Starr’s Cyber team offers comprehensive cover for a broad range of industries, helping clients to manage this complex and evolving risk.
Target Risks
- Commercial enterprises including public, private and nonprofit entities
Additional Coverages Available
- Media Content Liability – Pay to defend in the case of liability arising from alleged trademark infringement, copyright infringement, defamation, false light, product disparagement and other types of content related issues
- PCI-DSS Assessment Coverage – Pay for loss arising from claims for non-compliance with PCI Data Security Standards
- Contingent Business Income Loss – Reimburse for loss of income after a material business interruption caused by a security failure of any entity that you depend on to conduct business other than a third-party computer system provider
- System Failure Coverage – Expands the cause of a material interruption to include other unintentional failures
- Cyber Crime – Reimbursement for the loss of the organization’s funds sustained from a network security failure or fraudulent impersonation
- Contingent Bodily Injury / Property Damage – Provides contingent coverage in the event that a network security failure or privacy incident result in physical injury or property damage
Coverages Available
- Incident Response Expenses – Pay the expenses sustained by your organization to:
- Contain a network security failure or privacy incident
- Retain legal counsel, forensic investigators, and public relations professionals to help determine your responsibilities
- Notify affected people and provide identity theft assistance
- Security & Privacy Liability – Pay to defend you in the event of:
- Class actions by customers whose personal information has been compromised
- Regulators bringing investigations for violating a law relating to these types of incidents
- Business Interruption – Reimburse the loss of income for interruption or suspension of business
- Data Recovery – Reimburse the costs to restore, recreate or recollect lost electronic data
- Cyber Extortion – Reimburse payouts made in exchange for eliminating a threat or demand made against your .
Deductibles
- Minimum $5,000
Highlights
- Bespoke customizable coverage – highly adaptable program which includes manuscript endorsements
- Available on Admitted or Non-Admitted basis
- Can be packaged with Technology Errors & Omissions Coverage
- Responds on a discovery basis - no retroactive date; will maintain continuity dates of prior coverage
- Knowledge limited to executive officers
- Rogue employee carve-back
- Coverage for third-party computer services providers, information handlers and contingent business partners
- Cyber Terrorism Coverage
- Impacted Individuals Limit with Supplementary Incident Response Expenses
- Initial Incident Response Expenses
- Regulatory Proceedings Coverage to contemplate – GDPR, CCPA and other similar regulation
- Wrongful Collection extension
- Reputational Loss Coverage
- Non-Physical Damage Loss of Use (Bricking) Coverage
- Voluntary Shutdown for Business Interruption extension
- Betterment carve-back either to minimize loss or due to electronic data or equipment being unavailable
- Contingent Bodily Injury Coverage
- Invoice Manipulation Coverage
- Crypto-jacking Coverage
- Workplace Violence Coverage
Limits
- Up to $25,000,000 - primary or excess limits
- Shared or separate limits available
Risk Management Services
eRisk Hub*
- Legal consultation with a pre-qualified attorney following an incident
- Incident Roadmap to assist in planning a network or data breach incident response
- Access to pre-qualified industry experts in pre-breach and post-breach disciplines
- Risk management tools, including policies and procedures, training, cyber-risk assessments, loss calculator, breach notification guides and research tools
- Access to news on major breach events, best practices articles, white papers, webinar training events, risk management events, and security and privacy blogs
Rapid7
- Opportunity to access a complimentary external network vulnerability scan of up to 50 IP addresses
- Provides a report of threat exposures and criteria for risk prioritization to facilitate timely mitigation of risk to ensure assets are protected
- Vulnerability scans are powered by insightVM, Rapid7’s bestin-class vulnerability platform technology
- 30-minute scan readout to review the following reports: Executive Summary, Top 25 Remediation Report, CVA Output, Technical Details and Remediation Plan
DISCLAIMER
By accessing or using Starr’s website (“Site”), you agree to be bound by these Terms of Use (“Terms”) and all applicable laws and regulations. If you do not agree to these Terms, do not use the Site.
Read More





