SECTION II - COVERAGE SELECTION
Non-Physical Business Interruption & Extra Expense
(N/A – Time Retention Applies)
Network Security & Privacy Liability
Employee Privacy Liability
Electronic Media Liability
SECTION III - LOSS EXPERIENCE
(Explain any “Yes” responses, including corrective actions and damages incurred
on the ADDITIONAL INFORMATION page below)
During the past three (3) years whether insured or not, have you sustained any losses due
to unauthorized access, unauthorized use, virus, denial of service attack, electronic media
liability, data breach, data theft, fraud, electronic vandalism, sabotage or other similar
electronic security events?
Within the past three (3) years, have you experienced any network related business
interruption exceeding eight (8) hours other than planned maintenance?
During the last three (3) years, has anyone alleged that you were responsible for damage
to their computer system(s) arising out of the operation of your computer system(s)?
During the last three (3) years, have you received a complaint or other proceeding
(including an injunction or other request for non-monetary relief) arising out of intellectual
property infringement, copyright infringement, media content, or advertising material?
During the last three (3) years, has anyone made a demand, claim, complaint, or filed a
lawsuit against you alleging invasion of, or interference with rights of privacy, or the
inappropriate disclosure of personally identifiable information (PII)?
During the last three (3) years, have you been the subject of an investigation or action by
any regulatory or administrative agency for privacy-related violations?
Are you aware of any circumstance that could reasonably be anticipated to result in a claim
being made against you for the coverage being applied for?
SECTION IV – RISK CONTROLS
How often do you review the rules within the firewalls?
When was the last time a rule was removed / deactivated?
Do you require your lnformation Technology Department or outsourced third party
vendors/providers to adhere to a software update process, including software patches and
anti-virus software definition upgrades?
Do you perform virus scans of emails, downloads, and portable devices?
Do you restrict access to sensitive client, customer, employee or other third party
information?
Do you have a process for managing user accounts, including the timely revocation of
access for terminated employees and the removal of outdated accounts?
Yes No
Page 2 of 7
© 2017 Philadelphia Consolidated Holding Corp.