Cyber

 The Edge

 Claims & Incident Response Hotline

 Contact Us

 Downloads

 

EDGE POLICIES

We have teamed up with Clyde & Co who we believe have the best incident response team in Australia. They have been operating their 24/7 incident response service for over 6 years and have managed over 1,000 cyber incidents. Clyde & Co have a carefully selected panel of over 75 local vendors ranging from forensic IT experts through to PR companies.  

 

24/7 Incident Response

Clyde & Co Cyber Incident Response Hotline: +61 2 9210 4464

Emergency Response email: cyberbreach@clydeco.com

If emailing, please also copy us in on: info@edgeunderwriting.com.au

 

Click on the following links to access the incident response brochure and the process flowchart

 

Notice of Claim

Click here for the on-line claim form

 

 

ASCENT & CFC POLICIES

Please refer to the Insured’s policy schedule where providers and claims contacts are fully detailed.

 

Click here for our contact details

*   100% Lloyd’s security

 

 

COMPREHENSIVE COVER (spread over 9 sections)

   Breach of Personal data

   Business Interruption

   Hacker Damage (including cloud and outsourced service
providers)

   Computer crime (a.k.a. social engineering)

   Cyber extortion (a.k.a. social engineering)

   Crisis Communication costs

   Privacy infringement claim

   PCI charges

   Media liability event

 

OTHER BENEFITS

    INSTANT INDICATIONS & SIMPLE ONLINE APPLICATION

Instant indications can be obtained on-line by answering 4 simple questions. You can access this here. If all assumptions are satisfied, the indicated price is firm.

 

    UNLIMITED RETROACTIVE COVER

Most data breaches are discovered long after they first occur. Our policy is one of the very few to offer full cover for events that occur prior to the first inception date of the policy, aligning cover with the point when you first discover the breach rather than when it first occurred.

 

   COMPREHENSIVE SOCIAL ENGINEERING COVER

Cyber crime is the fastest growing form of crime in the world yet most cyber policies still don’t cater for phishing scams and telephone hacking amongst others. The policies provide comprehensive crime cover for a wide range of electronic perils that are increasingly threatening the financial resources of today’s businesses.

 

    DOUBLE YOUR SOCIAL ENGINEERING SUB-LIMIT

As an added bonus, social engineering sub-limits are automatically doubled if the Insured uses both internal (eg. user name & password) and external (eg. Google Authenticator or SMS code send to mobile phone) methods for accessing their server (or their cloud hosted environment). This is often referred to as 2FA/DFA (two/dual factor authentication)

 

     EMERGENCY COSTS PROVISION

In the event of a major system failure or data security breach, the last thing the Insured needs to worry about is us. That’s why our incident response partner is able to authorise emergency costs of up to $50,000 with our pre-agreed panel of providers without any need for Underwriters prior written consent.

 

      SUPPLY CHAIN COVERAGE

Cover (damage, restoration and BI) is automatically extended to respond to insured events occurring at the Insured’s cloud provider.

 

Click here to access downloads

 Instant Indication

Click here to obtain an instant indication (4 easy questions is all it takes!)

 Target Risks

 

 We Love                                                               We Generally Avoid 

Our product is aimed at businesses with turnovers not exceeding $30m (although we can accommodate larger turnovers on a case-by-case basis). We have a very broad appetite in terms of occupations.

Risks that generally won’t fit under our binder (but for which we may have alternate markets for) include: 

 

Healthcare providers or any business who holds, stores or process healthcare records for individuals (except for their own employees)* 

 

Businesses which have exposure to nuclear power

 

Call centres, telemarketing/direct marketing firm, data processing/outsourcing firm

 

Internet service provider (ISP), Telecommunications service provider (TSP) or Managed Service Provider (MSP)

 

Government entities, public bodies, councils, local authorities, political party or lobbying groups

 

Businesses with an AFSL (other than general insurance brokers)

 

Payment processors or businesses involved in cryptocurrency

 

Businesses which holds, stores or processes personal data on minors

 

Educational establishments

 

Social networking, pornography, blogging/vlogging, dating websites

 

Mobile application or video game developers

 

Franchisees or franchisors 

icon xs
icon xs

 Standard Limits and Excesses

 

Sum Insured Options

$250k

$500k

$1m

$2m

$3m

$5m

Social Engineering
(no 2FA/DFA)

$100k

$100k

$250k

$250k

$250k

$250k

Social Engineering (with 2FA/DFA)

$200k

$200k

$500k

$500k

$500k

$500k

Excess

$500

$500

$1k

$1k

$5k

$5k

BI Time Excess

8hrs

8hrs

8hrs

8hrs

8hrs

8hrs