Cyber Insurance Glossary

100+ terms explained in plain English

Quick Navigation: A · B · C · D · E · F · G · H · I · L · M · N · P · R · S · T · U · V · W · Z

A

Actual Cash Value (ACV)

The replacement cost of damaged or stolen property minus depreciation. In cyber policies, this typically applies to hardware damaged during an incident.

Admission Liability

Coverage for claims arising from the policyholder’s admission or acknowledgment of a data breach or security incident.

Aggregate Limit

The maximum amount an insurer will pay for all claims during a policy period, regardless of the number of incidents. Example: A $2M aggregate means total payouts cannot exceed $2M per year.

Application Security

Security measures implemented in software applications to prevent vulnerabilities. Strong application security can reduce cyber insurance premiums.

Attack Surface

The total number of points where an unauthorized user can attempt to enter or extract data. Insurers assess attack surface size during underwriting.

Authentication

The process of verifying a user’s identity. See also: Multi-Factor Authentication (MFA).


B

Backdoor

A hidden method of bypassing normal authentication in a computer system. Discovery of backdoors in your systems can affect insurability.

Backup

A copy of data stored separately from the original. Tested, offline backups are a key underwriting factor for cyber insurance.

Betterment

Improvements made to systems during recovery that exceed the pre-incident state. Many policies exclude betterment costs.

Bodily Injury

Physical harm to a person. Traditional cyber policies typically exclude bodily injury; specialized coverage may be needed for IoT/OT environments.

Botnet

A network of compromised computers controlled remotely. Botnet infections can trigger business interruption coverage.

Breach Coach

An attorney specializing in data breach response who coordinates the incident response team. Many policies provide access to a breach coach.

Breach Notification

Legal requirement to inform affected individuals and regulators of a data breach. Notification costs are a core first-party coverage.

Business Email Compromise (BEC)

A scam where attackers impersonate executives or vendors to trick employees into transferring funds. Also called “CEO fraud.” Coverage varies significantly between policies.

Business Interruption

Coverage for lost income when operations are disrupted by a cyber incident. Key factors include waiting period and coverage period length.


C

Carve-out

An exclusion that removes a specific type of loss from coverage. Example: “Cryptocurrency carve-out” excludes losses involving digital currency.

Claim

A formal request to an insurance company for coverage or compensation for a covered loss.

Claims-Made Policy

A policy that covers claims made during the policy period, regardless of when the incident occurred (subject to retroactive date). Most cyber policies are claims-made.

Cloud Security

Security measures for cloud computing environments. Cloud misconfigurations are a leading cause of data breaches.

Coinsurance

A provision requiring the policyholder to pay a percentage of each claim. Example: 20% coinsurance means you pay 20% of every covered loss.

Computer Fraud

The use of computers to steal money, securities, or property. Often has separate sublimits from other coverages.

Contingent Business Interruption

Coverage for income loss when a third party’s systems (vendor, supplier, cloud provider) are disrupted. Also called “dependent business interruption.”

Coverage Territory

Geographic areas where the policy provides coverage. Most cyber policies provide worldwide coverage.

Credit Monitoring

Service provided to breach victims to monitor their credit reports for signs of identity theft. A common first-party coverage expense.

Crisis Management

Coverage for public relations, communications, and reputation management following an incident.

Cryptojacking

Unauthorized use of computing resources to mine cryptocurrency. May or may not be covered depending on policy language.

Cyber Extortion

Threats to damage systems, release data, or disrupt operations unless payment is made. Includes ransomware. See also: Ransomware.

Cyber Liability

Third-party coverage for claims and lawsuits arising from cyber incidents, including privacy liability and network security liability.


D

Dark Web Monitoring

Services that scan dark web forums and marketplaces for stolen data. Some policies include this as a post-breach service.

Data Breach

Unauthorized access to or acquisition of sensitive data. The triggering event for most cyber insurance claims.

Data Recovery

The process of restoring lost or corrupted data. First-party coverage typically includes data recovery costs.

DDoS (Distributed Denial of Service)

An attack that overwhelms systems with traffic to disrupt operations. Can trigger business interruption coverage.

Deductible

The amount the policyholder must pay before insurance coverage begins. Also called “retention.” Higher deductibles = lower premiums.

Defense Costs

Legal fees and expenses to defend against claims and lawsuits. Most policies cover defense costs in addition to limits.

Digital Asset

Any data stored digitally, including software, databases, and digital media. Policies may define covered digital assets specifically.

Due Diligence

The investigation and verification process before binding a policy. Insurers conduct due diligence to assess risk.

Duty to Defend

The insurer’s obligation to provide legal defense for covered claims, even if the claim is ultimately found to be groundless.


E

Encryption

The process of encoding data so only authorized parties can access it. Encryption of data at rest and in transit affects underwriting.

Endpoint

Any device that connects to a network (computers, phones, tablets, IoT devices). Endpoint security is a key underwriting factor.

Endpoint Detection and Response (EDR)

Advanced security software that monitors endpoints for threats and enables rapid response. Having EDR can reduce premiums by 10-20%.

Errors and Omissions (E&O)

Professional liability coverage for negligent acts or omissions. Cyber E&O covers technology-related professional services.

Exclusion

A provision that removes specific risks or scenarios from coverage. Common exclusions include war, intentional acts, and prior known incidents.

Extended Reporting Period

Additional time after policy expiration to report claims for incidents that occurred during the policy period. Also called “tail coverage.”


F

First-Party Coverage

Coverage for the policyholder’s own losses, including breach response costs, business interruption, and data recovery.

Forensic Investigation

Expert analysis to determine the cause, scope, and impact of a cyber incident. A key first-party coverage expense.

Fraudulent Instruction

A type of social engineering where employees are tricked into transferring funds based on fake instructions. Coverage varies by policy.

Full Limits

When defense costs are paid within the policy limits, reducing the amount available for settlements. Opposite of “defense costs outside limits.”


G

GDPR (General Data Protection Regulation)

European Union privacy regulation with significant penalties for non-compliance. GDPR fines may or may not be covered by cyber insurance.

Gratuitous Payment

Voluntary payments made to affected individuals beyond legal requirements. Coverage for gratuitous payments varies.


H

Hammer Clause

A provision allowing the insurer to limit liability if the policyholder refuses a reasonable settlement offer.

HIPAA (Health Insurance Portability and Accountability Act)

U.S. regulation governing healthcare data privacy and security. HIPAA violations can trigger regulatory coverage.

Hotline

24/7 phone number provided by insurers for reporting incidents. Prompt reporting is typically a policy requirement.


I

Incident Response

The process of detecting, containing, and recovering from a cyber incident. Policies typically cover incident response costs.

Incident Response Plan (IRP)

Documented procedures for responding to cyber incidents. Having an IRP can reduce premiums and is often a policy requirement.

Indemnity

Compensation for loss or damage. Insurance policies indemnify policyholders for covered losses.

Infrastructure Attack

Attack on critical infrastructure systems (power, water, transportation). Often excluded or limited in cyber policies.

Insurable Interest

A legal requirement that the policyholder would suffer financial loss from the insured event.

Insuring Agreement

The section of a policy that describes what is covered. Understanding insuring agreements is crucial for coverage analysis.


L

Liability Coverage

See Third-Party Coverage.

Limits of Liability

The maximum amount an insurer will pay for a covered loss. Can be expressed as per-incident and aggregate limits.

Loss Control

Risk management activities to prevent or reduce losses. Insurers may require specific loss control measures.

Loss of Business Income

Revenue lost during a cyber incident. A component of business interruption coverage.


M

Malware

Malicious software designed to damage or gain unauthorized access to systems. Includes viruses, trojans, ransomware, and spyware.

Media Liability

Coverage for claims arising from website content, including copyright infringement, defamation, and privacy violations.

Multi-Factor Authentication (MFA)

Security requiring two or more verification methods to access systems. MFA is now required by most cyber insurers and significantly reduces premiums.


N

Named Insured

The person or entity specifically named in the policy. Coverage may extend to subsidiaries and employees.

Network Security

Measures to protect computer networks from unauthorized access. Network security failures are a common claim trigger.

Network Security Liability

Third-party coverage for claims arising from failure to protect your network, resulting in harm to others.

Notice of Claim

Formal notification to the insurer of a potential or actual claim. Timely notice is typically required for coverage.


P

Panel Vendor

Pre-approved service providers (forensics, legal, PR) that insurers contract with to handle claims. Using panel vendors may be required or incentivized.

PCI DSS (Payment Card Industry Data Security Standard)

Security standards for organizations handling credit card data. PCI fines and assessments may be covered.

Personally Identifiable Information (PII)

Data that can identify an individual, such as names, Social Security numbers, and email addresses.

Phishing

Fraudulent emails designed to trick recipients into revealing information or clicking malicious links. The most common initial attack vector.

Policy Period

The time during which the policy provides coverage, typically one year.

Premium

The amount paid for insurance coverage. Cyber premiums vary based on risk factors, coverage limits, and deductibles.

Prior Acts Coverage

Coverage for incidents that occurred before the policy inception but are discovered during the policy period. Controlled by the retroactive date.

Privacy Liability

Third-party coverage for claims arising from failure to protect private information.

Proof of Loss

Documentation required by insurers to process a claim, including evidence of the incident and financial impact.

Protected Health Information (PHI)

Health-related data protected under HIPAA. PHI breaches often result in larger claims.


R

Ransomware

Malware that encrypts data and demands payment for the decryption key. A leading cause of cyber insurance claims.

Regulatory Coverage

Coverage for fines, penalties, and defense costs related to regulatory investigations and proceedings.

Reputational Harm

Damage to an organization’s reputation following an incident. Crisis management coverage addresses reputational harm.

Reservation of Rights

A letter from an insurer stating they are investigating a claim but reserving the right to deny coverage based on policy terms.

Retention

See Deductible.

Retroactive Date

The earliest date for which a claims-made policy provides coverage. Incidents before this date are not covered.

Risk Assessment

Evaluation of an organization’s cyber risks and vulnerabilities. Insurers conduct risk assessments during underwriting.

Risk Transfer

Shifting financial risk to another party (the insurer) through insurance.


S

Security Awareness Training

Employee education programs about cyber threats and safe practices. A common underwriting requirement.

Self-Insured Retention (SIR)

The amount a policyholder must pay before coverage begins, similar to a deductible but with different legal implications.

Social Engineering

Psychological manipulation to trick people into making security mistakes or giving away sensitive information.

Spoofing

Impersonating a trusted source (email address, website, phone number) to deceive victims.

Subrogation

The insurer’s right to pursue third parties responsible for a loss after paying a claim.

Sublimit

A cap on coverage for a specific type of loss, lower than the overall policy limit. Example: $100K sublimit for ransomware within a $1M policy.

System Failure

Unintentional system outage not caused by a cyber attack. Some policies cover system failure; others exclude it.


T

Tail Coverage

See Extended Reporting Period.

Third-Party Coverage

Coverage for claims and lawsuits brought against the policyholder by others (customers, partners, regulators).

Threat Actor

An individual or group responsible for a cyber attack. Understanding threat actors helps assess risk.

Trigger

The event that activates insurance coverage. Common triggers include discovery of a breach, receipt of a claim, or occurrence of an incident.


U

Underwriting

The process of evaluating risk to determine whether to offer coverage and at what price.

Unintentional Act

An act done without intent to cause harm. Policies typically cover unintentional acts but exclude intentional misconduct.


V

Vendor Management

Oversight of third-party vendors and their security practices. Poor vendor management is a common source of breaches.

Vicarious Liability

Legal responsibility for the actions of another party (such as a vendor or contractor).

Vulnerability

A weakness in a system that can be exploited by attackers. Vulnerability management is a key security control.


W

Waiting Period

The time between when a business interruption begins and when coverage starts. Also called “time retention.” Common waiting periods are 8-24 hours.

War Exclusion

A policy provision excluding losses caused by war, military action, or nation-state attacks. The scope of war exclusions is heavily debated.

Wire Transfer Fraud

Theft through fraudulent electronic fund transfers. Often falls under social engineering or computer fraud coverage.


Z

Zero-Day Vulnerability

A software vulnerability unknown to the vendor with no available patch. Zero-day exploits present unique coverage challenges.

Zero Trust

A security model requiring verification for every access request, regardless of location. Implementing zero trust can improve insurability.


Need Help Understanding Your Policy?

Compare Quotes From Top Carriers

Get expert guidance and competitive pricing in 5 minutes.

Get Quotes Now →

This glossary is for educational purposes. Policy definitions may vary by carrier. Always review your specific policy language.