View and download policies, proposal forms, detailed wordings, network hospital list etc.
See escalation matrix, send service requests, track progress, get acknowledgements etc.
Intimate claim, fill claim form, share documents, track status, get reminders etc.
Insurance recognized by investors, external agencies and international companies. Meets contractual requirements that you may have
Covers liability or loss due to data breaches, payment gateway flaws or deliberate cyber and data fraud. The cover may be for first party or third party. First party covers losses that you incur such as damage control losses or audit costs. Third party refers to losses incurred by your customers or vendors. This includes data theft of your clients
Covers claims related to any event after the retroactive date. This is specified as the start date when the first Cyber Liability insurance was bought. Ensures that cases that come about several years after the incident also covered
The cover and risks vary considerable by industry. E-commerce firms where financial transactions take place are the most vulnerable. Sites requiring passwords or which store personal information are also particularly vulnerable to data theft. The insurance we buy for you factors in the right risk level
Claims pertaining to a period before the retroactive date are not covered. If there is a break in the renewal of the insurance then the retroactive date is reset to the start date of the new insurance. We prevent this by ensuring timely renewal
Claims that come about from an issue that was known before the insurance was bought are rejected. The insurer will cross examine the case closely to see when the company became aware of the matter. This can be addressed by clearly describing any known issues when you buy your first Public Liability cover
Insurers will reject a claim if the protocols they specified in the contract were not in place. This includes encryption, virus checks, original software, firewalls in some cases. We ensure that the technology teams go deep into these safety protocols and are confident of complying with them. In a few cases we will commission an independent technology audit before placing the insurance
Provide the completed claim form, legal notices if applicable, correspondence on the matter, estimate of legal fees, letter of subrogation. Do not admit liability without informing the insurer.
Extensions are available to cover reputation damage, repair costs to improve technology systems and copyright infringement in certain situations.
Typical exclusions are data transfer to HR vendors, particularly for payroll; data stored on external servers not controlled by you; and copyright infringement. These significant exclusions can be removed. The key is to go over each technology platform and data transfer process with the insurer.
We have specialized liability underwriters and tie-ups with international experts.
We work with all insurers to get you the best options- both in terms of price and features.
Cover notes are issued within hours of request. This documentation is sufficient for any contractual requirement.
We manage all aspects of your claim - from preparing documentation to follow-up with the insurer.
We will advice you on risk management best practices.
See all your contracts renewal information in one place. Place service requests on PAM.