Cyber Extortion

Cyber Extortion is a type of cyber attack in which someone threatens to share, destroy, or use proprietary or personal data; or restrict access to your electronic data or electronic device unless you pay a ransom.

You’re covered for:

  • Money or digital currency paid to the extortionists as ransom.
  • Fees you pay to hire the following professional services:
  • Digital forensic analyst to help with prosecution
  • Cybersecurity consultant
  • Reputation management firm
  • Legal counsel
Example: A hacker accesses your personal data and threatens to release it publicly unless you pay ransom money.

Cyber Financial Fraud

Cyber Financial Fraud occurs when one or all of the following result from a cyber attack:

  • Funds are stolen from a financial account you own.
  • Fraudulent charges are found on a payment card or financial account you own.
  • Your U.S. tax refund is paid to someone pretending to be you.

You’re covered for:

  • The market value of non-recoverable personal property.
  • Legal liabilities owed to third parties resulting from identity loss, theft, or fraud.
  • Missing tax refunds, financial account funds, or extra charges on a payment card.
  • Costs and fees associated with identity theft and identity recovery services.
Examples: Money is digitally stolen out of your bank account and fraudulent charges are found on your debit card.

Your tax refund is deposited into an account that belongs to a person pretending to be you.

Deceptive Transfer Fraud

Deceptive Transfer Fraud occurs when someone misleads you into transferring personal property, account funds, or other assets to them. The scam is performed by a criminal impersonating a person, business, or organization that you recognize and would reasonably expect to be in contact with for a legitimate purpose.

You’re covered for:

  • The market value of non-recoverable personal property. 
  • Legal liabilities owed to third parties resulting from identity loss, theft, or fraud.
  • Missing tax refunds, financial account funds, or extra charges on a payment card.
  • Costs and fees associated with identity theft and identity recovery services.
Example: A criminal pretending to be an auto repair business you patronize sends you a fake bill and tricks you into transferring money to their bank account.

Cyber Breach of Privacy

Cyber Breach of Privacy occurs when private information, personal information, or false information about you is published on the internet, and it:

  • Hurts your reputation
  • Puts your physical safety or home at risk
  • Leads to your:
  • Wrongful termination
  • False arrest
  • Unwarranted discipline by an educational institution
  • Inability to attend work or school for more than one week as a result of mental suffering diagnosed by a mental health professional.

You’re covered for:

  • Cost of psychiatric services
  • Cost of recovery services prescribed by a mental health professional
  • Reimbursement for lost wages
  • Expenses for temporary relocation
  • Fees paid for the following professional services:
  • Digital forensic analyst to help with prosecution
  • Cybersecurity consultant
  • Reputation management firm
  • Legal counsel
Example: Your reputation is damaged and you are suspended from work because false personal information about you is published online.

Cyber Bullying

Cyber Bullying occurs when you are harassed or intimidated more than once involving the use of an electronic device, and it leads to your:

  • Wrongful termination
  • False arrest
  • Unwarranted discipline by an educational institution
  • Inability to attend work or school for more than one week as a result of mental suffering diagnosed by a mental health professional.

You’re covered for:

  • Cost of psychiatric services
  • Cost of recovery services prescribed by a mental health professional
  • Reimbursement for lost wages
  • Cost of private tutoring
  • Expenses for temporary relocation
  • Fees you pay to hire the following professional services:
  • Digital forensic analyst to help with prosecution
  • Cybersecurity consultant
  • Reputation management firm
  • Legal counsel
Example: You are fired and arrested because of repeated online harassment and false statements posted on social media claiming you committed a crime.

Identity Theft

Identity Theft occurs when someone illegally uses your identity or personally identifiable information (PII) without your consent in order to commit fraud or other crimes.

You’re covered for:

Any reasonable and necessary costs to recover, reclaim, and restore your financial identity and credit history, including:

  • Notary fees
  • Certified mailing fees
  • Application fees for denied loans
  • Telephone expenses
  • Reimbursement for lost wages
  • Legal counsel
  • Reimbursement for identity theft relief and credit repair/monitoring services
  • Additional fees with approval
Example: A hacker steals your identity by collecting multiple pieces of personally identifiable information via social media and breaching your movie streaming account. The hacker applies for multiple credit cards and personal loans racking up significant debt and damaging your credit history.

Cyber Disruption

A Cyber Disruption occurs when you are the victim of a cyber attack that interrupts your:

  • Home automation system, affecting your ability to access or live in your home. 
  • Incidental business or a small side business run from your home.

You’re covered for:

  • Cost of psychiatric services
  • Reimbursement for lost wages
  • Expenses for temporary relocation
  • Expenses for temporarily relocating your incidental home business
Example: Your home automation system is compromised when a hacker breaches a smart thermostat. You are forced to temporarily find another place to live because the hacker has gained control of the electronic door locks.

Electronic Data Restoration

Electronic Data Restoration will pay the cost to restore electronic data damaged by a cyber attack or a cyber failure.

Example: You accidentally download malware embedded in an email and all of the pictures and data on your smartphone get deleted.

Electronic Device Replacement

Electronic Device Replacement will pay to replace or fix an electronic device that is damaged by a cyber attack or a cyber failure while the device is in your possession or on your premises. Coverage does not include upgrading your device.

Example: Your laptop needs routine maintenance, but the computer repair technician accidentally damages the keyboard, rendering it unusable.

Cyber Insurance for Individuals

Cyber Insurance for Individuals

Protection from the dangers you face online.
  • Cyber Fraud & Extortion
  • Phishing & Online Scams
  • Robocall Imposter Scams
Start Your Free Quote
Essential cyber protection starting at $5.28/mo

Get protection for your
do-everything-online life.

Personal Cyber Insurance protects the digital pieces of your life. Every time you log online, your private information and personal data are openly shared with the whole world. The information and data you unknowingly reveal can be collected by criminals and used to commit identity and financial crimes. Anyone who uses the internet is susceptible to cyber crime.

  • Using a credit card to shop online
  • Engaging with social media
  • Utilizing rideshare & delivery apps
  • Logging onto free public WiFi
  • Sharing passwords & accounts
  • Using banking & credit monitoring apps
...all put you at risk.

Cyber threats are on the rise

327,102,046
Number of individuals impacted by cyber fraud in 2020.1
1,387,615
Number of Americans that fell victim to identity theft in 2020.2
18.5 million
Average number of online records that are compromised each day.3

The freedom to tackle your to-do list, shop, stream, and surf the web without worry.

What does Personal Cyber Insurance coverage look like?

Cyber Extortion

What is it?
A hacker accesses your personal data and threatens to release it publicly unless you pay ransom money.

Cyber Financial Fraud

What is it?
Money is digitally stolen out of your bank account and fraudulent charges are found on your debit card.

Deceptive Transfer Fraud

What is it?
A criminal pretending to be an auto repair business you patronize sends you a fake bill and tricks you into transferring money to their bank account.

Cyber Breach of Privacy

What is it?
Your reputation is damaged because false personal information about you is published online.

Cyber Bullying

What is it?
You are wrongfully fired or arrested because of repeated online harassment and false claims on social media.

Identity Theft

What is it?
A hacker steals your identity and applies for multiple credit cards and personal loans.

Cyber Disruption

What is it?
Your home automation system is compromised when a hacker breaches a smart thermostat, and you’re forced to temporarily find another place to live.

Electronic Data Restoration

What is it?
You accidentally download malware embedded in an email and all of the pictures and data on your smartphone get deleted.

Electronic Device Replacement

What is it?
Your laptop needs routine maintenance, but the computer repair technician accidentally damages the keyboard, rendering it unusable.

One policy, multiple people covered.

Get coverage for the people you interact with most.

Protect aging parents, grandparents, children, and other people that are vulnerable to online scams when they’re named on your policy. Choose the option that best fits your needs:

Me + My Household

Coverage for you + one person living in your household + dependents.
Add one spouse, family member, or domestic partner + your dependents to the policy and everyone is covered! “Family plan” coverage is standard with no additional fees or premiums.

Me + My Household + My Shared World

Coverage for you, dependents, and people from multiple households.
Add friends and family members to your policy wherever they live! Coverage can extend to 5 friends or relatives of your choosing living in any US household.

Cyber insurance is now available to everyone, not just big businesses.

Data is a hacker’s primary target, regardless of who or where it comes from.

I don't own a business. Do I have data?
Yes, everyone has data. Data is a term used to describe personal information exchanged online, like the information you provide while scheduling a doctor’s appointment or shopping. Data can also be personal information that is saved online, saved on physical hardware, or stored on the cloud.

What are examples of personal data?
Examples of personal data, sometimes called Personally Identifiable Information (PII) can include names, mailing addresses, email addresses, billing information, medical information, financial information, social security numbers, images, videos, and phone numbers. Transcripts of communication via text, email, and social media can also be considered personal data.
I don't own a business. Do I have data?
Yes, everyone has data. Data is a term used to describe personal information exchanged online, like the information you provide during check out while shopping, or scheduling a doctor’s appointment. Data can also be personal information that is saved online, saved on physical hardware, or stored on the cloud.

What are examples of personal data?
Examples of personal data include names, mailing addresses, email addresses, billing information, medical information, financial information, social security numbers, images, videos, and phone numbers. Transcripts of communication via text, email, and social media can also be considered personal data.
How is personal data used to steal someone’s identity?
Personal data is often sourced online and used by criminals for nefarious purposes such as identity theft and other forms of cyber crime. A hijacked name, email, and some simple billing information are usually enough to cause significant personal, financial, and credit damage.

How is Cyber Insurance different from credit monitoring & identity protection services?
These services scan for personal information on credit reports, public records, social media networks and the dark web to alert you if suspicious activity is discovered. However, these services lack an insurance component with financial protection and reimbursement if damaging criminal activity is discovered.

Think about your data differently

Start Your Free Quote

1 - Identity Theft Resource Center, 2 - Federal Trade Commission, Consumer Sentinel Network Data Book, 3 - Breach Level Index

Michael L.
Insurance Advisor

Questions about cyber coverage?

Licensed advisors are ready to help.

View your quotes online then connect with an advisor over the phone. Get started on a cyber insurance quote today and we’ll pair you with a licensed advisor to answer questions and discuss coverage.
Start Your Free Quote

Who is CyberPolicy?

CyberPolicy is the only place where you can compare business + cyber insurance quotes AND buy multiple insurance policies online. You get fast, accurate, and actionable quotes based on your specific needs with competitive rates and coverages. Plus, your business and cyber insurance quotes are backed by the most trusted insurance carriers in the industry.

© 2016-2021 CyberPolicy, Inc. All rights reserved. CyberPolicy®, "Plan. Prevent. Insure."™, and "CyberCheckup"™ are trademarks of CyberPolicy, Inc.
DBA: CyberPolicy Insurance Solutions CA License No. 0L13180
DBA: CoverHound Insurance Solutions CA License No. 0H52375