The Edge
Claims & Incident Response Hotline
Contact Us
Downloads
EDGE POLICIES
We have teamed up with Clyde & Co who we believe have the best incident response team in Australia. They have been operating their 24/7 incident response service for over 6 years and have managed over 1,000 cyber incidents. Clyde & Co have a carefully selected panel of over 75 local vendors ranging from forensic IT experts through to PR companies.
24/7 Incident Response
Clyde & Co Cyber Incident Response Hotline: +61 2 9210 4464
Emergency Response email: cyberbreach@clydeco.com
If emailing, please also copy us in on: info@edgeunderwriting.com.au
Click on the following links to access the incident response brochure and the process flowchart.
Notice of Claim
Click here for the on-line claim form
ASCENT & CFC POLICIES
Please refer to the Insured’s policy schedule where providers and claims contacts are fully detailed.
Click here for our contact details
* 100% Lloyd’s security
COMPREHENSIVE COVER (spread over 9 sections)
Breach of Personal data
Business Interruption
Hacker Damage (including cloud and outsourced service
providers)
Computer crime (a.k.a. social engineering)
Cyber extortion (a.k.a. social engineering)
Crisis Communication costs
Privacy infringement claim
PCI charges
Media liability event
OTHER BENEFITS
INSTANT INDICATIONS & SIMPLE ONLINE APPLICATION
Instant indications can be obtained on-line by answering 4 simple questions. You can access this here. If all assumptions are satisfied, the indicated price is firm.
UNLIMITED RETROACTIVE COVER
Most data breaches are discovered long after they first occur. Our policy is one of the very few to offer full cover for events that occur prior to the first inception date of the policy, aligning cover with the point when you first discover the breach rather than when it first occurred.
COMPREHENSIVE SOCIAL ENGINEERING COVER
Cyber crime is the fastest growing form of crime in the world yet most cyber policies still don’t cater for phishing scams and telephone hacking amongst others. The policies provide comprehensive crime cover for a wide range of electronic perils that are increasingly threatening the financial resources of today’s businesses.
DOUBLE YOUR SOCIAL ENGINEERING SUB-LIMIT
As an added bonus, social engineering sub-limits are automatically doubled if the Insured uses both internal (eg. user name & password) and external (eg. Google Authenticator or SMS code send to mobile phone) methods for accessing their server (or their cloud hosted environment). This is often referred to as 2FA/DFA (two/dual factor authentication)
EMERGENCY COSTS PROVISION
In the event of a major system failure or data security breach, the last thing the Insured needs to worry about is us. That’s why our incident response partner is able to authorise emergency costs of up to $50,000 with our pre-agreed panel of providers without any need for Underwriters prior written consent.
SUPPLY CHAIN COVERAGE
Cover (damage, restoration and BI) is automatically extended to respond to insured events occurring at the Insured’s cloud provider.
Click here to access downloads
Instant Indication
Click here to obtain an instant indication (4 easy questions is all it takes!)
Target Risks
We Love We Generally Avoid
Our product is aimed at businesses with turnovers not exceeding $30m (although we can accommodate larger turnovers on a case-by-case basis). We have a very broad appetite in terms of occupations.
Risks that generally won’t fit under our binder (but for which we may have alternate markets for) include:
Healthcare providers or any business who holds, stores or process healthcare records for individuals (except for their own employees)*
Businesses which have exposure to nuclear power
Call centres, telemarketing/direct marketing firm, data processing/outsourcing firm
Internet service provider (ISP), Telecommunications service provider (TSP) or Managed Service Provider (MSP)
Government entities, public bodies, councils, local authorities, political party or lobbying groups
Businesses with an AFSL (other than general insurance brokers)
Payment processors or businesses involved in cryptocurrency
Businesses which holds, stores or processes personal data on minors
Educational establishments
Social networking, pornography, blogging/vlogging, dating websites
Mobile application or video game developers
Franchisees or franchisors


Standard Limits and Excesses
Sum Insured Options |
$250k |
$500k |
$1m |
$2m |
$3m |
$5m |
Social Engineering |
$100k |
$100k |
$250k |
$250k |
$250k |
$250k |
Social Engineering (with 2FA/DFA) |
$200k |
$200k |
$500k |
$500k |
$500k |
$500k |
Excess |
$500 |
$500 |
$1k |
$1k |
$5k |
$5k |
BI Time Excess |
8hrs |
8hrs |
8hrs |
8hrs |
8hrs |
8hrs |