Technology allows businesses to be agile, more efficient, and offer a better customer experience. In today’s digital and inter-connected world, businesses rely on data and networked computer systems. Medical facilities, like dental offices, have personal health and financial information making them targets for cybercrime and data breaches. Would you be prepared if your business experiences a breach? As we all know from the news, even large companies aren’t always ready to respond. Yet when a data breach or cyberattack occurs, time is of the essence.
Let’s take a look at the different data security products that can help protect you and your dental practice:
Data Compromise coverage is designed to help businesses notify and assist their clients and others following a breach of personal identifying information. Response Expense coverage:
- Covers the cost of notifying clients, employees, and others affected by the breach; and
- Provides coverage for specialized services such as credit monitoring and identity restoration that help businesses retain their clients’ and employees’ trust and goodwill following a breach.
Defense and Liability coverage responds to third party actions brought against the insured by individuals affected by the breach.
CyberOne coverage protects businesses against damage to electronic data and computer systems from a virus or other computer attack. It also protects a business’ liability to third parties that may have suffered damage due to security weaknesses in the business’ computer system.
As part of our Data Compromise and CyberOne coverages, we offer a free online portal, eRiskHub, that equips you with risk management tools to help you plan and be prepared should the unexpected happen to your business. With eRiskHub, you can better understand your risks and establish a Response Plan to manage the costs and minimize the effects of a breach or cyberattack. Key features of the eRiskHub Portal include:
- Incident Response Plan Roadmap – includes suggested steps to take following a network or data breach incident.
- Online Training Modules – ready-to-use training for business owners on privacy best practices and Red Flag Rules.
- Risk Management Tools – assist in managing your breach and cyber risks; includes a self-assessment and guide to state breach notification laws.
- News Center – cyber risk stories, security and compliance blogs, security news, risk management events, and helpful industry links.
- Learning Center – articles, white papers and webinars from leading technical and legal practitioners.
- eRiskHub Resources – a directory of external resources with expertise in pre and post-breach disciplines.
- TechQ – a HelpDesk function for businesses, offering assistance for a wide range of technology issues from virus removal, to internet connectivity problems, even setting up a new wireless network.
|Data Compromise Coverage||CyberOne Coverage|
|Beneficiary||Commercial entity||Commercial entity|
|First Party – Information Covered||Private financial and other information relating to individual people (employees and customers)||Business operational software, operating systems, and electronic data|
|First Party – Trigger|
Loss/theft/inadvertent release of personal information by the way of:
Damage or destruction of business operational data and software by way of a computer attack:
|Summary of First Party Coverage Response||Forensic IT and legal consultation expenses, expenses related to notifying affected individuals and providing credit monitoring and other services to affected individuals, public relations expenses||Cost of recovering from the computer attack, including the recovery of data, the repair of systems, loss of business, and public relations|
|Third Party Trigger||Insured’s receipt of a third party suit or claim arising out of the first party triggering event|
Insured’s receipt of a third party suit or claim alleging that a failure of the insured’s computer security allowed one of the following to occur:
|Summary of Third Party Coverage Response||Cost of defense (within coverage limits), costs of settlement or judgment||Cost of defense (within coverage limits), costs of settlement or judgment|
With a response plan and instant access to informative resources, you’ll be ready to more efficiently and cost-effectively respond to and recover from a data breach or cyberattack.