Cyber Insurance Glossary of Terms | Jensten Insurance Brokers
Feefo logo
Feefo logo

Cyber Insurance
Glossary of Terms

Understanding the terminology in your cyber insurance policy is essential for making informed decisions about your cover. This glossary explains key terms you'll encounter when we arrange cyber liability insurance for your business.

Why This Glossary Matters

Cyber insurance policies contain specific terminology that defines exactly what is and isn’t covered. Having a clear understanding of these terms helps ensure you have appropriate protection for your business’s digital risks. Our specialist Tech, Media and Cyber (TMC) team uses this terminology when arranging cover with our panel of insurers, and we’re here to help clarify any questions you may have.

Key Terms by Category

Cover and Limits

Aggregate Limit

The amount stated in your policy schedule as the maximum aggregate amount of any Loss and other covered amounts payable by the Company under each Cover Item and each Cover Item Extension in respect of the Period of Insurance, irrespective of the number of Single Claims, Single Cyber Losses, the number of Sub-Limits (as stated in the Schedule), the number of Per Claim Limits, the number of claimants, number of Insureds making a claim, number of Cover Items and/or Cover Item Extensions claimed under and/or anything whatsoever, including any combination of those things.

Continuity Date

The inception date or, if you have uninterrupted insurance of the same type, the date this insurance was first incepted.

Damages

Includes:

  • Compensatory damages, any award of prejudgment or post-judgment interest and settlements which the Insured becomes legally obligated to pay as a result of a Claim
  • Punitive damages and exemplary damages, but only to the extent such damages are insurable under the laws of the applicable jurisdiction that most favours cover for such damages
  • Payment Card Loss, Consumer Redress Fund and/or Regulatory Fines

Damages does not include:

  • Any amount for which the Insured is not legally obligated to pay
  • Matters uninsurable under the laws pursuant to which this Policy is construed
  • The cost to comply with any injunctive or other non-monetary or declaratory relief, including specific performance, or any agreement to provide such relief
  • The Insured’s loss of fees or profits, return of fees, commissions
  • Royalties, or re-performance of services by the Insured or under the Insured’s supervision
  • Disgorgement of any profit, remuneration or financial advantage to which the Insured is not legally entitled
  • Any amounts other than those which compensate solely for a loss caused by an Act, unless specifically provided for in your Policy
  • Any other consequential loss or damage

All Damages are subject to the applicable Sub-Limit, Per Claim Limit or Aggregate Limit listed on your policy schedule.

Cyber Threats and Events

Botnetting

The unauthorised use of your computer systems by a third party for the purpose of launching a denial of service attack or hacking attack against another third party.

Cryptojacking

The unauthorised use of your computer systems by a third party for the sole purpose of cryptocurrency mining activities.

Cyber Event

Any actual or suspected unauthorised system access, electronic attack or privacy breach, including an attack that utilises artificial intelligence (AI), denial of service attack, cyber terrorism, hacking attack, Trojan horse, phishing attack, man-in-the-middle attack, application-layer attack, compromised key attack, malware infection (including spyware or ransomware), computer virus or actions of a rogue employee.

Cyber Extortion Event

Any credible threat or connected series of credible threats made against the Insured expressing intent to perform or cause, or the actual performance of or causing of, the following:

  • The release, divulgence, dissemination, destruction or use of confidential, sensitive or proprietary information, or personally identifiable information, stored on a Covered Computer System or a Shared Computer System
  • A failure of Network Security on a Covered Computer System or a Shared Computer System
  • The introduction or infliction of a Computer Malicious Act on a Covered Computer System or a Shared Computer System
  • The alteration, corruption, destruction, misappropriation, manipulation of, or damage to, Data, instructions or any electronic information transmitted or stored on a Covered Computer System or a Shared Computer System
  • The restriction or inhibition of access to a Covered Computer System or a Shared Computer System

This is for the purpose of demanding Money or cryptocurrency(ies) from the Insured or otherwise to meet a demand, in exchange for the mitigation or removal of such threat or connected series of threats, or the reversal or termination of the actual performance of such threats or series of connected threats.

Cyber Extortion Event does not include any threats or connected series of threats made against the Insured expressing intent to perform or cause any of the above if made, approved or directed by a member of the Control Group.

Cyber War

Any unauthorised access to or electronic attack on computer systems, carried out by or on behalf of a state, that directly results in another state becoming an impacted state.

Data Breach Event

The theft, loss or unlawful or unauthorised disclosure of personal data.

Malware

Any software, programs, files, content or instructions of a malicious nature including malicious code, ransomware, cryptoware, viruses, trojans, worms, zero day attacks, logic or time bombs which may disrupt, harm, destroy, impede access to or in any way corrupt the functioning or operation of or Data within any software or Computer System.

Neglected Software Exploit

The exploitation of a vulnerability in software, firmware or hardware, where, as of the first known date of exploitation:

  • Such software, hardware or firmware has been withdrawn, is no longer available, is no longer supported by, or has reached end-of-life or end-of-support status with the vendor that developed it; or
  • Such vulnerability has been listed as a Common Vulnerability and Exposure (a “CVE”) in the National Vulnerability Database, operated by the National Institute of Standards and Technology, and a patch, fix, or mitigation technique for such vulnerability has been available to the Insured, but has not been applied by such Insured

For the applicable number of days shown as ranges depending on your policy schedule.

Ransomware

Any extortive demand of Money or cryptocurrency(ies) from the Insured in connection with a:

  • Cyber Incident and/or Business Interruption Incident and/or Cyber Extortion Event and/or Privacy and Network Security Liability that involves malicious software which is designed to block access to a Computer System or Data, or alter, corrupt, damage, manipulate, misappropriate, encrypt, delete, or destroy Data; and/or
  • Credible threat, or series of credible connected threats, to release, divulge, disseminate, or use such data that has been exfiltrated as part of an event described above

Systems and Technology

Computer Systems

All electronic computers used directly by you, including operating systems, software, hardware and all communication and open system networks and any data or websites wheresoever hosted, off-line media libraries and data back-ups and mobile devices including but not limited to smartphones, iPhones, tablets or personal digital assistants. Computer Systems also means supervisory control and data acquisition (SCADA) systems, industrial control systems and other similar operational technology.

Core Infrastructure Failure

Means any:

  • Failure, material degradation or termination of any core element of the internet, telecommunications or GPS infrastructure that results in a regional, countrywide or global outage of the internet or telecommunications network, including a failure of the core DNS root servers, satellite network or the IP addressing system or an individual state or non-state actor disabling all or part of the internet
  • Failure in the power supply, including where the failure is caused by any surge or spike in voltage, electrical current or transferred energy
  • Failure, disruption or reduction in the supply of utilities, including telecommunications, gas and water infrastructure or services

Operator Error

Any unintentional human error in entering or amending electronic data within your computer systems or in the upgrade, maintenance or configuration of those computer systems, where the proximate cause is not physical damage to any tangible equipment or property. “Operator error” does not mean any error in the design or architecture of any computer systems.

System Failure

Any sudden, unexpected and continuous downtime of your computer systems which renders them incapable of supporting their normal business function and is caused by an application bug, an internal network failure or hardware failure.

However, system failure can also mean any sudden, unexpected and continuous downtime of computer systems used directly by a supply chain partner which renders them incapable of supporting their normal business function and is caused by an application bug, an internal network failure or hardware failure.

“System failure” does not mean a cyber event.

Technology Services

The supply by you of technology services to your client, including but not limited to hardware, software, data processing, internet services, data and application hosting, computer systems analysis, consulting, training, programming, installation, integration, support and network management.

Data and Privacy

Data

Any corporate or personal information in any format, including records, reports, designs, plans, formulas, processes, trade secrets, patents, financial information, medical or healthcare information, contact information, account numbers, account histories, passwords or credit or debit card details, whether or not in electronic form, and whether or not belonging to the Insured.

Payment Card Breach

An actual or suspected unauthorised disclosure of payment card data stored or processed by you arising out of an electronic attack, accidental disclosure or the deliberate actions of a rogue employee. This does not mean a situation where payment card data is deliberately shared with or sold to a third party with the knowledge and consent of a senior executive officer.

Personal Data

Means:

  • An individual’s name, national identity number or national insurance number, medical or healthcare data, other protected health information, driver’s licence number, state identification number, credit card number, address, telephone number, email address, account number or passwords; or
  • Any other non-public personal information as defined in the Privacy Regulations

In any format if such information creates the potential for an individual to be uniquely identified or contacted.

Privacy Breach

An actual or suspected unauthorised disclosure of information (including information in electronic, paper or audio format) arising out of an electronic attack, accidental disclosure, theft or the deliberate actions of a rogue employee or third party. “Privacy breach” does not mean a situation where information is deliberately shared with or sold to a third party with the knowledge and consent of a senior executive officer.

Privacy Regulations

Laws and regulations applying anywhere within Great Britain, Northern Ireland, the Isle of Man or the Channel Islands associated with the care, custody, control or use of Personal Data.

Financial Terms

Betterment

Putting you in a better financial position as a result or you benefitting from upgraded versions of your computer systems.

Chargebacks

Any charges by any credit card company or bank, wholly or partially, reversing or preventing a payment transaction.

Consumer Redress Fund

A sum of money that the Insured is legally obligated to deposit in a fund as equitable relief for the payment of any Claim by consumers against the Insured as a consequence of a Privacy and Network Security Liability due to an adverse judgment or settlement of a Regulatory Proceeding.

Consumer Redress Fund does not include any sums paid which constitute taxes, fines, penalties, injunctions or sanctions.

Costs and Expenses

Means:

  • Third party legal and professional expenses (including disbursements) reasonably incurred in the defence of claims or circumstances which could reasonably be expected to give rise to a claim or in quashing or challenging the scope of any injunction, subpoena or witness summons
  • Any post judgment interest
  • The cost of appeal, attachment and similar bonds including bail and penal bonds

Subject to all costs and expenses being incurred with the insurers prior written agreement.

Income Loss

Your income that, had the cyber event, system failure or operator error which gave rise to the claim not occurred, would have been generated directly from your business operations (less sales tax) during the indemnity period or reputational harm period, less:

  • Actual income (less sales tax) generated directly from your business operations during the indemnity period or reputational harm period; and
  • Any cost savings achieved as a direct result of the reduction in income

Increased Cost of Working

Your reasonable sums necessarily incurred in addition to your normal operating expenses to mitigate an interruption to and continue your business operations, provided that the costs are less than your expected income loss sustained had these measures not been taken.

Loss

Any direct financial loss sustained by the company.

Time Periods

Indemnity Period

The period starting from the first occurrence of:

  • The computer systems downtime; or
  • The downtime of computer systems used directly by a supply chain partner

And lasting up to the period stated as the indemnity period in the Schedule.

Period of Indemnity

The period during which the Insured incurs Business Interruption Loss or Data and System Recovery Costs, beginning with when the Business Interruption Incident occurs.

Reputational Harm Period

The period starting from when the cyber event is first discovered and lasting for the period stated as the reputational harm period in your policy schedule.

Other Key Terms

Dishonest Act

Any actual or alleged criminal, dishonest, fraudulent or malicious conduct committed by any person or organisation.

Dishonest Act does not include damages, loss, cost or expense incurred as a consequence of acts carried out with the consent or prior knowledge of any senior manager, director or partner, or spouse of any officer, director or partner of the Insured.

Impacted State

Any state that suffers a major detrimental impact on its: ability to function; or defence and security capabilities; as a direct result of any unauthorised access to or electronic attack on computer systems, carried out by or on behalf of another state.

Independent Expert

A suitably qualified lawyer or accountant with a minimum of 5 years’ experience in the subject matter of the claim.

Media Content

Any content created or disseminated by you or on your behalf, including but not limited to content disseminated through books, magazines, brochures, social media, billboards, websites, mobile applications, television and radio. This does not include any:

  • Tangible product design
  • Industrial design
  • Architectural or building services
  • Any advertisement created by you for a third party
  • Business, company, product or trading name
  • Product packaging or labelling
  • Software products

Regulatory Investigation

A formal hearing, official investigation, examination, inquiry, legal action or any other similar proceeding initiated by a governmental, regulatory, law enforcement, professional or statutory body against you.

Senior Executive Officer

Board members, C-level executives, in-house lawyers and risk managers of the company.

Supply Chain Partner

Any:

  • Third party that provides you with hosted computing services including infrastructure, platform, file storage and application level services; or
  • Third party listed as a supply chain partner in an endorsement attaching to this policy which we have issued

Third Party

Any person who is not an employee or any legal entity that is not the company.

War

Any physical:

  • War, invasion, acts of foreign enemies, hostilities or warlike operations (whether war is declared or not), civil war, rebellion, insurrection, civil commotion assuming the proportions of or amounting to an uprising, military or usurped power; or
  • Action taken in controlling, preventing, suppressing or in any way relating to the above

Need Further Clarification?

Understanding cyber insurance terminology is crucial for ensuring your business has appropriate protection. Our cyber insurance experts are here to help explain these terms in the context of your specific business needs and the cover we can arrange for you.

If you have questions about any of these terms or would like to discuss how cyber insurance could protect your business, please contact us. 

Questions?

Ready to protect your scale-up with insurance that matches your ambition? Contact us today to start a conversation. Let’s build a insurance roadmap that powers your growth and reflects your values.

Need Technology Insurance?

Our team are here to help