Volume 160

APRIL 2020

Return to main screen

PF&M ANALYSIS:

ISO CP 00 10-Building And Personal Property Coverage Form Analysis

SECTION I – INSURING AGREEMENTS

This policy contains six insuring agreements. All are subject to the same single aggregate limit although some are also subject to insuring agreement specific sublimits. All are subject to the same policy level deductible.

The coverage provided is for loss that is the result of one or more of the following:

·         Cyber incident

·         Extortion threat

·         Security breach

·         Claim

Each of the terms above can be found in the Definitions Section and should be reviewed.

Coverage applies only if the loss is discovered either during the policy period or another period of time that is provided within the Condition 15. Extended Period to Discover Loss.

When any of the bulleted items above arise from same circumstances and become a loss under any of the insuring agreements it will be considered to have been discovered during the earliest policy period in which any of those related bulleted items were discovered.

 

Example: On February 1 Marry Me has a denial of service incident. As forensics investigate the incident, it discovers that a security breach that exposes Marry Me’s customers’ confidential information has occurred that is directly related to the denial of service incident. In June, Marry Me receives an extortion threat that the confidential information will not be released unless appropriate payment is provided. All three of these incidents are considered to have been discovered as of February 1.

1.    Security Breach Expense

Loss that is the direct result of a security breach which is discovered during the policy period is covered.

The terms security breach and discovered used in the sentence above are defined in the Section VII Definitions. The term loss is defined within this insuring agreement as security breach expenses. The term security breach expenses is then also defined within the insuring agreement.

Security breach expenses are the following six separate expenses:

·         Forensics

These are the expenses made in order to determine if a security breach occurred or is occurring in the present time. If a breach is detected the following costs are also covered: