.
▪ Costs to certify documents for law enforcement agencies, financial institutions or credit agencies.
▪ Telephone calls and postage to amend your records and to reflect your true name or identity.
▪ Credit monitoring with identity theft education and assistance from established providers up to six months.
▪ Cost to reissue the identity document which was used for the identity theft.
– If you become a victim of identity theft, we will cover your expenses and lost income for the time you
take off from work to sort out the identity theft incident. The following conditions apply:
▪ You must report the incident to the police within 72 hours of discovering the identity theft.
▪ You must provide written confirmation from your employer that the lost income will not be reimbursed.
○ Theft of funds
– We will cover the following incidents:
• Unauthorised electronic transaction of money or funds due to a cyber incident or the hacking of your online bank account, bank card or mobile wallet.
• Direct and pure financial loss of your funds resulting from you being an innocent victim of phishing or email spoofing.
The following conditions apply:
• Report the incident to the issuing bank or mobile wallet company within 48 hours of discovering the theft.
• Provide written evidence that the bank or mobile wallet company is not reimbursing your funds.
• Report the incident to the police within 72 hours of discovery and obtain a case number.
 Example
Your personal email account or a company that has your personal information was hacked. Your information is stolen and is used to apply for loans, transact online and participate in tax and medical aid fraud.
Your cover
We will cover the costs from identity theft and any lost income to take time off from work. We will also cover the reasonable costs to reapply for loans, get affidavits certified, make telephone calls, reissue documents used in the identity theft and we will cover credit and identity theft monitoring for up to six months.
 Hollard Private Portfolio – Version 3.4 – 17 Aug 2023 87































































   87   88   89   90   91