Posts

PSA Insurance & Financial Services

PSA Insurance & Financial Services

https://geniusproessays.com/

PSA Insurance & Financial Services: ProTech Cyber App v 1.2 1

PSA Insurance & Financial Services ProTech Cyber App

Version 1.2 June 2021

 

Basic Company Information

1. Company Name: 2. Year Established

3. Address:

4. Website:

5. Annual Revenue (Prior Year, Current Year or Projected is acceptable):

6. In what regions do you operate? United States Other (please list):

7. Business Type Public Private Not for Profit

8. Authorized Officer (signing this application):

Email:

Title:

Phone:

9. Number of Full Time Employees:

10. Total number of part-time employees (if any):

11. What is your primary industry?

12. Do you primarily provide: Products Services Other:

13. Please list any person or entity you would like to cover under this policy other than your employees? (Such as joint ventures with more than 50% ownership, vendors, independent contractors, etc.)

 

Cyber Insurance Policy Information

1. Desired Policy Effective Date:

2. Does your organization currently purchase cyber insurance?

Yes No – proceed to question 3

a. Current Cyber Insurance Carrier:

b. Policy Aggregate Limit: c. Deductible/Retention:

 

3. I am interested in a cyber insurance quote for the following options (if not sure leave blank):

a. Option 1: $ Aggregate Limit $ Deductible/Retention

b. Option 2: $ Aggregate Limit $ Deductible/Retention

c. Option 3: $ Aggregate Limit $ Deductible/Retention

Manufacturing Example

$20,000,0000

30

Manufacturing

None

January 1, 2023

1,000,000

3,000,000

✔ ✔

10,000

10,000

2,000,000 10,000

2001

 

 

ProTech Cyber App v 1.2 2

Payment Card Processing

1. Do you process credit, debit card or gift card payments (If you answer no to this question please proceed to next section B)

Yes No

2. Estimated number of credit card transactions processed annually? Enter # Here:

3. What is your PCI-DSS Merchant Level: 1 2 3 4 Not Sure

4. Are you PCI Compliant Yes No N/A If yes what is your certification date:

5. Do you use a 3rd party or service provider to process payments? Yes No

a) If yes, please list vendor names:

b) Are all vendors PCI-DSS and or PA-DSS compliant? Yes No Not Sure

Sensitive Data

What kind of sensitive data do you store, process or handle:

Stored Credit/Debit Card Info

Yes No

Employee Info (SSN, Health Insurance, HR, Etc.)

Yes No

Bank Accounts & Financial Info

Yes No

Non-Employee SSN or PII

Yes No

Non-Employee Medical/Health Insurance Information

Yes No

If YES are you HIPAA Compliant?

Yes No N/A

Confidential Business Info

Yes No

Other (User Name & Passwords, Biometric, IP Address, Demographic Info, etc.):

Yes No Describe:

Sensitive Personal Data Record Count (e.g. How many individuals could be identified by the data you hold?): Provide an estimated range of unique individuals (current clients, inactive clients, employees past/present, etc.) that could be identified by the sensitive personal data you collect, manage or store (physically & electronically) or entrust to a cloud service provider or 3rd party? Click on the appropriate button below.

0 – 99 100 – 1,999

2,000 – 4,999

5,000 – 14,999 15,000 – 29,999

30,000 – 59,999

60,000 – 99,999

100,000 – 299,999

300,000 – 499,999

500,000 – 999,999

1M + 2M + 3M + Other:

Confidential Business Information (e.g. information protected by a Non-Disclosure Agreement, mutual understanding, contractual requirement, etc.): Click on the button below that most closely represents the estimated range of confidential business data you collect, manage or store (physically & electronically) or entrust to a cloud service provider or 3rd party?

0 – 99 100 – 1,999

2,000 – 4,999

5,000 – 14,999 15,000 – 29,999

30,000 – 59,999

60,000 – 99,999

100,000 – 299,999

300,000 – 499,999

500,000 – 999,999

1M + 2M + 3M + Other:

Total Estimated Sensitive Data Record Range (sum of selections from questions 1 & 2) =

100

Stripe

2,000

 

 

ProTech Cyber App v 1.2 3

Cybersecurity & Media Controls

1. Does your organization regularly backup critical data?

How often do you backup critical data? How long do you retain backups?

Yes No

2. Do you have a process to review blogs, social posts and other content before posted? Yes No N/A

3. Have all trademarks, domain names, logos and other service marks been screened to ensure they do not infringe on the intellectual property rights of others?

Yes No N/A

4. Do all employees participate in regular (at least annual) cybersecurity awareness training? Yes No

5. Who manages cybersecurity for your organization?

Internal Cyber/IT Professional External Cyber/IT Consultant Internal Other Title (CFO, CEO, COO, etc):

6. Are all workstations protected with up to date antivirus software? Yes No

7. Do you use cybersecurity technology, such as Firewalls, to protect your corporate network? Yes No

8. Do you use: Intrusion Detection Technology Yes No IP/URL Filtering technology Yes No

9. Are endpoints (laptops/desktops used by employees for business purposes) protected with Endpoint Detection & Response (EDR), Secure Access Service Edge (SASE), or other technology over and above antivirus software?

Yes No

10. Do you regularly check for security patches/updates to your systems (software, hardware, cloud applications, etc.) and patch according to provider recommendations?

Yes No

11. Do you encrypt sensitive data:

At Rest Yes No In Transit Yes No On Mobile Devises Yes No In the Cloud Yes No

12. Is Multi-Factor Authentication used for (check all that apply):

Email Remote Access/VPN Essential Cloud/SaaS Business Applications

13. Please let us know what network/data/cybersecurity policies you currently have in place (select all that apply):

Acceptable Use Backup & Retention Privacy Policy

Data Security Policy Network Security Document Retention & Destruction

Risk Assessment & Management Vendor Due Diligence Bring Your Own Device (BYOD)

Disaster Recovery Business Continuity Cyber Incident Response Plan

14. Does your organization comply with any cybersecurity industry standards or frameworks? Yes No

If yes please provide name of standard(s), framework(s) or description:

weekly 30 days

✔ ✔

✔ ✔ ✔

We have several contracts with the Department of Defense and through this we are required to be CMMC compliant. We are CMMC Level 1 compliant, but are working on additional controls now.

 

 

 

ProTech Cyber App v 1.2 4

Cybercrime Controls

1. Do you have a policy in place where all changes to client or vendor payment instructions are authenticated by a method other than email?

Yes No

2. Does Applicant verify all vendor and supplier bank accounts by a direct call to the receiving bank, prior to accounts being established in the accounts payable system?

Yes No

3. Is approval by more than one person required to initiate a wire transfer? Yes No

Claims and Loss History

1. Have you experienced a theft or unintended release, disclosure or loss of protected records in the past three years?

Yes No

2. Have any claims, suits or proceedings been made during the past three years against you or any of your predecessors in business or subsidiaries for which coverage would be available under a policy applicable to Errors & Omissions or Network Security and Privacy Liability?

Yes No

 

3. Are you aware of any information, facts, circumstances or incidents that could result in a claim against the policy for which you are applying?

Yes No

4. If you answered “yes” to these questions, please use the space below to provide additional information in the notes section at the end of this application.

 

Fraud Warning

By signing this application, the applicant warrants to the company that all statements made in this application and attachments hereto about the applicant and its operations are true and complete, and that no material facts have been misstated or misrepresented in this application, suppressed or concealed. The undersigned agrees that if after the date of this application and prior to the effective date of any policy based on this application, any occurrence, event or other circumstance should render any of the information contained in this application inaccurate or incomplete, then the undersigned shall notify the company of such occurrence, event or circumstance and shall provide the company with information that would complete, update or correct such information. Any outstanding quotations may be modified or withdrawn at the sole discretion of the company.

Completion of this form does not bind coverage. The applicant’s acceptance of the company’s quotation is required before the applicant may be bound and policy issued. The applicant agrees that this application, if the insurance coverage applied for is written, shall be the basis of the contract with the insurance company, and deemed to be part of the policy to be issued as if physically attached thereto. The applicant hereby authorizes the release of claims information from any prior insurers to the company. Signatures

Authorized Signature: Print Name & Title:

Date (MM/DD/YY):

Email:

 

Phone:

 

 

 

 

 

ProTech Cyber App v 1.2 5

Notes: