MADB 5001 02 11 Page 2 of 6
3. Number of employees including principals and independent contractors:
Full-time
Part-time Seasonal/Temporary Independent Contractors Total
4. Number of individual devices the Applicant has deployed:
Servers
Desktops Laptops Mobile Phones/Devices
5. Does the Applicant handle sensitive data for any of the following:
Transmit/Receive
Store
(a) Credit Cards/Debit Cards? [ ] Yes [ ] No..................... [ ] Yes [ ] No
(b) Financial/Banking Information? [ ] Yes [ ] No..................... [ ] Yes [ ] No
(c) Medical Information (PHI)? [ ] Yes [ ] No..................... [ ] Yes [ ] No
(d) Social Security Numbers or National Identification Numbers? [ ] Yes [ ] No..................... [ ] Yes [ ] No
(e) Other (specify)
[ ] Yes [ ] No..................... [ ] Yes [ ] No
6. Indicate the number of sensitive data records the Applicant stores currently:
[ ] None [ ] 1 to 50,000 [ ] 50,001 to 100,000 [ ] 100,001 to 150,000
[ ] 150,001 or more; estimate number of records:
7. Does the Applicant use an outside vendor or service provider to process or store sensitive information?
................................................................................................................................................................... [ ] Yes [ ] No
(a) If Yes, provide name of organization and details:
III. SECURITY INCIDENT AND LOSS HISTORY
1. Has the Applicant at any time during the past three (3) years had any incidents, claims or suits
involving unauthorized access, intrusion, breach, compromise or misuse of the Applicant’s network,
including embezzlement, fraud, theft of proprietary information, theft or loss of laptops, denial of
service, electronic vandalism or sabotage, computer virus or other incident?.......................................... [ ] Yes [ ] No
If Yes, attach full details including a description of each incident, claim or suit and the cause, internal costs, cost to
third parties, recovery time and steps taken to mitigate future exposure.
2. Is the Applicant or any of its principals, partners, officers, directors, trustees, managers, managing
members, or employees, its predecessors, subsidiaries, affiliates or any other persons or organizations
proposed for this insurance aware of any fact, circumstance, situation or incident related to the
Applicant’s network which might give rise to a loss or a claim? ............................................................... [ ] Yes [ ] No
(a) If Yes, provide full details:
3. Has any application for similar insurance made on behalf of the Applicant, its predecessors, subsidiaries,
affiliates, and/or for any other person(s) or organization(s) proposed for this insurance ever been declined,
cancelled or nonrenewed?........................................................................................................................ [ ] Yes [ ] No
(a) If Yes, provide full details:
4. Has the Applicant at any time during the past three (3) years had any incidents, claims or suits
involving the following and/or is the Applicant aware of any fact, circumstance, situation or incident
related to the following which might give rise to a claim:
(a) Infringement of copyright, trademark, trade dress, rights of privacy or rights of publicity? ............. [ ] Yes [ ] No
(b) Libel, slander or other form of disparagement, arising out the Applicant's web site or other
electronic media?............................................................................................................................. [ ] Yes [ ] No
If Yes, to either of the above provide full details:
IV. IT SYSTEM SECURITY
By attachment provide explanation of any No response.
If an outside service provider is used to manage the Applicant’s IT System, please consult with such outside service
provider when completing these questions.
A. Risk Management & Security Policy
1. Does the Applicant have:
(a) an Executive Risk Committee that provides information security and data oversight?................... [ ] Yes [ ] No
(b) written information security policies and procedures that are reviewed annually? ......................... [ ] Yes [ ] No
2. Does the Applicant perform risk assessments prior to conducting business with external software
companies or service providers?............................................................................................................... [ ] Yes [ ] No