Volume 142

OCTOBER 2018

Return to main screen

PF&M ANALYSIS:

CYBER POLICY COMPARISON CHART – MEDIUM TO LARGE ENTITIES

(August 2018)

This form should be useful for documenting the differences among companies that offer cyber insurance policies to medium to large entities. It can be used to record special endorsement limits, exclusions, other improvements, or any restrictions that apply.

Using this chart is not a statement of coverage; it is a tool to help you and your client understand key differences. It is important to note that it will not highlight every difference that could impact coverage.

 

COVERAGE

GENERIC

COMPANY A

COMPANY B

COMPANY C

Liability – Claims-made

No – ins agree 1

Yes – ins agree 2,3

 

 

 

All other – Discovery

Yes

 

 

 

INSURING AGREEMENT

 

 

 

 

Website publishing liability

Optional

 

 

 

Security breach liability

Optional

 

 

 

Programming errors and omissions liability

Optional

 

 

 

Replacement or restoration of electronic data

Optional

 

 

 

Extortion Threats

Optional

 

 

 

Business income and extra expense

Optional

 

 

 

Public Relations Expense

Optional

 

 

 

Security Breach Expense

Optional

 

 

 

LIMITS OF INSURANCE

 

COMPANY A

COMPANY B

COMPANY C

Policy aggregate limit

Yes

 

 

 

Insuring agreements aggregate

Yes

 

 

 

DEDUCTIBLE

 

COMPANY A

COMPANY B

COMPANY C

Dollar or percentage

Dollar

 

 

 

Liability deductible must be self-insured

Yes

 

 

 

Highest deductible for multiple

Yes

 

 

 

DEFENSE AND SETTLEMENT

 

COMPANY A

COMPANY B

COMPANY C

Duty to defend

Yes

 

 

 

Right to defend

Yes

 

 

 

Regulatory actions

Yes

 

 

 

Consent to settle

Yes

 

 

 

Consequences of not consenting to settle

Yes

 

 

 

EXCLUSIONS

 

COMPANY A

COMPANY B

COMPANY C

Acts of nature

Yes

 

 

 

War

Yes

 

 

 

Biological/nuclear release

Yes

 

 

 

Bodily injury/Property damage

Yes

 

 

 

Computer system failure

Yes

 

 

 

Lack of access to electronic data

Yes

 

 

 

Insufficient capacity

Yes

 

 

 

Activity overload

Yes

 

 

 

Network disruption

Yes

 

 

 

Power source fluctuation

Yes

 

 

 

RICO violations

Yes

 

 

 

Satellite failure or malfunction

Yes

 

 

 

Publishing false material

Yes

 

 

 

Contract or agreement

Yes

 

 

 

Patent or trade secret violation

Yes

 

 

 

Pollution

Yes

 

 

 

Prior claim or suit

Yes

 

 

 

Employment-related practices

Yes

 

 

 

Wrongful acts prior to retroactive date

Yes

 

 

 

Knowledge prior to effective date

Yes

 

 

 

Prior policy claim

Yes

 

 

 

Criminal acts

Yes

 

 

 

Willful violations

Yes

 

 

 

Governmental/regulatory action

Yes

 

 

 

Poor upkeep of computer system

Yes

 

 

 

Insured vs insured claim

Yes

 

 

 

Unintentional entry-related E&O

Yes

 

 

 

Contract-related fines, penalties

Yes

 

 

 

CONDITIONS

 

COMPANY A

COMPANY B

COMPANY C

Cancellation

Yes

 

 

 

Changes

Yes

 

 

 

Examination of books/records

Yes

 

 

 

Inspections and surveys

Yes

 

 

 

Premiums

Yes

 

 

 

Transfer of rights and duties

Yes

 

 

 

Subrogation

Yes

 

 

 

Bankruptcy

Yes

 

 

 

Representations

Yes

 

 

 

Changes in exposures

Yes

 

 

 

Other insurance

Yes

 

 

 

Legal action against insurer

Yes

 

 

 

Separation of insureds

Yes

 

 

 

Duties in event of claim or loss

Yes

 

 

 

Valuation settlement

Yes

 

 

 

Extended period to discover loss

Yes

 

 

 

Extended reporting periods

Yes

 

 

 

Confidentiality

Yes

 

 

 

Territory

Yes

 

 

 

Policy bridge – discovery replacing sustained

Yes

 

 

 

DEFINITIONS

 

COMPANY A

COMPANY B

COMPANY C

Application

Yes

 

 

 

Business income

Yes

 

 

 

Claim

Yes

 

 

 

Computer program

Yes

 

 

 

Computer system

Yes

 

 

 

Cyber incident

Yes

 

 

 

Defense expenses

Yes

 

 

 

Discover

Yes

 

 

 

E-commerce

Yes

 

 

 

Electronic data

Yes

 

 

 

Employee

Yes

 

 

 

Extortion expenses

Yes

 

 

 

Extortion threat

Yes

 

 

 

Extra expense

Yes

 

 

 

Hacker

Yes

 

 

 

Informant

Yes

 

 

 

Insured

Yes

 

 

 

Interrelated wrong acts

Yes

 

 

 

Interruption

Yes

 

 

 

Loss

Yes

 

 

 

Named insured

Yes

 

 

 

Negative publicity

Yes

 

 

 

Personal information

Yes

 

 

 

Pollutants

Yes

 

 

 

Privacy regulations

Yes

 

 

 

Public relations expense

Yes

 

 

 

Ransomware

Yes

 

 

 

Regulatory proceeding

Yes

 

 

 

Security breach

Yes

 

 

 

Security breach expenses

Yes

 

 

 

Subsidiary

Yes

 

 

 

Suit

Yes

 

 

 

Third party

Yes

 

 

 

Virus

Yes

 

 

 

Wrongful act

Yes

 

 

 

ENDORSEMENTS

 

COMPANY A

COMPANY B

COMPANY C