This is the last post in my cyber series. Here, I’ll be offering my suggestions about the content of an ideal cyber policy.
Don’t purchase a policy that covers a specific method or type of breach. The policy should cover the unauthorized release of “personal information” – data that specifically identifies an individual or company – and “ransomware.”
Why? Because the nature of hacking is ever-changing. It’s possible that a new method will emerge between the date of policy issuance and the cyber event.
Second, make sure the policy covers the very broad range of potential damages, which include:
That's it for this series.
Link From Our Previous Blog
The Law Office of Hale Stewart
734A E. 29th Street
Houston, Texas 77009