chubb

Cyber Insurance

Cyber Insurance

Technology makes life easier. It also brings more risk. A cyber policy provides a range of coverages to help protect you and your family. It can help cover expenses related to a cyber-attack, such as identity theft, fraud, ransomware, cyberbullying and more.

Chubb Studio can help meet your cyber coverage needs. You can get $10,000, $25,000 or $50,000 of coverage. There's no deductible for identity theft and a $250 deductible for other coverages.

Policy coverages

Chubb Studio offers a range of protections for you, your information, and your wallet. Take a look at these examples to get an idea of how cyber insurance might help you.

What's covered?

Cyber Extortion

When your computer is hacked and you can't access it unless you pay someone, also known as a ransomware attack. Or when someone accesses your personal data and threatens to release it publicly unless you pay them. Cyber insurance may help pay the ransom.

Cyber Financial Fraud

When a hacker steals cash from your bank account or makes fraudulent charges on your debit card. Cyber insurance may help reimburse you.

Deceptive Transfer Fraud

When you receive a fraudulent invoice from someone pretending to be a person or company you do business with. If you transfer cash or investments to them, cyber insurance may help reimburse you.

Cyber Breach of Privacy

When someone hurts your reputation by publishing personal or false information online. Cyber insurance may help pay for remediation services, legal fees and loss of income.

Cyberbullying

When someone harasses you or your child online. It can happen to anyone at any age. Cyber insurance may help pay for psychiatric services, lost wages and, if needed, relocation services.

Cyber Disruption

When a hacker accesses your smart home system and forces you to find a temporary place to live. Cyber insurance may help pay for relocation expenses.

Identity Theft

When someone steals your identity and takes out loans or credit cards or applies for services under your name. Cyber insurance may help pay for services to restore your identity.

Electronic Data Restoration

When a hacker accesses your computer and deletes or corrupts your data. Or when you accidentally download malware that deletes or corrupts your data. Cyber insurance may help pay to restore it.

Electronic Device Replacement

When someone is fixing your computer and installs the wrong program, making your computer unusable. Cyber insurance may help pay for a replacement.

What's not covered?

Prior Knowledge

Losses resulting from circumstances that you knew about before having continuous cyber coverage provided by Blink.

Pursuit or Holding of Public Office

Losses resulting from running for or holding an elected public office.

Confiscation

Losses resulting from a government or public authority taking or destroying your property.

Insolvency

Losses resulting from a financial institution's financial difficulties or restructuring.

Digital Currencies

Losses resulting from any activity involving digital currency that isn't authorized by a sovereign government as part of its currency, such as Bitcoin and Ethereum. An exception is made where digital currency is paid to extortionists as ransom under the Cyber Extortion coverage part.

Liability to Others

Losses resulting from property damage or personal injury that affects others, and for which you may be legally liable or responsible. An exception is made for costs covered under the Cyber Financial Fraud coverage part.

Travel Restriction

Losses you experience while in a place designated as a “Do Not Travel” area by the Bureau of Consular Affairs of the U.S. Department of State. This applies whether or not the loss is directly related to or in the location of such travel.

Property Damage

Losses resulting from physical injury to, or the destruction of, physical property. Also excludes losses from your resulting inability to use that property.

Acts by Certain People

Losses resulting from a malicious or fraudulent act, including a cyberattack, by:

  • A family member
  • A current or former guardian
  • A current or former spouse or domestic partner
  • Anyone who currently lives or previously lived with you
  • Anyone acting on behalf of these individuals

Also excludes losses resulting from a cyberbullying occurrence by an employer or coworker, or losses resulting from anyone acting on behalf of a civil authority

Investment, Gambling and Transactional Losses

Losses (excluded under the cyber financial fraud and deceptive transfer fraud coverage parts) you experience when:

  • Your investments decrease in value.
  • Someone misleads you about the value of a product, service or investment.
  • Someone doesn't pay a loan you made to them.
  • Someone fails to perform as agreed by contract.
  • The U.S. Postal Service or a courier service loses money, financial securities or physical property.
  • A product or service you purchased fails or malfunctions.
  • You have gambling losses.

Business Activities

Losses resulting from business activities. An exception is made for losses resulting from a cyberattack that interrupts your incidental business. An incidental business is one you run in whole or in part from your home.

Widespread Events

Losses experienced as a result of a widespread event aren't covered. A widespread event is a single attack or failure that impacts a wide range of unrelated people or businesses. It can be caused by one person or a group.

The coverage examples included above are intended to show the types of situations that may result in claims. They shouldn't be compared to an actual claim. Whether or to what extent a particular loss is covered depends on the facts and circumstances of the loss, the terms and conditions of the policy as issued and applicable law.

Sample documentation

Chubb Studio API Operations

You will be able to test our APIs in the Sandbox below. To get started, you will be required to get a bearer token/JSON Web Token (JWT) which can be requested using the “Authentication” operation. After you have requested the token, it can be used to authorize all test transactions. Copy and paste the token response from the Authentication operation using the “Authorize” button. Once complete, click the “Try it out” button to run the sample request and receive a response. All the other required fields are already prefilled in the headers for each operation in the Sandbox.