SlideShare a Scribd company logo
1 of 8
Download to read offline
All companies have some exposure to cyber risks to
one degree or another. Any business that has data
on third parties or employees should consider their
exposure and, the more voluminous and sensitive the
PII (Personally Identifiable Information), the greater
the potential liability to third parties or employees.
Any company with online sales has a clear exposure,
although even companies without this can be left
unable to trade effectively when they have a failure of
the critical applications within their network. If staff
are unable to access sales/marketing lists, customer
relationship management systems and supply chain
related procurement systems, work can very quickly
grind to a halt, resulting in a sharp drop in profits.
Cyber policies typically provide two main elements
of cover being first party – loss or damage to your
physical assets and third party liability.
First party
First party provides insurance for loss or damage to your digital
assets including the costs incurred for restoring, updating, recreating
or replacing. The type of loss or damage can include computer crime
and computer attacks by third parties, but also accidental damage or
destruction and administrative or operational mistakes by employees
and third party providers.
In addition its possible to extend to include associated risks of
business interruption and extra expense, cyber extortion, reputational
harm.
Third Party – liability to others
If you suffer a security breach on your network, transmit any
malicious code, or if you breach any third party or employee privacy
rights or confidentiality the costs of the subsequent investigation,
defence and civil damages can be significant. It’s possible to insure
these costs under the security and privacy liability section of a cyber
policy. Also its possible to insure investigation and defence costs,
as well as any awards and fines if you are being investigated by any
regulator as a result of a breach.
Notification expenses can also be insured if there is a legal or
regulatory requirement for you to notify any individuals of a security
or privacy breach, we pay for the legal, postage and advertising
expenses involved in this.
For more information regarding cyber insurance please
do not hesitate to contact Shan Budesha at Top Marques
Insurance by email: shan.budesha@topmarques.uk.com
WHY SHOULD WE BE BUYING THIS INSURANCE?
For more information regarding cyber insurance
please contact Shan Budesha at Top Marques Insurance
Email: shan.budesha@topmarques.uk.com

More Related Content

What's hot

Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalVivek Ahuja
 
Ten Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part ITen Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part IRyan K. Hew
 
Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llctbrown230
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsMMMTechLaw
 
Maintaining Data Security during Legal Process Outsourcing
Maintaining Data Security during Legal Process OutsourcingMaintaining Data Security during Legal Process Outsourcing
Maintaining Data Security during Legal Process OutsourcingAcelerar Technologies Pvt. ltd.
 
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud Summit
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud SummitThe Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud Summit
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud SummitShawn Tuma
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementCharles Steve
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINALChris Evans
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryHNI Risk Services
 
Playing Devil’s Advocate to Pass Cycle Examinations
Playing Devil’s Advocate to Pass Cycle ExaminationsPlaying Devil’s Advocate to Pass Cycle Examinations
Playing Devil’s Advocate to Pass Cycle ExaminationsSylvia Scott Attorney
 
Network Security | Computer Science
Network Security | Computer ScienceNetwork Security | Computer Science
Network Security | Computer ScienceTransweb Global Inc
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.Unified11
 
Emerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyEmerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyIAB Canada
 
Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookLumension
 

What's hot (20)

Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
Ten Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part ITen Laws Internet Businesses Should Consider Part I
Ten Laws Internet Businesses Should Consider Part I
 
Madison Consulting & Investments Llc
Madison Consulting & Investments LlcMadison Consulting & Investments Llc
Madison Consulting & Investments Llc
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
 
Maintaining Data Security during Legal Process Outsourcing
Maintaining Data Security during Legal Process OutsourcingMaintaining Data Security during Legal Process Outsourcing
Maintaining Data Security during Legal Process Outsourcing
 
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud Summit
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud SummitThe Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud Summit
The Legal Side of Data Breach and Third Party Risk - IIA 9th Annual Fraud Summit
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
 
Cyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation IndustryCyber Risks Looming in the Transportation Industry
Cyber Risks Looming in the Transportation Industry
 
Playing Devil’s Advocate to Pass Cycle Examinations
Playing Devil’s Advocate to Pass Cycle ExaminationsPlaying Devil’s Advocate to Pass Cycle Examinations
Playing Devil’s Advocate to Pass Cycle Examinations
 
Network Security | Computer Science
Network Security | Computer ScienceNetwork Security | Computer Science
Network Security | Computer Science
 
Capability Statment
Capability StatmentCapability Statment
Capability Statment
 
Ppt by
Ppt by Ppt by
Ppt by
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Cyber Insurance Policy - Understanding the Premiums & Coverages
Cyber Insurance Policy - Understanding the Premiums & CoveragesCyber Insurance Policy - Understanding the Premiums & Coverages
Cyber Insurance Policy - Understanding the Premiums & Coverages
 
Gone Phishing
Gone Phishing Gone Phishing
Gone Phishing
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Emerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your CompanyEmerging Privacy Themes That Will Impact Your Company
Emerging Privacy Themes That Will Impact Your Company
 
Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule Playbook
 

Similar to TMI CYBER INSURANCE BROCHURE

Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Client Briefing - Better information leads to better cyber coverage
Client Briefing - Better information leads to better cyber coverageClient Briefing - Better information leads to better cyber coverage
Client Briefing - Better information leads to better cyber coverageChris Beh
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber RisksGraeme Cross
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011amystewart
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals Richard Brzakala
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015CBIZ, Inc.
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesRichard Rendell
 

Similar to TMI CYBER INSURANCE BROCHURE (20)

Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Client Briefing - Better information leads to better cyber coverage
Client Briefing - Better information leads to better cyber coverageClient Briefing - Better information leads to better cyber coverage
Client Briefing - Better information leads to better cyber coverage
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Cyber
Cyber Cyber
Cyber
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber Risks
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Social Media In 2011
Social Media In 2011Social Media In 2011
Social Media In 2011
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 
Enterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web ServicesEnterprise Ready for Amazon Web Services
Enterprise Ready for Amazon Web Services
 

TMI CYBER INSURANCE BROCHURE

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. All companies have some exposure to cyber risks to one degree or another. Any business that has data on third parties or employees should consider their exposure and, the more voluminous and sensitive the PII (Personally Identifiable Information), the greater the potential liability to third parties or employees. Any company with online sales has a clear exposure, although even companies without this can be left unable to trade effectively when they have a failure of the critical applications within their network. If staff are unable to access sales/marketing lists, customer relationship management systems and supply chain related procurement systems, work can very quickly grind to a halt, resulting in a sharp drop in profits. Cyber policies typically provide two main elements of cover being first party – loss or damage to your physical assets and third party liability. First party First party provides insurance for loss or damage to your digital assets including the costs incurred for restoring, updating, recreating or replacing. The type of loss or damage can include computer crime and computer attacks by third parties, but also accidental damage or destruction and administrative or operational mistakes by employees and third party providers. In addition its possible to extend to include associated risks of business interruption and extra expense, cyber extortion, reputational harm. Third Party – liability to others If you suffer a security breach on your network, transmit any malicious code, or if you breach any third party or employee privacy rights or confidentiality the costs of the subsequent investigation, defence and civil damages can be significant. It’s possible to insure these costs under the security and privacy liability section of a cyber policy. Also its possible to insure investigation and defence costs, as well as any awards and fines if you are being investigated by any regulator as a result of a breach. Notification expenses can also be insured if there is a legal or regulatory requirement for you to notify any individuals of a security or privacy breach, we pay for the legal, postage and advertising expenses involved in this. For more information regarding cyber insurance please do not hesitate to contact Shan Budesha at Top Marques Insurance by email: shan.budesha@topmarques.uk.com WHY SHOULD WE BE BUYING THIS INSURANCE?
  • 8. For more information regarding cyber insurance please contact Shan Budesha at Top Marques Insurance Email: shan.budesha@topmarques.uk.com