{"id":49333,"date":"2020-06-03T13:25:21","date_gmt":"2020-06-03T18:25:21","guid":{"rendered":"https:\/\/unicogroup.com\/?page_id=49333"},"modified":"2021-05-11T12:57:25","modified_gmt":"2021-05-11T17:57:25","slug":"cyber-liability","status":"publish","type":"page","link":"https:\/\/unicogroup.com\/business-insurance\/cyber-liability\/","title":{"rendered":"Cyber Liability"},"content":{"rendered":"[vc_row][vc_column][vc_btn title=&#8221;Business Coverages&#8221; style=&#8221;outline-custom&#8221; outline_custom_color=&#8221;#003a70&#8243; outline_custom_hover_background=&#8221;#003a70&#8243; outline_custom_hover_text=&#8221;#ffffff&#8221; size=&#8221;sm&#8221; align=&#8221;left&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-left&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%2Fbusiness-insurance|||&#8221;][\/vc_column][\/vc_row][vc_row gap=&#8221;10&#8243; content_placement=&#8221;middle&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h1><span style=\"color: #003a70;\"><strong>Cyber liability <\/strong><b>insurance<\/b><\/span><\/h1>\n<p>When cyber attacks like data breaches and hacks occur, they can result in devastating damage. Businesses have to deal with business disruptions, lost revenue and litigation. It is important to remember that no organization is immune to the impact of cyber crime.<\/p>\n<p>As a result, cyber liability has become an essential component to any risk management program.[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_btn title=&#8221;Contact an Advisor&#8221; color=&#8221;info&#8221; align=&#8221;left&#8221; link=&#8221;url:https%3A%2F%2Funicogroup.com%2Fcontact-us%2F%3Fsource%3Dcyber-liability%23contact|title:Contact%20Us||&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;49408&#8243; img_size=&#8221;600&#215;450&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_rounded&#8221; css=&#8221;.vc_custom_1613419764483{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; bg_type=&#8221;bg_color&#8221; bg_color_value=&#8221;#f5f5f5&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;49791&#8243; img_size=&#8221;600&#215;450&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_rounded&#8221; css=&#8221;.vc_custom_1613419780229{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h2><span style=\"color: #003a70;\"><strong>What is cyber liability insurance?<\/strong><\/span><\/h2>\n<p>A traditional business liability policy is unlikely to protect against most cyber exposures. Standard commercial policies are written to insure against injury or physical loss and do little to shield you from electronic damages and the associated costs they may incur.<\/p>\n<p>Exposures include: data breaches, business interruption, cyber extortion, forensic support, intellectual property rights, damages to a third-party system, system failure and legal support. Awareness of the potential cyber liabilities your company faces is essential to managing risk through proper coverage.[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text]\n<h2><span style=\"color: #003a70;\"><strong>Does my business need cyber coverage?<\/strong><\/span><\/h2>\n<p>Yes, however, every business&#8217;s cyber risks are different depending on the type and complexity of their work. Cyber liability insurance is specifically designed to address the risks that come with using modern technology; risks that other types of business liability coverage simply won\u2019t.<\/p>\n<p>The level of coverage your business needs is based on your individual operations and can vary depending on your range of exposure. It is important to work with an advisor that can identify your areas of risk so a policy can be tailored to fit your unique situation.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;49790&#8243; img_size=&#8221;600&#215;450&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_rounded&#8221; css=&#8221;.vc_custom_1613419794407{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;padding-top: 0px !important;padding-right: 0px !important;padding-bottom: 0px !important;padding-left: 0px !important;}&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gap=&#8221;10&#8243; bg_type=&#8221;bg_color&#8221; bg_color_value=&#8221;#eff5f7&#8243;][vc_column][vc_column_text]\n<h2><span style=\"color: #003a70;\"><strong>What does cyber liability cover?<\/strong><\/span><\/h2>\n<p>Cyber liability insurance policies are tailored to meet your company&#8217;s specific needs and can offer a number of important benefits. Possible exposures covered by a typical cyber liability policy may include the following:[\/vc_column_text][vc_row_inner content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1593478581674{background-color: #ffffff !important;border-radius: 10px !important;}&#8221; el_class=&#8221;grow&#8221;][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]\n<h5><span style=\"color: #003a70;\"><strong>Cost of notification<\/strong><\/span><\/h5>\n<p>Increased government regulations have placed more responsibility on companies to protect clients\u2019 personal information. In the event of a breach, notification of the affected parties is now required by law. This will add to costs that will also include security fixes, identity theft protection for the affected and protection from possible legal action.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text el_class=&#8221;anchor&#8221;]\n<p id=\"data-breaches\" class=\"anchor\">Data Breach Anchor<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1592430013216{background-color: #ffffff !important;border-radius: 10px !important;}&#8221; el_class=&#8221;grow&#8221;][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]\n<h5 style=\"text-align: left;\"><span style=\"color: #003a70;\"><b>Business interruption<\/b><\/span><\/h5>\n<p>If your primary business operations require the use of computer systems, a disaster that cripples your ability to transmit data could cause you, or a third party that depends on your services, to lose potential revenue. From a server failure to a data breach, such an incident can affect your day-to-day operations.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text el_class=&#8221;anchor&#8221;]\n<p id=\"business-interruption\" class=\"anchor\">Business interruption Anchor<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1592430030157{background-color: #ffffff !important;border-radius: 10px !important;}&#8221; el_class=&#8221;grow&#8221;][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]\n<h5><span style=\"color: #003a70;\"><strong>Cyber extortion<\/strong><\/span><\/h5>\n<p>Hackers can hijack websites, networks and stored data, denying access to you or your customers. They often demand money to restore your systems to working order. This can cause a temporary loss of revenue plus generate costs associated with paying the hacker\u2019s demands or rebuilding if damage is done.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text el_class=&#8221;anchor&#8221;]\n<p id=\"cyber-extortion\" class=\"anchor\">Cyber Extortion Anchor<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1592430038477{background-color: #ffffff !important;border-radius: 10px !important;}&#8221; el_class=&#8221;grow&#8221;][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]\n<h5 style=\"text-align: left;\"><span style=\"color: #003a70;\"><strong>Forensic support<\/strong><\/span><\/h5>\n<p>Following a cyber attack, your organization will have to investigate to determine the extent of the reach and what led to it. The right policy can reimburse the insured for costs related to forensics and seeking out expert advice. Additionally, some policies can provide 24\/7 support from cyber specialists, which is especially useful following a hack or data breach.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text el_class=&#8221;anchor&#8221;]\n<p id=\"forensic-support\" class=\"anchor\">Forensic Support Anchor<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1592441726496{background-color: #ffffff !important;border-radius: 10px !important;}&#8221; el_class=&#8221;grow&#8221;][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]\n<h5 style=\"text-align: left;\"><span style=\"color: #003a70;\"><b style=\"color: #003a70;\">Intellectual p<\/b><span style=\"color: #003a70;\"><b>roperty<\/b><\/span><b style=\"color: #003a70;\"> rights<\/b><\/span><\/h5>\n<p>Your company\u2019s online presence, whether it be through a corporate website, blogs or social media, opens you up to some of the same exposures faced by publishers. This can include libel, copyright or trademark infringement and defamation, among other things.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text el_class=&#8221;anchor&#8221;]\n<p id=\"intellectual-property-rights\" class=\"anchor\">Intellectual Property Anchor<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1592430046500{background-color: #ffffff !important;border-radius: 10px !important;}&#8221; el_class=&#8221;grow&#8221;][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]\n<h5><span style=\"color: #003a70;\"><strong>Damages to a third-party system<\/strong><\/span><\/h5>\n<p>If an email sent from your server has a virus that crashes the system of a customer, or the software your company distributes fails, resulting in a loss for a third party, you could be held liable for the damages.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text el_class=&#8221;anchor&#8221;]\n<p id=\"third-party-damage\" class=\"anchor\">Third-party damage Anchor<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1592430058924{background-color: #ffffff !important;border-radius: 10px !important;}&#8221; el_class=&#8221;grow&#8221;][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]\n<h5 style=\"text-align: left;\"><span style=\"color: #003a70;\"><strong>System failure<\/strong><\/span><\/h5>\n<p>A natural disaster, malicious activity or fire could all cause physical damages that could result in data or code loss. While the physical damages to your system hardware would be covered under your existing business liability policy, data or code loss due to the incident would not be.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text el_class=&#8221;anchor&#8221;]\n<p id=\"system-failure\" class=\"anchor\">System Failure Anchor<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1592430066050{background-color: #ffffff !important;border-radius: 10px !important;}&#8221; el_class=&#8221;grow&#8221;][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]\n<h5 style=\"text-align: left;\"><span style=\"color: #003a70;\"><strong>Legal support<\/strong><\/span><\/h5>\n<p>In the wake of a cyber incident, businesses often seek legal assistance. This assistance can be costly. Cyber liability insurance can help businesses afford proper legal work following a cyber attack.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/12&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text el_class=&#8221;anchor&#8221;]\n<p id=\"legal-support\" class=\"anchor\">Legal support Anchor<\/p>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_column_text]\n<h2><span style=\"color: #003a70;\"><strong>Related Insights<\/strong><\/span><\/h2>\n[\/vc_column_text][vc_basic_grid post_type=&#8221;post&#8221; max_items=&#8221;3&#8243; item=&#8221;49338&#8243; grid_id=&#8221;vc_gid:1620755592107-a04ef45c-0f94-2&#8243; taxonomies=&#8221;61&#8243;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>Cyber liability insurance policies are tailored to meet your company&#8217;s specific needs and can offer a number of important benefits.<\/p>\n","protected":false},"author":20,"featured_media":49408,"parent":40794,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-49333","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/unicogroup.com\/wp-json\/wp\/v2\/pages\/49333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unicogroup.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/unicogroup.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/unicogroup.com\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/unicogroup.com\/wp-json\/wp\/v2\/comments?post=49333"}],"version-history":[{"count":0,"href":"https:\/\/unicogroup.com\/wp-json\/wp\/v2\/pages\/49333\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/unicogroup.com\/wp-json\/wp\/v2\/pages\/40794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/unicogroup.com\/wp-json\/wp\/v2\/media\/49408"}],"wp:attachment":[{"href":"https:\/\/unicogroup.com\/wp-json\/wp\/v2\/media?parent=49333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}