SlideShare a Scribd company logo
FailSafe®
Overview
Why your technology clients need FailSafe
Technology is integral to the operation of most busi-
nesses today. When technology fails, the financial
impacts can be significant, and the companies
affected often look to their technology product or
service providers for compensation. Unfortunately,
traditional liability policies are not designed to
respond to pure financial claims. Consider what
would happen if your technology client were found
legally liable for a financial loss because:
• A glitch in their software caused their client
to lose a month’s worth of billing data
• Equipment they installed caused their customer
to be unable to receive online orders for 48 hours
• Their cloud-based data services failed to backup
critical data that a customer cannot recreate
• The website they designed for a customer too
closely resembled its key competitor’s site
In situations like these, you want to know that your
technology client is covered. At The Hartford, we
believe that professional liability is an essential part of
a comprehensive insurance program for all technology
companies. That’s why we developed the FailSafe
Technology Liability Product Suite. FailSafe addresses
the errors and omissions (E&O) exposures for technol-
ogy companies of all sizes and, in conjunction with
The Hartford’s standard lines solutions, can provide
360° of Protection for your technology clients.
The FailSafe product suite
FailSafe MEGA®—an E&O coverage part—is available
exclusively to technology companies that purchase
The Hartford’s Spectrum® Business Owner’s Policy.*
You can submit and rate FailSafe MEGA through our
online ICON submission system.
FailSafe MEGA features:
• Breach of warranty or representation coverage
with No Contractual Liability Exclusion
• Security coverage, specifically failure to prevent:
» Denial/disruption of service
» Unauthorized access to, unauthorized use of,
repudiation of access to, tampering with or
introduction of malicious code into firmware,
data, software, systems or networks
» Identity theft or disclosure of nonpublic
personal information (including lawsuits from
employees or independent contractors)
» Disclosure of third-party nonpublic corporate
information
• Coverage for negligently supervised rogue employees
• Coverage extension beyond insured’s products/
services to include the insured’s own computer sys-
tem and network activities
• "Most favorable venue" for punitive, exemplary and
multiplied damages, where applicable
• Insured has full right to object to settlement with
softened hammer clause of 50%
• Computer system and network activities of insured
fully integrated into insuring agreement
• Coverage limits from $300,000 to $2 million through
ICON. Up to $5 million in capacity is available through
your Technology & Life Science Practice underwriter
• Affordable minimum premiums starting at $600
* FailSafe MEGA is available to companies with up to $15
million in annual sales–$10 million maximum sales per location
and $10 million maximum property values per location.
FailSafe GIGA®—a stand-alone E&O policy—is
available to technology companies of all sizes.
Technology & Life Science Practice
Agent Guide
continued
Professional liability protection designed exclusively
for technology businesses
FailSafe GIGA features:
• Breach of warranty or representation coverage with
No Contractual Liability Exclusion
• Security coverage, specifically failure to prevent:
» Denial/disruption of service
» Unauthorized access to, unauthorized use of,
repudiation of access to, tampering with or
introduction of malicious code into firmware,
data, software, systems or networks
» Identify theft or disclosure of nonpublic personal
information (including lawsuits from employees
or independent contractors)
» Disclosure of third-party nonpublic corporate
information
• First-party data privacy and cyber extortion
expense coverage (including voluntary notification
and credit monitoring expenses)
• Coverage for negligently supervised rogue employees
• Coverage extension beyond insured’s products/ser-
vices to include the insured’s own computer system
and network activities
• "Most favorable venue" for punitive, exemplary and
multiplied damages, where applicable
• Insured has full right to object to settlement with
softened hammer clause of 50%
• Computer system and network activities of insured
fully integrated into insuring agreement
• Enterprise-wide services coverage is available
• Limits up $15 million are available for other coverages
• Affordable minimum premiums start at $700.
» Intellectual property & personal injury available
by endorsement
FailSafe TERA®—The Hartford’s most robust profes-
sional liability product for technology companies
includes all of the E&O coverage afforded under the
FailSafe GIGA product, plus the following expanded
peril coverage offerings:
• Intellectual property
» Copyright and trademark infringement
including coverage for software code
» Plagiarism
» Misappropriation of ideas under implied contract
» Piracy as it directly relates to copyright/trade-
mark infringement
» Misuse of intellectual property right in content,
if such misuse results in copyright/trademark
infringement or dilution, plagiarism, misappro-
priation of ideas under implied contract
• Personal injury
» Libel, slander and defamation when caused
by content
» Invasion of privacy, including false light and
public disclosure of private facts, wrongful
entry or eviction; and malicious prosecution
FailSafe features
• Full integration of all applicable liability coverage
grants (E&O, security, personal injury, intellectual
property) into a single insuring agreement
» Minimize coverage concerns associated with
modular coverage grants
• Claims made policy
• Defense within the limits
• Specified coverage for independent contractors
and clients
• Universal territory coverage (for worldwide glitches
and suits)
• Policy is not subject to audit
Types of companies that need FailSafe
FailSafe can provide coverage to a broad array of
technology companies, including:
• Software & information technology
» Packaged or custom software developers
» Website designers
» Computer consultants
» Systems integrators
» Federal government IT contractors
• Hardware & electronics manufacturing
» Electronic components
» Consumer electronics
» Computers
» Communications equipment
• Telecommunications & integrated communication
services
» Local exchange carriers
» Long distance telecom carriers
» Internet/application service providers
» Website hosting
Learn more
Visit www.thehartford.com/technology for more
information about our appetite and the coverage
The Hartford can provide to your Technology &
Life Science clients.
For assistance on account opportunities, contact your
Technology & Life Science Practice underwriter directly
or email us at techpracticegroup@thehartford.com to
identify an underwriter near you.
The description herein is a summary only and may not apply under all circumstances. Coverage is provided by the member companies of
The Hartford Financial Services Group Inc. and may not be available in all states. For a complete description of coverage terms and conditions,
refer to the insurance policy. In the event of a loss, the terms and conditions of the policy issued will determine the coverage provided. Coverage
may not be available in all states. All information and representations herein are as of November 2013.
13-0451 © November 2013 The Hartford Financial Services Group, Inc. All rights reserved.

More Related Content

What's hot

Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Sean Bradley
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 
Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computinggirish0984
 
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsA Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsKirsty Donovan
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 

What's hot (20)

Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
IoT_Implemented
IoT_ImplementedIoT_Implemented
IoT_Implemented
 
Information Security
Information SecurityInformation Security
Information Security
 
Captive Insurance and Cyber Risk
Captive Insurance and Cyber RiskCaptive Insurance and Cyber Risk
Captive Insurance and Cyber Risk
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computing
 
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' ThreatsA Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 

Viewers also liked

The archived Canadian US Patent Competitive Intelligence Database (2015/9/29)
The archived Canadian US Patent Competitive Intelligence Database (2015/9/29) The archived Canadian US Patent Competitive Intelligence Database (2015/9/29)
The archived Canadian US Patent Competitive Intelligence Database (2015/9/29) Muchiu (Henry) Chang, PhD. Cantab
 
The archived Canadian US Patent Competitive Intelligence Database (2016/5/24)
The archived Canadian US Patent Competitive Intelligence Database (2016/5/24) The archived Canadian US Patent Competitive Intelligence Database (2016/5/24)
The archived Canadian US Patent Competitive Intelligence Database (2016/5/24) Muchiu (Henry) Chang, PhD. Cantab
 
The archived Canadian US Patent Competitive Intelligence Database (2016/7/12)
The archived Canadian US Patent Competitive Intelligence Database (2016/7/12) The archived Canadian US Patent Competitive Intelligence Database (2016/7/12)
The archived Canadian US Patent Competitive Intelligence Database (2016/7/12) Muchiu (Henry) Chang, PhD. Cantab
 
cv pushpak mahalay resume
cv pushpak mahalay resumecv pushpak mahalay resume
cv pushpak mahalay resumePushpak Mahalay
 
1 10idrogo ptw
1 10idrogo ptw1 10idrogo ptw
1 10idrogo ptwNiekT
 
Planificador de proyectos rincon literario cts-12agos15-c cts.docx
Planificador de proyectos  rincon literario cts-12agos15-c cts.docxPlanificador de proyectos  rincon literario cts-12agos15-c cts.docx
Planificador de proyectos rincon literario cts-12agos15-c cts.docxyaneth2015
 
Project overview ok
Project overview okProject overview ok
Project overview okLola Ansaldo
 
Two question essays
Two question essaysTwo question essays
Two question essaysIELTS Edits
 
DUMP-2013 Проектирование интерфейсов - А где же яйца? - Клевакин Денис
DUMP-2013 Проектирование интерфейсов - А где же яйца? - Клевакин ДенисDUMP-2013 Проектирование интерфейсов - А где же яйца? - Клевакин Денис
DUMP-2013 Проектирование интерфейсов - А где же яйца? - Клевакин Денисit-people
 
Resume& Photo- Y.K.Singh. Legal
Resume& Photo- Y.K.Singh. LegalResume& Photo- Y.K.Singh. Legal
Resume& Photo- Y.K.Singh. LegalYK SINGH
 
Dengue and Dengue Hemorrhagic Fever
Dengue and Dengue Hemorrhagic Fever Dengue and Dengue Hemorrhagic Fever
Dengue and Dengue Hemorrhagic Fever Jega Subramaniam
 

Viewers also liked (17)

The archived Canadian US Patent Competitive Intelligence Database (2015/9/29)
The archived Canadian US Patent Competitive Intelligence Database (2015/9/29) The archived Canadian US Patent Competitive Intelligence Database (2015/9/29)
The archived Canadian US Patent Competitive Intelligence Database (2015/9/29)
 
The archived Canadian US Patent Competitive Intelligence Database (2016/5/24)
The archived Canadian US Patent Competitive Intelligence Database (2016/5/24) The archived Canadian US Patent Competitive Intelligence Database (2016/5/24)
The archived Canadian US Patent Competitive Intelligence Database (2016/5/24)
 
The archived Canadian US Patent Competitive Intelligence Database (2016/7/12)
The archived Canadian US Patent Competitive Intelligence Database (2016/7/12) The archived Canadian US Patent Competitive Intelligence Database (2016/7/12)
The archived Canadian US Patent Competitive Intelligence Database (2016/7/12)
 
Digipak analysis 2
Digipak analysis 2Digipak analysis 2
Digipak analysis 2
 
RESUME AJAI
RESUME AJAIRESUME AJAI
RESUME AJAI
 
cv pushpak mahalay resume
cv pushpak mahalay resumecv pushpak mahalay resume
cv pushpak mahalay resume
 
1 10idrogo ptw
1 10idrogo ptw1 10idrogo ptw
1 10idrogo ptw
 
Planificador de proyectos rincon literario cts-12agos15-c cts.docx
Planificador de proyectos  rincon literario cts-12agos15-c cts.docxPlanificador de proyectos  rincon literario cts-12agos15-c cts.docx
Planificador de proyectos rincon literario cts-12agos15-c cts.docx
 
Project overview ok
Project overview okProject overview ok
Project overview ok
 
Two question essays
Two question essaysTwo question essays
Two question essays
 
New Compensation Plan
New Compensation PlanNew Compensation Plan
New Compensation Plan
 
Hypospedias
HypospediasHypospedias
Hypospedias
 
DUMP-2013 Проектирование интерфейсов - А где же яйца? - Клевакин Денис
DUMP-2013 Проектирование интерфейсов - А где же яйца? - Клевакин ДенисDUMP-2013 Проектирование интерфейсов - А где же яйца? - Клевакин Денис
DUMP-2013 Проектирование интерфейсов - А где же яйца? - Клевакин Денис
 
Resume& Photo- Y.K.Singh. Legal
Resume& Photo- Y.K.Singh. LegalResume& Photo- Y.K.Singh. Legal
Resume& Photo- Y.K.Singh. Legal
 
Abstract classes and interfaces
Abstract classes and interfacesAbstract classes and interfaces
Abstract classes and interfaces
 
Dengue and Dengue Hemorrhagic Fever
Dengue and Dengue Hemorrhagic Fever Dengue and Dengue Hemorrhagic Fever
Dengue and Dengue Hemorrhagic Fever
 
Music in Schools
Music in SchoolsMusic in Schools
Music in Schools
 

Similar to Technology & Life Science Practice, FailSafe Overview

TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE Sarah Stogner
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber RisksGraeme Cross
 
Legal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity VulnerabilitiesLegal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity VulnerabilitiesPriyanka Aash
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksMarie Wilcox
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine InsurancePeter Hulyer
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentationlucydavidson
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010simongreaves
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceSecureDocs
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 

Similar to Technology & Life Science Practice, FailSafe Overview (20)

TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Cyber Insurance CLE
Cyber Insurance CLE Cyber Insurance CLE
Cyber Insurance CLE
 
Cyber
Cyber Cyber
Cyber
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber Risks
 
Legal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity VulnerabilitiesLegal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity Vulnerabilities
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine Insurance
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
BC Cyber Select
BC Cyber SelectBC Cyber Select
BC Cyber Select
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & InsuranceCybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 

More from Cary Adler

Fast Facts - Metal Manufacturers
Fast Facts - Metal ManufacturersFast Facts - Metal Manufacturers
Fast Facts - Metal ManufacturersCary Adler
 
Fast Facts - Wholesalers
Fast Facts - WholesalersFast Facts - Wholesalers
Fast Facts - WholesalersCary Adler
 
Fast Facts - Manufacturers
Fast Facts - ManufacturersFast Facts - Manufacturers
Fast Facts - ManufacturersCary Adler
 
Fact Sheet - Advanced Manufacturing
Fact Sheet - Advanced ManufacturingFact Sheet - Advanced Manufacturing
Fact Sheet - Advanced ManufacturingCary Adler
 
Fact Sheet - Apartment
Fact Sheet - ApartmentFact Sheet - Apartment
Fact Sheet - ApartmentCary Adler
 
Fact Sheet - Condominium Association
Fact Sheet - Condominium AssociationFact Sheet - Condominium Association
Fact Sheet - Condominium AssociationCary Adler
 
Restaurants Expanded Appetite
Restaurants Expanded AppetiteRestaurants Expanded Appetite
Restaurants Expanded AppetiteCary Adler
 
Fact Sheet - Restaurants
Fact Sheet - RestaurantsFact Sheet - Restaurants
Fact Sheet - RestaurantsCary Adler
 
DataBreachFlyer
DataBreachFlyerDataBreachFlyer
DataBreachFlyerCary Adler
 
Fact Sheet - Construction
Fact Sheet - ConstructionFact Sheet - Construction
Fact Sheet - ConstructionCary Adler
 

More from Cary Adler (10)

Fast Facts - Metal Manufacturers
Fast Facts - Metal ManufacturersFast Facts - Metal Manufacturers
Fast Facts - Metal Manufacturers
 
Fast Facts - Wholesalers
Fast Facts - WholesalersFast Facts - Wholesalers
Fast Facts - Wholesalers
 
Fast Facts - Manufacturers
Fast Facts - ManufacturersFast Facts - Manufacturers
Fast Facts - Manufacturers
 
Fact Sheet - Advanced Manufacturing
Fact Sheet - Advanced ManufacturingFact Sheet - Advanced Manufacturing
Fact Sheet - Advanced Manufacturing
 
Fact Sheet - Apartment
Fact Sheet - ApartmentFact Sheet - Apartment
Fact Sheet - Apartment
 
Fact Sheet - Condominium Association
Fact Sheet - Condominium AssociationFact Sheet - Condominium Association
Fact Sheet - Condominium Association
 
Restaurants Expanded Appetite
Restaurants Expanded AppetiteRestaurants Expanded Appetite
Restaurants Expanded Appetite
 
Fact Sheet - Restaurants
Fact Sheet - RestaurantsFact Sheet - Restaurants
Fact Sheet - Restaurants
 
DataBreachFlyer
DataBreachFlyerDataBreachFlyer
DataBreachFlyer
 
Fact Sheet - Construction
Fact Sheet - ConstructionFact Sheet - Construction
Fact Sheet - Construction
 

Technology & Life Science Practice, FailSafe Overview

  • 1. FailSafe® Overview Why your technology clients need FailSafe Technology is integral to the operation of most busi- nesses today. When technology fails, the financial impacts can be significant, and the companies affected often look to their technology product or service providers for compensation. Unfortunately, traditional liability policies are not designed to respond to pure financial claims. Consider what would happen if your technology client were found legally liable for a financial loss because: • A glitch in their software caused their client to lose a month’s worth of billing data • Equipment they installed caused their customer to be unable to receive online orders for 48 hours • Their cloud-based data services failed to backup critical data that a customer cannot recreate • The website they designed for a customer too closely resembled its key competitor’s site In situations like these, you want to know that your technology client is covered. At The Hartford, we believe that professional liability is an essential part of a comprehensive insurance program for all technology companies. That’s why we developed the FailSafe Technology Liability Product Suite. FailSafe addresses the errors and omissions (E&O) exposures for technol- ogy companies of all sizes and, in conjunction with The Hartford’s standard lines solutions, can provide 360° of Protection for your technology clients. The FailSafe product suite FailSafe MEGA®—an E&O coverage part—is available exclusively to technology companies that purchase The Hartford’s Spectrum® Business Owner’s Policy.* You can submit and rate FailSafe MEGA through our online ICON submission system. FailSafe MEGA features: • Breach of warranty or representation coverage with No Contractual Liability Exclusion • Security coverage, specifically failure to prevent: » Denial/disruption of service » Unauthorized access to, unauthorized use of, repudiation of access to, tampering with or introduction of malicious code into firmware, data, software, systems or networks » Identity theft or disclosure of nonpublic personal information (including lawsuits from employees or independent contractors) » Disclosure of third-party nonpublic corporate information • Coverage for negligently supervised rogue employees • Coverage extension beyond insured’s products/ services to include the insured’s own computer sys- tem and network activities • "Most favorable venue" for punitive, exemplary and multiplied damages, where applicable • Insured has full right to object to settlement with softened hammer clause of 50% • Computer system and network activities of insured fully integrated into insuring agreement • Coverage limits from $300,000 to $2 million through ICON. Up to $5 million in capacity is available through your Technology & Life Science Practice underwriter • Affordable minimum premiums starting at $600 * FailSafe MEGA is available to companies with up to $15 million in annual sales–$10 million maximum sales per location and $10 million maximum property values per location. FailSafe GIGA®—a stand-alone E&O policy—is available to technology companies of all sizes. Technology & Life Science Practice Agent Guide continued Professional liability protection designed exclusively for technology businesses
  • 2. FailSafe GIGA features: • Breach of warranty or representation coverage with No Contractual Liability Exclusion • Security coverage, specifically failure to prevent: » Denial/disruption of service » Unauthorized access to, unauthorized use of, repudiation of access to, tampering with or introduction of malicious code into firmware, data, software, systems or networks » Identify theft or disclosure of nonpublic personal information (including lawsuits from employees or independent contractors) » Disclosure of third-party nonpublic corporate information • First-party data privacy and cyber extortion expense coverage (including voluntary notification and credit monitoring expenses) • Coverage for negligently supervised rogue employees • Coverage extension beyond insured’s products/ser- vices to include the insured’s own computer system and network activities • "Most favorable venue" for punitive, exemplary and multiplied damages, where applicable • Insured has full right to object to settlement with softened hammer clause of 50% • Computer system and network activities of insured fully integrated into insuring agreement • Enterprise-wide services coverage is available • Limits up $15 million are available for other coverages • Affordable minimum premiums start at $700. » Intellectual property & personal injury available by endorsement FailSafe TERA®—The Hartford’s most robust profes- sional liability product for technology companies includes all of the E&O coverage afforded under the FailSafe GIGA product, plus the following expanded peril coverage offerings: • Intellectual property » Copyright and trademark infringement including coverage for software code » Plagiarism » Misappropriation of ideas under implied contract » Piracy as it directly relates to copyright/trade- mark infringement » Misuse of intellectual property right in content, if such misuse results in copyright/trademark infringement or dilution, plagiarism, misappro- priation of ideas under implied contract • Personal injury » Libel, slander and defamation when caused by content » Invasion of privacy, including false light and public disclosure of private facts, wrongful entry or eviction; and malicious prosecution FailSafe features • Full integration of all applicable liability coverage grants (E&O, security, personal injury, intellectual property) into a single insuring agreement » Minimize coverage concerns associated with modular coverage grants • Claims made policy • Defense within the limits • Specified coverage for independent contractors and clients • Universal territory coverage (for worldwide glitches and suits) • Policy is not subject to audit Types of companies that need FailSafe FailSafe can provide coverage to a broad array of technology companies, including: • Software & information technology » Packaged or custom software developers » Website designers » Computer consultants » Systems integrators » Federal government IT contractors • Hardware & electronics manufacturing » Electronic components » Consumer electronics » Computers » Communications equipment • Telecommunications & integrated communication services » Local exchange carriers » Long distance telecom carriers » Internet/application service providers » Website hosting Learn more Visit www.thehartford.com/technology for more information about our appetite and the coverage The Hartford can provide to your Technology & Life Science clients. For assistance on account opportunities, contact your Technology & Life Science Practice underwriter directly or email us at techpracticegroup@thehartford.com to identify an underwriter near you. The description herein is a summary only and may not apply under all circumstances. Coverage is provided by the member companies of The Hartford Financial Services Group Inc. and may not be available in all states. For a complete description of coverage terms and conditions, refer to the insurance policy. In the event of a loss, the terms and conditions of the policy issued will determine the coverage provided. Coverage may not be available in all states. All information and representations herein are as of November 2013. 13-0451 © November 2013 The Hartford Financial Services Group, Inc. All rights reserved.