Technology Professionals Insurance

Information technology businesses provide specialized services such as computer/network design, software programming and systems analysis for a variety of industries. Fox Point’s technology professionals package offers tailored protection with insurance designed exclusively for these unique business needs – including professional liability with leading first party coverages. Target customers:
- Application service providers
- Computer services
- Electronic data processing and consulting
- System analysis and software design
- Web portal services
- Network integration
- Programming services
Key Benefits and Highlights
Policy premiums: Start at $500
Minimum deductible: $1,000
Limit capacity: Up to $10,000,000
- Errors and omissions
- Forensic expenses coverage
- Credit monitoring coverage
- Notification expense coverage
- Regulatory action coverage
- Public relations expenses coverage
- Personal injury coverage for a privacy breach
- Optional Property and Casualty coverage
Insuring Agreements available:
Technology services liability: Covers third party claims as a result of an error, omission, neglect or breach of duty from services rendered.
Enterprise privacy liability: Covers third party claims as a result of failing to prevent the theft or misappropriation of private information.
Electronic media liability: Covers third party claims for various intellectual property and personal injury exposures for information that is posted on your website.
Network security liability: Covers third party claims as a result of a network security breach, including transmission of malicious code, denial of service attack, or unauthorized access to/use of your computer system.
Crisis management loss: Covers forensic expenses, credit monitoring expenses, notification expenses, and public relations expenses to help mitigate exposure to a network security or privacy breach.
Network interruption business income and extra expense loss: Covers income loss and extra expense caused by network interruption that was a result of a network security breach.
Data loss: Covers the cost to replace, restore, or recollect data that was corrupted as a result of a network security breach
Cyber extortion loss: Covers the cost to investigate and respond to a cyber extortion threat, the cost to third party security consultants, and the cost to terminate the cyber extortion threat.
Applications:
*Application is best viewed using Internet Explorer. Please download application to your workstation before completing.