Cyber Liability Protection
As a leader of an organization, you may have files full of confidential papers or a computer folder that houses credit card numbers or other personal information. Unfortunately, it is becoming all too common these days for hackers to retrieve that information through computer systems or files to end up in the wrong hands. Church Mutual has recognized the need to protect their customers from any potential data breaches and has the relevant coverage in place to protect your most important files.
Church Mutual's partnership with Beazley
Church Mutual now provides cyber liability coverage under your multi-peril policy. We offer affordable, extensive coverage when the personal and private information your organization stores on computers is compromised or stolen. Claims are managed by Beazley's award winning claims team.
Both Church Mutual and Beazley are rated A (Excellent) by A.M. Best, the industry's leading analyst.i Church Mutual is the leading insurer of religious institutions, insuring nearly twice as many religious institutions as its closest competitor. Beazley is an industry leader in privacy and security coverage. We are confident that this partnership will continue bringing you the excellent service from Church Mutual that you have come to expect.
Beazley Breach Response (BBR) Services
A data breach isn't always a disaster. Mishandling it is.
When your organization suffers a data breach, our first concern is to handle the breach in a way that upholds your confidence. Beazley pioneered data breach insurance that focuses first and foremost on response and has a dedicated in-house business unit that focuses exclusively on helping you manage data breaches effectively.
The BBR Services team focuses on coordination of expert forensic, legal, notification and credit monitoring services that you need to satisfy data and privacy legal requirements and reassure your organization. In addition, the policy covers certain loss arising from a regulatory proceeding, the risk of which may be reduced by a well-coordinated breach response but can never be completely eliminated. Besides coordinating data breach response, BBR Services is responsible for maintaining and developing Beazley's suite of risk management services, designed to minimize the risk of a data breach occurring.
Beazley invented this comprehensive approach and has helped more than 12,000 clients manage data breaches swiftly and successfully.
Think data breach can't happen to you? Think again.
Just take a look at the following examples to learn why everyone should have appropriate coverage.
Data breach at an assisted living facility
The United States Secret Service identified a potential HIPAA breach that may have compromised data for 100 residents. As a result, an experienced team of dedicated cyber claims specialists quickly engaged a breach coach and a forensic investigator. Knowledgeable partners helped ensure the incident was properly handled and reported to the state regulatory agencies.
A pastor's laptop - stolen
A pastor's laptop containing members' private financial information was stolen from his home. As a result, members sued the church for damages resulting from alleged failure to protect their private financial information.
A malware data breach at a conference center
A conference center's computer system was compromised when a third party sent a malware program via email to a number of employees. The invasive software allowed the third party to access the system and capture the names, addresses and credit card numbers of more than 500 guests.
Theft by an employee
A private school secretary stole a donor's credit card information, resulting in a forensic investigation, a lawsuit and a Payment Card Industry (PCI) fine. The total cost of investigation, fine and settlement approached $50,000.
A costly mistake
A staff member at an assisted living facility commented on a resident's health matter on a social media site. The HIPAA violation and resulting legal expenses exceeded $250,000.
An online bookstore hacked
An online religious bookstore had its transaction processing system hacked. Thieves collected credit card data over the course of one year before the Secret Service notified the retailer's manager. A credit card company issued thousands of dollars of PCI-related contractual fines and penalties to the payment processor who, in turn, contractually passed the obligation to the bookstore.
Paper records stolen
A lockbox containing employee and direct deposit information was stolen from the main office. As a result, current and former employees' personally identifiable information including social security numbers was taken. Legal obligations may include notifications and credit monitoring for current and former employees
How to file a claim
If you feel your organization has experienced a cyber-related concern such as one of those noted above, reach out to our Claims Center at (800) 554-2642 and select Option 2, or click the link to file an online report.
Church Mutual Articles
- Data security
- Developing more effective Internet use policies
- Be Aware of a Cyber Attack
- Protecting Against Cyber Liability and Data Breach
We're here for you
Our liability insurance and protection services focus on your protection and include prevention education, coverage for data loss or theft, identity theft related to a cyber loss and post-loss data recovery. For assistance, visit churchmutual.com or contact our Risk Control Consulting and Research Center at (800) 554-2642, ext. 5213, or firstname.lastname@example.org.
© Copyright, Church Mutual Insurance Company, S.I., 2017. All rights reserved. Church Mutual Insurance Company, S.I. NAIC #18767; California Company ID # 2867-0
i Additional information concerning AM Best ratings can be found at ambest.com
Claims handling and breach response services are provided by Beazley USA Services, a member of Beazley Group. Beazley USA Services does not underwrite insurance for Church Mutual Insurance Company. Policies purchased through Church Mutual Insurance Company are subject to Church Mutual Insurance Company’s underwriting processes.