Philadelphia Insurance Companies Logo
Loginor create an account
Start typing in your search to see relevant search terms below

Cyber Security

The PHLY Difference

Philadelphia Insurance Companies' Cyber Security Liability program provides both First and Third Party coverage for numerous classes of business. Through eight Insuring Agreements, a wide range of cyber liability exposures are addressed. Coverage is available nationwide on either an admitted or non-admitted basis.

  • Includes coverage for legal fees and computer forensic costs in the event of a security or privacy breach

  • Regulatory fines and penalties included under Security Event Costs and PCI assessment coverage available by endorsement

  • Customer Notification Expenses include legal expenses, credit monitoring, postage and advertising

  • Comprehensive interruption expenses coverage, including income loss

  • Coverage for Damages to third parties caused by a breach of network security

  • Definition of claim includes a demand for monetary and non-monetary damages

First Party Protection

  • Loss of Digital Assets Coverage

  • Non-Physical Business Interruption and Extra Expense

  • Cyber Extortion

  • Cyber Terrorism

  • Security Event Costs

Third Party Protection

  • Network Security and Privacy Liability

  • Employee Privacy Liability

  • Electronic Media Liability

Cyber Concerns Facing Businesses

PHLY's Cyber Product Manager, Evan Fenaroli, explains how agents can handle growing demand for Cyber insurance and what the major cyber concerns are for businesses today.

Applications

Please select state specific forms when applicable.

Learn More

Supplemental Applications

Please select state specific forms when applicable.

Cyber Liability Profiles

Policy Forms

Documents Required for Proposal

  • Completed, signed and dated PHLY Cyber Security Application (a quotation can be provided from an acceptable and properly completed competitor application)

  • Supplemental claim form, if applicable

  • Additional information may be required, depending on the applicant's size, class of business, and strength of computer security controls

Man typing on a laptop to depict document management