Cyber Security

First and Third Party protection against a broad range of Data and Privacy Risks

Benefits of the Program

Philadelphia Insurance Companies' Cyber Security Liability program provides both First and Third Party coverage for numerous classes of business. Through eight Insuring Agreements, a wide range of cyber liability exposures are addressed. Coverage is available nationwide on either an admitted or non-admitted basis.

  • Includes coverage for legal fees and computer forensic costs in the event of a security or privacy breach
  • Regulatory fines and penalties included under Security Event Costs and PCI assessment coverage available by endorsement
  • Customer Notification Expenses include legal expenses, credit monitoring, postage and advertising
  • Comprehensive interruption expenses coverage, including income loss
  • Coverage for Damages to third parties caused by a breach of network security
  • Definition of claim includes a demand for monetary and non-monetary damages

PHLY's Cyber Product Manager, Evan Fenaroli, explains how agents can handle growing demand for Cyber insurance and what the major cyber concerns are for businesses today.

Product Contact

Evan Fenaroli, Product Manager

Evan.Fenaroli@phly.com

For new business inquiries, please call 800.873.4552 or submit an application to phlysales@phly.com.

video-play

First Party Protection

  • Loss of Digital Assets Coverage
  • Non-Physical Business Interruption and Extra Expense
  • Cyber Extortion
  • Cyber Terrorism
  • Security Event Costs

Third Party Protection

  • Network Security and Privacy Liability
  • Employee Privacy Liability
  • Electronic Media Liability

Supplemental Applications

Please select state specific forms when applicable.

Documents Required for Proposal

  • Completed, signed and dated PHLY Cyber Security Application (a quotation can be provided from an acceptable and properly completed competitor application)
  • Supplemental claim form, if applicable
  • Additional information may be required, depending on the applicant's size, class of business, and strength of computer security controls
Please Wait...

Please Wait