TITLE

The POLICY for PROTECTION

AUTHOR(S)
Breidenbach, Susan
PUB. DATE
October 2000
SOURCE
Network World;10/23/2000, Vol. 17 Issue 43, p79
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on business insurance products designed to protect companies from business losses caused by computer network failures and computer network security problems as of October 23, 2000. Categories of information technology insurance; Amount of damages covered by cyber insurance.
ACCESSION #
3848059

 

Related Articles

  • PROTECT AND SURVIVE. Bolton, Lesley // Accountancy;Aug1992, Vol. 110 Issue 1188, p54 

    Reports on the range of insurance cover available for corporate computer systems in Great Britain. Importance of proper insurance provision for computer systems; Scope of coverage offered by insurers; Types of computer-related risks covered under various policies. INSET: THE FACILITIES...

  • Insuring Your PC Against Hackers. Hodges, Jane // Fortune;5/24/1999, Vol. 139 Issue 10, p282 

    Describes insurance policies for corporate digital assets in the United States. Computer-crime policies from Chubb, Travelers, and Cigna; Chance the policies will be claimed; How companies can fight cybercrime.

  • International business package for U.S. businesses expanding abroad available from reliance.  // Insurance Advocate;01/30/99, Vol. 110 Issue 5, p8 

    Announces the computer and electronic equipment insurance coverage launched by The Hartford Financial Services Group for businesses in the United States. Impetus for the coverage's development; Option offered for customers; Terms of the coverage.

  • Many Moving Parts. Allport, George // Best's Review;Feb2014, Vol. 114 Issue 10, p52 

    The article looks at the application of cyber risk to insurance policies and the protection they may afford. It explores the complexity of managing exposures created by cyber activities due to the fast-growing business environment, which are highly networked with the proliferation of mobile...

  • Are you sure you're insured? Mamis, Robert A. // Inc.;May94, Vol. 16 Issue 5, p160 

    Looks into the rider offered by Utica National Insurance Group (in conjunction with Boston Computer Society) to its homeowner's or renter's insurance that covers business computer equipment in the home and off-premises on an all-risk, replacement-cost basis. Big rise in telecommuting but not in...

  • It's OK...it's insured. Zucker, Paul // Australian PC User;Aug2004, Vol. 16 Issue 8, p130 

    Presents advice on insurance coverage policies with regard to computers. Background on the general policy that covers computer gears; Significance of having a discussion with an insurance company regarding policy coverage; Limit of coverage for equipment used in a home-based business; Function...

  • ANTHEM CYBER BREACH MAY TIGHTEN UNDERWRITING. GREENWALD, JUDY // Business Insurance;2/16/2015, Vol. 49 Issue 4, p0001 

    The article reports on the massive data breach facing health care company Anthem Inc. in the U.S. in 2015. Topics covered include the possible increase in the rates imposed by American International Group Inc. whose Lexington Insurance Co. is the primary cyber insurer for Anthem, the statement...

  • Canning Breaches. Meckbach, Greg // Canadian Underwriter;Aug2015, Vol. 82 Issue 8, p6 

    The author discusses the issues of rising insurance liability risk from information security violations for commercial insurance providers in Canada. Topics discussed include a report of the market research firm ABI Research regarding global market for cyber insurance, passage of the Digital...

  • Products & Services.  // Business Insurance;12/9/2002, Vol. 36 Issue 49, p16 

    Presents information on various insurance-related product and services developed in U.S. Web-based return-to-work software program developed by General Management Solutions Inc. in Richmond, Virginia; Utility of a web-based application developed by Travelers Property Casualty Corp. in Hartford,...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics