Coverage Terms

PERSONAL LINES CYBER ENDORSEMENT

Provides Broad Coverage For:

  • Cyber Attack Expenses, including:
    • Restoration of your computer system to the functionality which existed prior to the attack on your system.
    • Replace your computer system if it’s more feasible.
    • Data Restoration of anything damaged, including personal items such as digital music, video, and Photographs.
  • Ransomware Expenses, Including:
    • Expert Advice to assess and react to a potential or actual extortion event.
    • Payment of Ransom if necessary, including by you when it wasn’t practical for approval.
    • Coverage for related expenses (Restoration, Replacement, and Data Replacement).
  • Identity Theft Coverage:
    • Coverage for Costs associated with ID Theft, including:
      • Access to a Helpline
      • Personal Fraud Specialist
      • Fraud Alerts, Security Freeze, and other Services related to Support you.
  • Cyber Crime:
    • Support You by paying the costs of incurred charges, funds transferred, as well as the replacement of your personal documents.
    • Broad definitions of Cyber Crime include both Credit Card Fraud, as well as Phishing schemes that you might fall victim to.
  • Smart Devices and Wearables:
    • Costs to restoring your smart devices, including wearables as well as connected home devices.
    • Support for Compromised Smart Devices, Connected Home Devices as well as Wearables to minimize future events.
  • Cyber Bullying:
    • Expenses to support you and family members including:
      • Security Consulting Fees
      • Psychiatric Services
      • Lost Wages
  • Online Shopping Fraud:
    • Expenses and Support related to Fake or Fraudulent websites created by third parties in order to get you to purchase goods which will never be delivered to you.

In Addition to the Insurance Policy, you will receive:

  • Identity Theft Protection Services including:
    • 24/7/365 Toll Free Victim Response Center
    • Dedicated Recovery Advocate
    • Personalized Recovery Plan
  • Property Protection Services, Including:
    • Alert Services for:
      • Home Title
      • Property Record Changes
      • Financing Term Changes
      • Identity Theft protection services

1. Limit of Liability & Deductible

Policy Aggregate Limit:                      USD 25,000 – 1,000,000

Deductible:                                        USD 500

CoverageSublimitDeductible
1.A Cyber Attack USD 25,000 USD 500
1.B Ransomware USD 25,000 USD 500
1.A Identity Theft USD 25,000 USD 500
1.A Cyber Theft USD 25,000 USD 500
1.A Smart Devices and Wearables USD 25,000 USD 500

The deductible applies to each and every cyber-attack (1.A;1.E), cyber extortion threat (1.B), identity theft (1.C), credit card fraud or phishing attempt (1.D) and if the costs incurred by you are less than or equal to the deductible, we will not pay for these costs. If the costs incurred from the cyber-attack, cyber extortion threat, identity theft, credit card fraud or phishing attempt exceed the deductible then we will subtract the deductible from this amount and pay the remaining amount up to the Policy Aggregate Limit.

2. Premium

See Contract Allocation Page

3. Notification of Claims

If you have an incident that could trigger any part of this policy, you must immediately telephone the CybeScout 24/7/365 incident response helpline on *** .

You will not incur costs (aside from your standard call charge) for the use of the ESure.AI CyberScout helpline. You will only incur costs if your claim does not exceed the deductible and further actions need to be taken as a result of the cyber- attack, cyber extortion threat, identity theft, credit card fraud or phishing attempt.

Calling the ESure.AI CyberScout number is not a formal notification of a claim to your insurer. ESure.AI CyberScout will indpendently advise you on whether your incident will require a notification to your insurer. Following notification of a potential claim to your insurer which may involve your coverage under this Policy for any cyber extortion threat or ransom monies,  identity theft costs and services, or cyber theft, you must advise and co-operate as necessary with ESure.AI CyberScout and any failure to do so will impact your coverage and any claims that you make under this Policy.

4. Policy Period

Inception Date:  Upon purchase of eSure.AI subscription and successful installation of software.

Expiry Date:  Upon cancellation of eSure.Ai subscription.

INSURING AGREEMENTS

Section 1.A      Cyber Attack

We will pay the reasonable and necessary costs that you incur as a direct result of a cyber-attack carried out by a hacker to:

  1. Restore your computer system to the level of functionality that existed prior to the cyber-attack. Where it is determined that it is not possible to restore your computer system to that level of functionality,, we will only pay for the costs incurred up to the date of such determination;
  2. Replace your computer system if we consider that this is more economical than restoring your computer system;
  3. Retrieve and restore your data to your computer system;
  4. Retrieve and restore your personal digital music, digital photographs and digital video that have been downloaded to your computer system.

We will not pay for:

  1. Any amounts you have paid, or have agreed to pay, as part of any computer system maintenance contract; or
  2. Costs to upgrade or increase the speed, capacity, or functionality of your computer system beyond the level that existed prior to the cyber-attack occurring; or
  3. Costs to re-purchase software, software licenses, programs, digital photographs, music or videos; or
  4. Costs that exceed the value of an equivalent computer system.

Section 1.B      Ransomware 

We will pay reasonable and necessary cyber extortion expenses and ransom monies that you incur as a direct result of a cyber extortion threat.

We will not pay any cyber extortion threat or ransom monies unless you:

  1. Have consulted our expert service provider ESure.AI CyberScout in advance to assess the situation; and
  2. Have obtained our prior written consent before any ransom monies are paid. However, at our reasonable discretion, we may pay for Ransom Monies that were not approved in advance by us if we determine the following:
  1. It was not practical for you to obtain our prior approval; and
  2. If consulted at the time, we would have approved the payment.

 

Section 1.C      Identity Theft

We will pay the identity theft costs and services that you incur solely and directly because of an actual or suspected identity theft.

You must inform our expert service provider ESure.AI CyberScout as soon as reasonably possible once you believe you are a victim of identity theft.

Identity theft does not include costs incurred to a business that is associated with you as a result of the identity theft.

 

Section 1.D      Cyber Theft

We will pay for Cyber Theft solely and directly because of credit card fraud or phishing against you.

All Cyber Theft loss claims must be evaluated by ESure.AI CyberScout to determine whether you or a third party is accountable for the loss.

 

We will not cover Cyber Theft:

  1. If it is reimbursable by your credit card company, bank or other financial institution;
  2. From the unauthorized criminal use of your credit, debit card, or payment or transfer of funds by a member of your family unless you are willing to file a police report and/or press charges against the member of your family;

 

Section 1.E      Smart Devices and Wearables

If you discover that your connected home device has become damaged, altered or corrupted as a result of a cyber-attack by a hacker, we will pay for the cost of restoring this to its condition prior to the cyber-attack.

We will not pay for any connected home device where you have failed to change the default/original password on your connected home device.

We will not pay for:

  1. 1. Any such costs where you have failed to change the default/original password on your connected home device; or
  2. 2. Costs to upgrade or increase the speed, capacity, or functionality of your connected home device beyond the level that existed prior to the cyber-attack; or
  3. 3. Costs that exceed the value of an equivalent connected home device

DEFINITIONS

A. Computer System means computer hardware and peripherals used solely by you for personal purposes, including but not limited to any laptop, mobile telephone or tablet owned by you.

 B. Connected home device means an electronic device or appliance owned by you that can send and receive data and is connected to the internet, including but not limited to your smart television, smart refrigerator, smart speakers, smartphone or smart watch.

C. Credit card fraud means the fraudulent input or modification of data in your computer system that results in money being transferred from your account or a credit arrangement being made in your

D. Cyber-Attack means unauthorized access to your computer system or the malicious introduction of software designed to disrupt or cause damage to your computer system.

E. Cyber extortion threat means a credible threat alongside a demand for ransom monies, which is directed at you to:

  1. Release, destroy, disseminate or permanently encrypt data stored in your connected home device or computer system;
  2. Introduce a virus into your connected home device;
  3. Corrupt, damage, disable, destroy, or alter your connected home device, or
  4. Deny, restrict or hinder access to your connected home device or computer system.

F. Cyber extortion expenses means costs incurred directly as a result of a cyber extortion threat that are not ransom monies

 G. Cyber Theft means the theft of or unlawful loss of funds by digital or electronic means.

 H. Data means information held electronically or digitally including code held by you on your computer system. Data does not include software, applications or programs.  

 I. Hacker means anyone except:

  1.  You;
  2. Your spouse or partner;
  3. A member of your family;
  4. Or a person who resides at your home who targets you in order to gain unauthorized access to your computer system.

 J. Home means the property located at the address shown in Item 2 of the Schedule, including any outbuildings or garages used for domestic purposes at the same address.

 K. Identity theft means a fraud committed or attempted using your identifying information without your  Such fraud need not be for financial, criminal or other gain.

L. Identity Theft Costs and Services means the following services provided by ESure.AI CyberScout:

  1. Access to a telephone helpline for you to ask questions and address issues or concerns regarding an identity theft;
  2. The services of a personal fraud specialist who will assist you with the following if there is a suspected identity theft:
    1. Obtaining a copy of your credit report;
    2. Reviewing your credit reports for possible fraudulent activity;
    3. Placing a fraud alert;
    4. Facilitating placement of a security freeze; or
    5. Other personal fraud assistance upon approval by us;
  3. The following services for you, if you are the victim of an actual identity theft:
    1. Creating fraud victim affidavits;
    2. Assisting in making any phone calls and preparing all documents needed for precredit grantor notification and fraud information removal purposes;
    3. Assisting in the filing of a law enforcement report;
    4. Creating comprehensive case files for insurance and law enforcement;
    5. Notifying any relevant government and private agencies; and
    6. Other identity theft remediation services when warranted and upon prior approval by us.
  4. The following costs for you, if you are the victim of an actual identity theft:
    1. Upon request, enrollment for one (1) year of the following:
      1. Triple bureau credit monitoring including electronic credit reports and electronic alerts;
      2. Security trace which monitors state public records, including court proceedings, bankruptcies, and liens, and which provides electronic notification to you;
      3. Cyber monitoring providing electronic notification of online criminal or fraudulent activity involving your personally identifiable information;
    2. Costs for notarizing affidavits or similar documents which attest to fraud required by financial institutions or similar credit grantors or credit agencies;
    3. Costs for certified mail to law enforcement agencies, credit agencies, financial institutions or similar credit grantors;
    4. Lost income resulting from time taken off work to complete fraud affidavits, meet with or talk to law enforcement agencies, credit agencies and/or legal counsel up to a maximum payment of USD 500 per day. Our total payment for lost income is not to exceed USD 5,000;
    5. Loan application fees for re-applying for a loan or loans when the original application is rejected solely because the lender received incorrect credit information;
    6. Reasonable attorney fees incurred as a result of identity theft to:
      1. Defend lawsuits brought against or by merchants, financial institutions or their collection agencies;
      2. Remove any criminal or civil judgments wrongly entered against an you; and
      3. Challenge the accuracy or completeness of any information in a consumer credit report;
    7. Charges incurred for long distance telephone calls to merchants, law enforcement agencies, financial institutions or similar credit grantors, or credit agencies to report or discuss an actual identity theft; or
    8. Other monitoring services upon prior approval by us.
    9. The costs of the above services and associated costs and expenses provided by ESure.AI CyberScout are part of and not in addition to the Limit of Liability.

M. Limit of Liability means the maximum that we will pay in total for the policy period of this insurance. The Limit of Liability for any payment by us under each area of coverage and as the total payable (the Policy Aggregate Limit) is shown in item 3 of the Schedule and includes any sum payable for lost income under IV.iv above.

N. Phishing means fraudulent electronic communications purporting to be from a recognized company and/or legitimate source that induce you to transfer your money or personal information including but not limited to passwords or credit card numbers.

O. Policy Period means the period specified in the Schedule.

P. Ransom monies means cash and/or crypto-currency to be surrendered by you or by an authorized third party on your behalf with the intention of terminating a cyber extortion threat.

 Q. We/us/our/your insurer  means the insurer named in the Schedule.

 R. You/your/the insured means the person named as the insured in the Schedule and any other immediate member of their family aged over 18 and permanently living in the

HOW TO MAKE A COMPLAINT

Insert standard Clause Here

GENERAL CONDITIONS

1. The first incident of any cyber-attack, cyber extortion threat, identity theft, credit card fraud, phishing attempt or cyber-crime must commence during the Policy Period and must be first discovered by you during the policy period or within sixty (60) days of its expiration.

2. You must report the cyber-attack, cyber extortion threat, identity theft, credit card fraud or phishing attempt to us no later than thirty (30) days after it is first discovered by you.

3. You must back up original data of your computer system at least every sixty (60) days after the commencement of the policyperiod. If a service provider processes or stores data for you, you must make sure that the terms of the contract between you and the service provider allow data to be backed up.

4. You must change any password on your computer system or connected home device from the default password that existed on your computer system or connected home device.

5. You must have and maintain reputable anti-virus software installed on your computer system

6. If there is any other insurance covering your claim, we will only pay our proportionate share of your

EXCLUSIONS

We do not cover:

  1. Bodily Injury

Physical injury, sickness, disease, or death sustained by any individual and, where resulting from such physical injury only, mental anguish, mental injury, shock or emotional distress;

2. Business Capacity

Any loss that relates to, or is used for the purposes of, your trade, business or profession or any other capacity other than your own personal capacity;

3. Confiscation by Public Authority

Any loss arising from the seizure, confiscation, nationalization, requisition or destruction of your computer system, connected home device, or any other data, electronic equipment or any other property by or under order of any government or public authority;

 4. Connected Device Liability

Any liability arising from your connected home device.

5. Deficiency or Improvements

The cost of correcting any failings in procedures, systems or security or the cost of any normal computer system maintenance;

6. Face to Face Ransom

Any ransom monies surrendered in a face-to-face encounter;

7. False Claims

Any loss arising from a false report of an insured event made by you, whether acting alone or in collusion with a third party;

 8.Infrastructure Services

Any loss arising from satellite failure; electrical or mechanical failures including spike, brownout or blackout; failures of overhead or subterranean transmission and distribution lines; or outage to utility infrastructure, including gas, water, and electricity; or outage to telecommunications infrastructure including telephone, internet, DNS, cable or cloud computing services

9. Known Prior Matters

Any loss arising from any matter that you were aware of or reasonably ought to have been aware of prior to the inception of this endorsement;

 10. Legal Liability, Fines or Penalties

Any amounts owed by you to a third party for damages, fines or penalties;

11. Legal Proceedings

Any costs incurred by you to institute or defend against legal proceedings against a person or organization;

12. Loss of Internet connection

Any loss or costs incurred by you as a result of a total, partial, temporary or intermittent outage of internet connection;

 13. Malicious or Criminal Acts

Any loss arising from willful, intentional, reckless, malicious or criminal acts committed by you or in collusion with a third party;

14. Natural Perils

Any loss arising from lightning, wind, windstorm, tornado, cyclone, hurricane, flood, storm surge, sinkhole collapse, earthquake, volcanic eruption, wave, tidal wave, landslide, hail, snow, geomagnetic storm or any other natural physical event however caused;

 15. Physical Perils 

Any loss arising from fire; explosion; implosion; smoke; electrostatic build-up or static electricity; electrical or mechanical failures including spike, brownout or blackout; aircraft impact; vehicle impact; or water damage;

16. Property Damage

Any loss arising from physical damage to, or, destruction of, any tangible property, including any computer system, personal property, connected home device(s) in the care, custody or control of you at your home. Data is not tangible property;

17. Sanctions

Any claim to the extent that the provision of such cover, payment of such claim or provision of such benefit would expose us to any sanction, prohibition or restriction under United Nations resolutions or the trade or economic sanctions, laws or regulations of the European Union, United Kingdom, or United States of America.

 18. Theft

The theft of any of your possessions including your computer system or connected home device.  We do not cover Credit Card Fraud where your credit card has been physically stolen.

19. War or Uprising

Any loss arising from confiscation, nationalization, requisition, strikes or similar labor actions; war, invasion, or warlike operations, civil war, terrorism, mutiny, rebellion, insurrection, civil commotion assuming the proportions of or amounting to an uprising, military coup or usurped power;

20. Substance abuse treatment.

Any expenses for substance abuse treatments.