ACE Privacy and Network Security Liability Supplemental Application

advertisement
ACE INA Insurance
1400 – 25 YORK STREET
TORONTO, ONTARIO,
CANADA
M5J 2V5
ACE Privacy and Network Security Liability
Supplemental Application
For ACE Express Private Company
Renewal Application
COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY, NETWORK
SECURITY LIABILITY, OR DATA BREACH FUND COVERAGE. Please submit with a completed Policy Application.
Please complete in ink. A principal must sign both the supplement and the Policy Application.
THIS APPLICATION IS FOR A CLAIMS-MADE INSURANCE POLICY
INSTRUCTIONS
Completion of this application may require input from your organization’s risk management, legal, finance, information
technology, or privacy departments. This supplemental application should be completed with the assistance of the Chief
Security Officer and the Chief Information Officer or Chief Privacy Officer. Additional space may be needed to provide
complete answers.







I.
Please type or print answers clearly.
Answer ALL questions completely, leaving no blanks. If any questions do not apply, print “N/A” in the space.
Provide any supporting information on a separate sheet using your letterhead with reference to the application.
Check Yes or No to answers prompting such a reply.
Please submit a copy of the privacy policy currently in use.
This form must be completed, dated and signed by an authorized officer of your company.
Underwriters will rely on all statements made in this application. This information is required to make an
underwriting and pricing evaluation. Your answers hereunder are considered material to that evaluation.
General Information
Name of Applicant
Address:
Applicants Website:
Gross Revenues:
II. Privacy and Network Security Liability Coverage Section
1. Has Applicant ever been declined for Privacy, Network Risk, or Media Liability insurance, or had
an existing policy cancelled?
Yes
No
2. Has Applicant ever sustained a systems intrusion, tampering, virus or malicious code attack, loss
of data, hacking incident, data theft or similar?
Please describe:
Yes
No
3. In the last five years has your company experienced any claims that would have been tendered
for coverage under the Privacy and Network Security Policy that is the subject of this application
had it been in effect at the time of the claim? If yes, please attach a complete summary.
Yes
No
Yes
No
5. Has Applicant notified customers that their information was or may have been compromised as a
result of its activities?
Yes
No
6. Has an employee ever been disciplined for mishandling data or otherwise tampering with
Applicant’s computer network?
Yes
No
During the last five years:
4. Has anyone associated with Applicant (customer, client, vendor, contractor, business associate,
employee, director or officer, etc.) alleged that their personal information was compromised by
the Applicant or its vendor?
PEO-37102 (12/14)
© 2014
Page 1 of 5
RECORDS AND INFORMATION MANAGEMENT
1.
What sensitive information does Applicant handle, manage, store, destroy or otherwise control?
(please check all that apply and provide approximate number of records)
Social Insurance Numbers:
Medical Records:
Credit/Debit Card Numbers:
Healthcare Records:
Drivers License Numbers:
Credit History and Ratings:
Government ID Numbers:
Intellectual Property of Others:
Financial Account Numbers:
Other:
TOTAL NUMBER OF RECORDS:
2. Has Applicant’s senior executive or Board of Directors established enterprise-wide
responsibility for records and information management compliance with an individual manager?
Yes
No
3. Does an enterprise-wide policy covering records and information management compliance
exist within Applicant?
Yes
No
4. Does Applicant have a formal Incident Response Plan for determining the severity of a
potential data security breach and providing prompt notification to all individuals who may be
adversely affected by such exposures?
Yes
No
5. Does Applicant have a formal Written Information Security Program for the implementation,
maintenance and monitoring of sensitive personal information in your care, custody or control?
Yes
No
6. Does Applicant’s information asset classification program include a data classification standard
(e.g., public, internal use only, confidential)?
Yes
No
7. Does Applicant post a privacy policy on its Internet website that has been reviewed by a
qualified attorney?
Yes
No
8. Does Applicant sell or share individual subscriber or user identifiable information with other
internal or external entities?
If yes, please describe:
Yes
No
9. Has Applicant identified all relevant regulatory and industry-supported compliance frameworks
that are applicable to it?
Yes
No
Yes
Yes
Yes
No
No
No
Yes
No
Yes
No
Yes
No
Yes
No
10. Has Applicant ensured that all sensitive business/consumer information that:
a. Is transmitted is encrypted using industry-grade mechanisms?
b. Resides within Applicant’s systems is encrypted while “at-rest”?
c. Is physically transmitted – via tape or any other medium – is encrypted?
11. For computer equipment that leaves Applicant’s physical facilities (e.g., mobile laptops, PDAs,
BlackBerrys, and home-based desktops), has Applicant implemented strong access control
requirements and/or hard drive encryption to prevent unauthorized exposure of company data
in the event these devices are stolen, lost or otherwise unaccounted for?
Please describe:
12. Does Applicant follow established procedures for:
a. Carrying out and confirming the destruction of data residing on systems or devices prior to
their recycling, refurbishing, resale, or physical disposal?
b. Carrying out and confirming the destruction of sensitive information in electronic and paper
form prior to recycling or physical disposal?
c. Both “friendly” and “adverse” employee departures that include an inventoried recovery of
all information assets, user accounts, and systems previously assigned to each individual
during their full period of employment?
PEO-37102 (12/14)
© 2014
Page 2 of 5
13. Does Applicant’s security awareness program include mandatory classes with measured
testing for all employees that may be expected to access, handle or process sensitive customer
data as part of their assigned job responsibilities?
Yes
No
14. Does Applicant conduct regular reviews of your third-party service providers and partners to
ensure that they adhere to your contractual and/or regulatory requirements for the protection of
sensitive business/customer data that you entrust to their care for processing, handling, and
marketing purposes?
Yes
NA
No
15. Do contracts with third-party service providers include indemnity provisions that protect
Applicant from any liability arising out of their loss of Applicant’s sensitive information?
Yes
No
16. Has Applicant configured its Internet-facing Web sites and related systems so that no sensitive
customer data resides directly on these systems?
Yes
No
17. Has Applicant configured its network to ensure that access to sensitive customer data is limited
to properly authorized requests to internal databases/systems that are otherwise fully protected
against Internet access?
Yes
No
Yes
No
Periodic intrusion detection, penetration or vulnerability testing
Firewall technology used at all Internet points-of-presence
Antivirus software on all desktops, portable computers and mission critical servers.
Antivirus applications updated in accordance with the software provider’s requirements
Patches implemented on network appliances (routers, bridges, firewalls, etc.) to mitigate
current vulnerabilities
f. Systems backed up on a daily (or more regular) basis
g. Testing of data recover and restoration procedures
Yes
Yes
Yes
Yes
Yes
No
No
No
No
No
Yes
Yes
No
No
3. Does Applicant actively maintain system logs on all mission-critical servers and appliances?
Yes
No
Yes
No
4. Are documented procedures in place for user and password management?
Yes
No
5. Does Applicant have a written disaster recovery and business continuity plan for your network?
When was the plan last tested? ____________________________________
Yes
No
6. Does Applicant’s hiring process require a full background check (Criminal, Educational, Drug,
and Work History)?
Yes
No
7. Are formal processes in place to ensure that network privileges are revoked in a timely manner
following an employee’s termination or resignation?
Yes
No
8. Does Applicant run any software or hardware that is no longer supported or has been identified
as end-of-life support by the software or hardware vendor?
Yes
No
NETWORK OPERATIONS
A. Security Management
1. Has a network security assessment or audit been conducted within the past 12 months?
If yes, when was the last audit completed?
(Please attach copy of audit.)
2. Does Applicant deploy the following technologies/processes in your environment?
a.
b.
c.
d.
e.
Are logs regularly checked for irregularities, intrusions or violations?
PEO-37102 (12/14)
© 2014
Page 3 of 5
B. Third Party Service Providers
Please identify third party vendor(s) providing any of the following services, including the number of records in
their care, custody or control.
Name of Provider
Number of Records
Internet Service/Access:
Website Hosting:
Collocation Services:
Managed Security Services:
Hosted Electronic Health
Records:
Outsourcing Services:
Credit Card Processors:
Other (e.g. HR, POS):
C. Payment Card Industry Data Security Standard (PCI DSS)
1.
Is Applicant subject to the Payment Card Industry Data Security Standard?
If yes, what level requirement?
1
2
3
4
Please complete the Point of Sale Retail Supplemental Application
Yes
No
D. Cloud Service Providers
1. Does Applicant utilize a third party cloud service provider?
Yes
No
If yes, please complete the Cloud Service Providers Supplemental Application
III. Warranty Section
None of the Insureds has knowledge of any Wrongful Act or fact, circumstance or situation which (s)he has reason to
suppose might give rise to any future Claim, except as follows: Details Attached
If “NONE”, Please check this box:
Without prejudice to any other rights and remedies of the Insurer, it is agreed by all concerned that if any such Wrongful
Act, fact, circumstance, or situation exists, whether or not disclosed above, any such Claim arising from such Wrongful
Act, fact, circumstance, or situation shall be excluded from coverage under the proposed Policy.
This Supplemental Application shall be maintained on file by the Insurer, shall be deemed attached as if physically
attached to the proposed Policy and shall be considered as incorporated into and constituting a part of the Application and
the proposed Policy.
The undersigned agrees that if after the date of this Application and prior to the effective date of any Policy based on this
Application, any occurrence, event or other circumstance should render any of the information contained in this
Application inaccurate or incomplete, then the undersigned shall notify the Insurer of such occurrence, event or
circumstance and shall provide the Insurer with information that would complete, update or correct such information. Any
outstanding quotations may be modified or withdrawn at the sole discretion of the Insurer.
PEO-37102 (12/14)
© 2014
Page 4 of 5
FALSE INFORMATION/FRAUD WARNING STATEMENT
NOTICE TO ALL APPLICANTS:
ANY PERSON WHO KNOWINGLY AND WITH INTENT TO DEFRAUD ANY INSURANCE COMPANY OR ANOTHER
PERSON, FILES AN APPLICATION FOR INSURANCE OR STATEMENT OF CLAIM CONTAINING ANY MATERIALLY
FALSE INFORMATION, OR CONCEALS INFORMATION FOR THE PURPOSE OF MISLEADING, COMMITS A
FRAUDULENT INSURANCE ACT, WHICH IS A CRIME AND MAY SUBJECT SUCH PERSON TO CRIMINAL AND
CIVIL PENALTIES.
Other Information
1. The undersigned declares that to the best of his/her knowledge the statements herein are true. Signing of this
Application does not bind the undersigned to complete the insurance, but it is agreed that this Application shall be the
basis of the contract should a Policy be issued, and this application will be attached to and become a part of such
Policy, if issued. Insurer hereby is authorized to make any investigation and inquiry in connection with this Application
as they may deem necessary.
2. It is warranted that the particulars and statements contained in the Application for the proposed Policy and any materials
submitted herewith (which shall be retained on files by Insurer and which shall be deemed attached hereto, as if
physically attached hereto), are the basis for the proposed Policy and are to be considered as incorporated into and
constituting a part of the proposed Policy.
3. It is agreed that in the event there is any material change in the answers to the questions contained herein prior to the
effective date of the Policy, the applicant will notify Insurer and, at the sole discretion of Insurer, any outstanding
quotations may be modified or withdrawn.
4. It is agreed that in the event there is any misstatement or untruth in the answers to the questions contained herein,
Insurer have the right to exclude from coverage any claim based upon, arising out of or in connection with such
misstatement or untruth.
Name:
Title:
Signature:
Date:
(Principal, Partner, or Officer)
Note:
This application must be reviewed, signed and dated by a principal, partner or officer of the applicant entity
For purposes of creating a binding contract of insurance by this application or in determining the rights and
obligations under such contract in any court of law, the parties acknowledge that a signature reproduced by
either facsimile or photocopy shall be the same force and effect as an original signature and that the original and
any such copies shall be deemed on and the same document.
PEO-37102 (12/14)
© 2014
Page 5 of 5
Download