Liability: cover cyber damage to third parties
Risk: Data liability and network security
As a business, you are at risk of your IT infrastructure being hacked and data falling into the wrong hands. A hacked IT system can also be severely damaged by criminals. Often, by the way, those criminals are helped by an insider: a (former) employee acting out of profit, displeasure, external pressure or ignorance.
Ensured Guarantees
Our cyber-risk insurance covers defence costs and compensation to third parties resulting from:
- infringements on protecting personal and corporate data
- infringements by an outsourcer when processing data on behalf of your company
- a failing IT system or a security error
- a virus, malware received, etc.
- theft of data (copying), loss of data (deletion), change or damage and disclosure of data
- blocking access to your own information
Does it apply to you?
Your computer system can be hacked too, and your servers also hold sensitive information. And take a moment to check exactly what access rights your employees have in the digital environment. Edward Snowden was once also a regular CIA employee ...
Risk: Multimedia liability
In this digitised world, information can be disseminated faster than ever.
Ensured guarantees
- compensation due to libel, slander, contempt
- compensation due to an unintentional infringement on intellectual property rights (copyright, title, trade name, brand, domain name, etc.)
- damage due to plagiarism, embezzlement of ideas and data
- damage due to violation of privacy and public disclosure of private matters
- damage due to unfair competition in combination with slander and libel
- negligence concerning electronic content
Does it apply to you?
A malicious tweet is typed in an instant. Your employee would not be the first to drag a difficult customer through the mud on social media. Not only have you lost your client, but also a hefty sum in damages. And copyright infringement sometimes lurks in a small corner: plucking texts or images from another site without permission or mention is enough.