Loading...
HomeMy WebLinkAboutR-2025-114 Purchase Cyber Liability Insurance from Node International Insurance RESOLUTION NO. R - 2025-114 A RESOLUTION AUTHORIZING THE PURCHASE OF CYBER LIABILITY INSURANCE FROM NODE INTERNATIONAL INSURANCE FOR THE ANNUAL PREMIUM IN AN AMOUNT NOT TO EXCEED $9,651.00 WHEREAS, the City of Riverside has a need for cyber liability insurance as this is no longer under the umbrella of our annual property and liability insurance carrier premium; and WHEREAS, the City of Riverside in the adoption of its purchasing policy requires all expenditures in excess of $10,000 to be presented to the Board of Aldermen for approval, and the City's insurance carrier MIRMA recommended Node International, through Barker Phillips Jackson, Inc., for cyber liability insurance and has presented an adequate policy in the amount of $9,651.00 for the FY 2025-2026 for such coverage; and WHEREAS, funds for such purpose is budgeted in the Fiscal Year 2024-2025 budget; and WHEREAS, the Board of Aldermen find it is in the best interest of the citizens of the City of Riverside to authorize purchase of such insurance coverage and approve the payment to Node International for cyber liability insurance coverage for the City of Riverside, in an amount not to exceed $9,651.00. NOW THEREFORE, BE IT RESOLVED BY THE BOARD OF ALDERMEN OF THE CITY OF RIVERSIDE, MISSOURI, AS FOLLOWS: THAT, the acquisition of such insurance coverages and payment to Node International through Barker Phillips Jackson, Inc for cyber liability insurance coverage for the City of Riverside, in an amount not to exceed $9,651.00 is hereby authorized and approved; and FURTHER THAT the Mayor, City Administrator, or either of their designees, are hereby authorized to execute all documents necessary or incidental to this transaction and the City Clerk is authorized to attest thereto. PASSED AND ADOPTED by the Board of Aldermen of the City of Riverside, Missouri, the 1st day of July 2025. Mayor Kathleen L. Rose ATTEST) Robin Kincaid, City Clerk INVOICE Barker Phillips Jackson, Inc PO Box 4207 Customer City of Riverside Springfield, MO 65808-4207 Acct# 25809 Date 06/19/2025 Customer Jerod Hicks Service Brad Miller, CISR Page 1 of 1 Payment Information Invoice Summary $ 9,651.00 City of Riverside Payment Amount 2950 NW Vivion Rd. Payment for: Invoice#733356 Riverside, MO 64150 FLYRBCKFG42CGJ4 Thank You Customer: City of Riverside Invoice Effective Transaction Description Amount Policy#FLYRBCKFG42CGJ4 07/01/2025-07/01/2026 Am WINS Brokerage 733356 07/01/2025 Renew policy Cyber Liability-25-26 Cyber 9,001.00 Market Policy fee-25-26 Cyber 300.00 Broker fee-25-26 Cyber 350.00 Due Date: 7/1/2025 Robin Kincaid. 6-26-2025 1011200024100 Total $ 9,651,00 Thank You Barker Phillips Jackson, Inc (417) 887-3550 Date PO Box 4207 06/19I2025 Springfield, MO 65808-4207 ins@bpj.com node # DigitalRisk INTERNATIONAL Imo,N ; l r'►v ers de ntd. ✓ Applica is Signature Applicant's Email Address :o1ir a-) K nJ cac.i cl R11.-7t'/ 3993 Applicant's Name Applicant's Phone Number - c.d I) Da Date InsiJrance Start Date You can fill this form out online, use the link below: https://node.insure/NODE2553612/49WYN3XW74R5 Risk Manager Please list below the relevant parties who would like to receive security updates, information and communication's regarding your digital wellbeing. 3Pasro , Kya7D,L MAC I KQiter folers;rlcvn4J 816-4cS/YgoZS/ Name Position/Title Email Phone edd;a S hlZII -+ tYta Qt- lead;Q e-n Just.ion L9 3 O7 - /I3ZLI Name Posits /Title Email Phone r - Name Position/Title Email Phone FRAUD WARNING General Fraud Warning: Any person who knowingly presents a false or fraudulent claim for payment of a loss or benefit or knowingly presents false information in an application for insurance is guilty of a crime and may be subject to fines and confinement in prison.(Not applicable in AL,AK,AZ,AR,CA,CO,DE, DC,FL,ID,IN, HI,KS,KY, LA, ME, MD, MN,NH, NJ,NM, NY,OH,OK,OR, PA,PR,TN,VA,WA) POLICYHOLDER DISCLOSURE NOTICE OF TERRORISM INSURANCE COVERAGE Coverage for acts of terrorism is included in your policy. You are hereby notified that under the Terrorism Risk Insurance Act, as amended in 2015, the definition of act of terrorism has changed. As defined in Section 102(1) of the Act:The term " act of terrorism" means any act or acts that are certified by the Secretary of the Treasury—in consultation with the Secretary of Homeland Security, and the Attorney General of the United States—to be an act of terrorism;to be a violent act or an act that is dangerous to human life, property, or infrastructure;to have resulted in damage within the United States, or outside the United States in the case of certain air carriers or vessels or the premises of a United States mission; and to have been committed by an individual or individuals as part of an effort to coerce the civilian population of the United States or to influence the policy or affect the conduct of the United States Government by coercion. Under your coverage, any losses resulting from certified acts of terrorism may be partially reimbursed by the United States Government under a formula established by the Terrorism Risk Insurance Act, as amended. However, your policy may contain other exclusions which might affect your coverage, such as an exclusion for nuclear events. Under the formula,the United States Government Node #DigitalRisk Admitted US Attestation v1.0 2021 2 of 7 va- \ #DigitalRisk node INTERNATIONAL Quote Attestation - NODE2553612 Insuring Factors and Assumptions Quote Reference NODE2553612 Named Insured City of Riverside, Missouri Address 2950 NW Vivion Rd, Riverside, Montana, USA, 64150 Industry Other General Government Support Number of Employees 100 Company Type Private Date Established 1951-01-01 Number of claims Zero value in the last 3 years Policy Period 01 July 2025 - 01 July 2026 Yourself and employees: • Encrypt all emails containing sensitive information sent to external parties. • Encrypt all sensitive information stored on mobile devices • Have an individual officially designated for overseeing information security • Verify vendor/supplier bank accounts before adding to your accounts payable systems • Authenticate funds transfer requests • Prevent unauthorized employees from initiating wire transfers. • Undertake mandatory information security training at least annually and information security personnel are provided with additional training to help them understand current security threats. • Perform at least annual backups of company data • Have in place at least one of the following, Business Continuity Plan, Disaster Recovery Plan, Incident Response Plan I affirm that I have read, and Node International has advised me to carefully read,the terms, conditions, limitations, exclusions and any applicable endorsements of the commercial cyber insurance policy that I am applying for,which have been made available to me.I affirm that the information that I have provided throughout the application for this insurance is,to the best of my knowledge,true, accurate, and complete.I understand that any non-disclosure, misrepresentation or non-payment of premium may result in cancellation of or non-renewal of this policy. I have read, understood and agreed to the fraud warning, terrorism notice and no know loss statement.I agree all policy documents will be distributed electronically. Required Option/Coverage Please refer to your quote for full coverage details. OPTION POLICY LIMIT PREMIUM NODE DETECT TOTAL SELECTED FEES Option 1 USD$1,000,000 USD$9,101.00 USD $200 USD $9,301.00 0 Node#DigitalRisk Admitted US Attestation v1.0 2021 1 of 7 node#DigitalRisk INTERNATIONAL generally reimburses 85%through 2015;84% beginning on January 1, 2016; 83% beginning on January 1, 2017; 82% beginning on January 1, 2018; 81% beginning on January 1, 2019 and 80% beginning on January 1, 2020, of covered terrorism losses exceeding the statutorily established deductible paid by the insurance company providing the coverage. The Terrorism Risk Insurance Act, as amended, contains a $100 billion cap that limits U.S. Government reimbursement as well as insurers' liability for losses resulting from certified acts of terrorism when the amount of such losses exceeds $100 billion in any one calendar year.If the aggregate insured losses for all insurers exceed $100 billion,your coverage may be reduced. The portion of your annual premium that is attributable to coverage for acts of terrorism is_$0 , and does not include any charges for the portion of losses covered by the United States government under the Act. I ACKNOWLEDGE THAT I HAVE BEEN NOTIFIED THAT UNDER THE TERRORISM RISK INSURANCE ACT, AS AMENDED,ANY LOSSES RESULTING FROM CERTIFIED ACTS OF TERRORISM UNDER MY POLICY COVERAGE MAY BE PARTIALLY REIMBURSED BY THE UNITED STATES GOVERNMENT AND MAY BE SUBJECT TO A $100 BILLION CAP THAT MAY REDUCE MY COVERAGE, AND I HAVE BEEN NOTIFIED OF THE PORTION OF MY PREMIUM ATTRIBUTABLE TO SUCH COVERAGE. STATEMENT OF NO KNOWN LOSS To: Node International TA RB Jones Policyholder Name: City of Riverside, Missouri Quote Number: NODE2553612 RE: Statement of No Known Loss I represent that between time of quote and time of bind I am not currently aware of any accidents, facts or circumstances occurring during that time that may result in future claims covered under Node International TA RB Jones. If I do become aware I must inform Node International immediately. Node#DigitalRisk Admitted US Attestation v1.0 2021 3 of 7 # Digital: node INTERNATIONAL NODE PREVENT PARTNERS At Node International, we have formed a strategic alliance with a team of top-tier cyber experts to fortify your digital presence and ensure comprehensive risk mitigation while you remain under our protection. Our Node Prevent Cyber Partners bring an abundance of industry experience in privacy and data security, conducting thorough risk assessments, implementing effective cyber risk mitigation strategies, and safeguarding against data breaches.Your online safety is our utmost priority,and with our expert partners by your side, you can rest assured that your cyber defenses are in the best possible hands. Upon activation of your Cyber insurance policy, a host of exclusive services will become available to you. Including: Legal Consultation; Incident Response and Ransomware Negotiation Vendors; Security and Forensics Vendors; Notifications and Credit Monitoring Vendors. Experience the following exceptional benefits included in your Cyber insurance policy: }sultation ccu', meter Security ;s• 11 Complimentary consultation with a Complimentary Perimeter Security cyber expert to review your current review and vulnerability baseline cyber risk landscape risk assessment Vsletter "point Detection Monthly cyber security newsletter Free EDR(Endpoint Detection& • to your risk manager,detailing response)service* current threat trends -Claim Assistance Free 24/7 Pre-Claim assistance Complimentary Security Awareness to contain your attack,breach or Training* ransomware Node#DigitalRisk Admitted US Attestation v1.0 2021 *Please schedule a call with the BTA team to I4afilfm?ore #DigitalRisk node INTERNATIONAL BLUE TEAM ALPHA PARTNERSHIP ABLUE TEAM LPHA Node International has formed a partnership with Blue Team Alpha (BTA) to enhance the benefits available for our cyber insurance policyholders. This collaboration empowers Node International's policyholders to tap into Blue Team Alpha's extensive expertise in cybersecurity tailored for small and mid-sized organizations. By seamlessly integrating with Blue Team Alpha's cybersecurity services, Node International elevates its insurance coverage to a new level. Blue Team Alpha, drawing on expertise from the Department of Defense, FBI, NSA, and other federal agencies, extends its cybersecurity services and solutions to fortify the protection of small to midsize businesses. With the goal of minimizing the likelihood of insurance claims, Blue Team Alpha assists businesses at any stage of their cybersecurity journey, providing valuable insights to enhance their security posture. How Blue Team Alpha interacts with each Node International cyber insurance policy holder: 1. Welcome Email Node International will provide a welcome email with your cyber insurance policy, upon activation of your cyber insurance.At this time, ahost of exclusive services will become available to you from Node International and BTA. 2. BTA Complimentary Consultation Each policy holder should arrange a complimentary cyber security consultation with BTA to review your current cyber risk posture. Sign up for a meeting by sending an email to: node@blueteamalpha.com 3. Request Threat Profile BTA, upon request from the policy holder, provides a complimentary Threat Profile highlighting network risks, compromised passwords from the Dark Web and other vulnerabilities. The Threat Profile is compiled by cybersecurity experts using a variety of open source databases and is intended to give the policy holder insight as to how a hacker would gather reconnaissance to identify vulnerabilities that can be used to launch a cyber attack. 4. Monthly Newsletter You will receive a monthly BTA newsletter to educate you on the current cyber landscape and how to mitigate risk as a small business. BTA can also be contacted directly to support your ongoing monthly Node Detect scans (see page 7). node# DigitalRisk INTERNATIONAL Leverage the expertise of our Node Prevent Partners as your dedicated privacy and security team. Seamlessly integrate them with your in-house security or outsource entirely. Reach out to our Node Prevent Partners for expert assistance and guidance in the following situations: • Establishing comprehensive security awareness training programs. • Implementing robust encryption solutions. • Developing a strong incident response plan for enhanced preparedness. • Considering risk assessment services and budgeting for top-notch EDR or MDR solutions. Incident Respons. Carbon Black. halcyon DIGITALGUARDIAN corelight CROWDSTRIKE Apptega ;, Microsoft Defender Vulnerability DarkWeb Monitoring Nessus DARKWEB Security Awareness Training KnowBe4 Vvizer Ht,r**.3n c•rro' Cr),,cit girt, l Cloud (Is) Az u re Node #DigitalRisk Admitted US Attestation v1.0 2021 6 of 7 #DigitalRisk node INTERNATIONAL NODE DETECT In addition to our Node Prevent Partners you will also gain exclusive access to our cyber security report via Node Detect for a hassle free domain security solution. Non-intrusive security tests and scans offer invaluable insights, analysis, and recommendations to fortify your domain with the convenience of monthly reports sent directly to your inbox. 1. Hassle-Free Activation Once you take out an insurance policy with us, Node Detect will automatically initiate the necessary scans without any additional effort on your part. No complicated setup or configurations are required.Just sit back and relax as Node Detect gets to work. 2. Monthly Domain Security Reports Node Detect constantly monitors your domain security, capturing monthly snapshots to keep track of any changes of potential vulnerabilities. Stay ahead of potential threats and keep your digital assets safe with your comprehensive report delivered directly to your company. 12 0 398 0 3. Instant Chat With Node Detect, you have direct access to our team of Node Detect Cyber Report security professionals through an instant chat feature. Should you have any concerns or questions about the report or any potential issues identified,you can reach out to them '-"`°-m* `--�" for assistance and guidance. w a Co.q.oaused data found 4. Collaboration with Node Prevent Partners "'"'°"°" Node Detect seamlessly links with our Node Prevent , partners, enhancing our capability to address and resolve p,,,,,,,,r,,,a,a.,,surface any identified security issues. This collaborative approach " ""'"' """° ensures that any potential threats are tackled effectively, further bolstering your company's security measures. ,„,• -a, - ,o ow,=o„ • CNe'S..wX^9'S uh,u,N T,r SD„„N luhfwM — - O ,N wO.iba M taPR VMfie..•9 detected Our Node Prevent Partners, along with exclusive Node _ VScene„„pFe.,.s,e4ted .„„Gc,e ,.. wp,e<., .d - Detect reports, offer unparalleled guidance, support, v „cooked wen.re,,,„,•„e„p„a•o,,,, and strategic recommendations to strengthen and V Owe*.„lquen - optimize your cyber defenses effectively. O f�.aonran* TM Air IP . NODE INTERNATIONAL CYBER CyberinsuranceAttestation - N0DE2553612 Thank you for considering Node International to provide your cyber insurance. Before you can purchase coverage, we need you to confirm you have read and understood our terms and conditions and completed the form with your details and signature. COMPANY DETAILS ail Business Name: City of Riverside, Missouri 9 Business Address: 2950 NW Vivion Rd Riverside MT 64150 Industry: Other General Government Support 24 Number Of Employees: 100 Date Established: 1951-01-01 pi Company Type: Private el Number of claims: Zero value in the last 3 years a Policy Inception (Start date): 01 July 2025 DECLARATIONS Yourself and employees: / Encrypt all emails containing sensitive information sent to external parties. ✓ Encrypt all sensitive information stored on mobile devices ✓ Have an individual officially designated for overseeing information security ✓ Verify vendor/supplier bank accounts before adding to your accounts payable systems V Authenticate funds transfer requests ✓ Prevent unauthorized employees from initiating wire transfers. ✓ Undertake mandatory information security training at least annually and information security personnel are provided with additional training to help them understand current security threats. ✓ Perform at least annual backups of company data ✓ Have in place at least one of the following, Business Continuity Plan, Disaster Recovery Plan, Incident Response Plan • non-renewal of this policy. I understand and agree that my application for this Commercial Cyber Policy will be submitted electronically and the policy documents related to this insurance, including any notices and updates thereto (collectively, the "Policy Documents"), will be made available to me electronically. Node International is authorized to send, and I agree to accept delivery of, all Policy Documents electronically; accordingly, I understand that I will not be receiving copies of tha Pnliry flnri imantc by ctanrlarrl mail i inlacc rani iirari by tha rlanartmant of COMPLETED Thank you for completing the attestation. Please notify your broker you wish to go ahead with your cyber insurance policy with Node International. . Signed By: Robin Kincaid authorized by City of Riverside, Missouri g# Di italRisk node INTERNATIONAL APPLICATION FOR A COMMERCIAL CYBER INSURANCE POLICY 1 I Your details Name Of Organization (Applicant): City of Riverside Mailing Address: 2950 NW Vivion Road, Riverside Mo 64150 Type of Ownership Structure: n Private n Public n Government ElInvestment Fund ri Not for Profit Description of Business&NAICS code city government administration offices, police &fire Date Established: June 21, 1951 Number of Employees: 100 Annual Revenue($): 35,768,000 Website Address(es): www.riversidemo.gov Policy Period Requested: From: 7-1-2025 To: 6-30-2026 2 I Risk Manager Contact Details Please list below the relevent parties whom would like to receive security updates, information and communications regarding your digital wellbeing. Name: Jason Ketter- IT Manager Email: jketter@riversidemo.gov Name: Eddie Seasholtz- IT Assistant Email: eddie@enetkc.com Name: Brian Koral - City Administrator Email: bkoral@riversidemo.gov If you require more users on file please attach them to an email and send them to: it@nodedetect.com Public Facing URLs: files.riversidemo.gov, rspd.riversidemo.gov If.riversidemo.gov publiclf.riversidemo.gov Commerical cyber insurance policy application V1.0 2 of 4 # Di italRisk node INTERNATIONAL 3 I Underwriting Questions If you find that you do not have sufficient space below to thoroughly answer a question,please continue your responses on a separate sheet of paper and attach to this Application. 1. Encryption YES NO a. Does Your organization encrypt all emails containing sensitive information(including, but not limited to, Personally Identifiable Information(PII), Personal Health Information(PHI), ✓❑ ❑ Payment Card Information (PCI))sent to external parties? b.Does Your organization encrypt all sensitive information (including, but not limited to, PII, PHI, PCI) stored on computing and/or mobile devices(including, but not limited to, phones, ❑ tablets, laptops,wearable computers,flash drives)? 2.Information Security Leadership a. Does Your organization have an individual officially designated for overseeing information ❑ security? 3. Employee Management a. Does Your organization provide mandatory information security training to all employees at ✓❑ ❑ least annually? b.If yes,are Your information security personnel provided with additional training to help them ❑ understand current security threats? El 4 I Past Activites 1. Please attach Your organization's Loss History for the past five(5)years, if applicable. 2. Has your organization ever been a party to any of the following YES NO a.Civil or criminal action or administrative proceeding alleging violation of any federal, state, ❑ ✓ local or common law? b.Is there currently any pending litigation,administrative proceeding or claim against the ✓ named applicant,organization and/or any of the prospective insured? 3. During the last three (3)years, has Your organization suffered a security breach requiring customer or third-party notification according to state or federal regulations? Commerical cyber insurance policy application V1.0 3 of 4 # DigitalRisk node INTERNATIONAL 5 I Optional Endorsement YES NO 1. Do You want to add Additional Insured? ✓ If you answered Yes, please fill out the following for the Additional Insured: i. Name of Organization: C , t ,� 1, c nne ii. Mailing Address: ;✓r f _ K£; j V ilL i A /r lD Low_ o iii. Description of Business&NIACS code: 6 I Cyber Crime Questions YES NO la. Do You or Your employees verify vendor/supplier bank accounts before adding to your accounts ✓ payable systems? b. Do You or Your employees authenticate funds transfer requests(e.g.by calling a customer to verify the request at a predetermined phone number)? c. Do You or Your employees prevent unauthorized employees from initiating wire transfers? ✓ 7 I Important Notice THIS INSURANCE POLICY PROVIDES COVERAGE ON A CLAIMS-MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED TO THE INSURER DURING THE POLICY PERIOD OR ANY APPLICABLE EXTENDED PERIOD. DEFENSE EXPENSES, WHERE APPLICABLE, ARE INCLUDED IN THE LIMITS OF INSURANCE,AND PAYMENT THEREOF WILL ERODE, AND MAY EXHAUST THE LIMITS OF INSURANCE. IF ISSUED, PLEASE READ YOUR POLICY CAREFULLY. The words"You"and "Your" in this Application refers to the Applicant's organization and any entity for whom this insurance is intended. Note:It is recommended that the person completing this Application consult with the person(s)within the company who is responsible for information/technology. Signed: Full Name: Lobin Kincaid Position Held: City Clerk Date: June 5, 2025 Email address: rkincaid@riversidemo.gov Phone 816-372-9008 number: Commerical cyber insurance policy application V1.0 4 of 4 # Digital Node International provides a unique package of comprehensive coverage, leading cyber, security prevention measures and expert monitoring of your systems 24/7. DETECTION PREVENTION INSURANCE Node International - One Minster Court, Mincing Lane, London EC3R 7AA Email: info@nodeinternational.com Telephone: (+44) 207 337 3524 Node International Ltd Authorised and Regulated by the Financial Conduct Authority //.2020 Node International Ltd.All Rights Reserved. node INTERNATIONAL COMMERCIAL CYBER INSURANCE POLICY THIS POLICY IS A CONTRACT OF INSURANCE BETWEEN YOU AND US. YOUR POLICY CONTAINS ALL THE DETAILS OF THE COVER THAT WE PROVIDE. THIS POLICY CONSISTS OF AND MUST BE READ TOGETHER WITH THE DECLARATIONS PAGE AND ANY ENDORSEMENTS. THE INSURANCE PROVIDED UNDER THIS POLICY FOR CLAIMS MADE AGAINST YOU IS ON A CLAIMS MADE AND REPORTED BASIS, AND APPLIES TO CLAIMS ONLY IF THEY ARE FIRST DISCOVERED BY YOU DURING THE POLICY PERIOD AND REPORTED TO US DURING THE POLICY PERIOD OR ANY APPLICABLE EXTENDED REPORTING PERIOD. THE SECURITY BREACH LIABILITY INSURING AGREEMENT CONTAINED IN THIS POLICY PROVIDES COVERAGE FOR DEFENSE EXPENSES WHICH ARE PAYABLE WITHIN, AND NOT IN ADDITION TO, THE LIMIT OF INSURANCE. PAYMENT OF DEFENSE EXPENSES UNDER THIS POLICY WILL REDUCE THE LIMIT OF INSURANCE. PLEASE READ THE ENTIRE POLICY CAREFULLY. Various provisions in this Policy restrict coverage. Read the entire Policy carefully to determine rights, duties and what is and is not covered. Throughout this Policy, the words "You" and "Your" refer to the "Named Insured" shown in the Declarations. The words"We,""Us,"and "Our" refer to the company providing this insurance. All terms that appear in bold print are defined terms and have special meaning as set forth in Section I— Insuring Agreements and Section VII—Definitions. SECTION I—INSURING AGREEMENTS Coverage is provided under the following Insuring Agreement upt to the Limits of Insurance shown in the Declarations. Any Cyber Incident, Extortion Threat, Security Breach, or Claim that arises out of the same facts or circumstances and results in Loss under one or more of the following Insuring Agreements will be deemed to be related and, as such, will be deemed as have been Discovered during the earliest policy period that any such related Cyber Incident, Extortion Threat, Security Breach, or Claim was Discovered. 1. Security Breach Expense We will pay for Loss resulting directly from a Security Breach or Cyber Incident Discovered during the Policy Period or any Extended Reporting Period, if applicable. With respect to this Insuring Agreement 1, Loss means: a. Forensics Expenses—Including Breach Counsel Expenses The costs incurred with Our approval to establish whether a Security Breach or Cyber Incident has occurred or is occurring. If a Security Breach has occurred, the following costs are also included: costs to investigate the cause, scope and extent of a Security Breach and to identify any affected parties; and SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 20 node INTERNATIONAL ii. costs to determine any action necessary to remediate the conditions that led to or resulted from a Security Breach including, but not limited to, fees paid for legal and other professional advice on how to respond to the Security Breach. b. Notification Expenses—Including Breach Counsel Expenses Costs to notify all parties affected by a Security Breach including, but not limited to, notice to be transmitted through media: i. as required by Privacy Regulations; or ii. subject to Our prior approval, as appropriate on a voluntary basis. c. Overtime Salaries Reasonable overtime salaries paid to Employees assigned to handle inquiries from the parties affected by a Security Breach. d. Call Center Expenses Fees and costs of a company hired by You with Our prior approval for the purpose of operating a call center to handle inquiries from the parties affected by a Security Breach. e. Post-event Monitoring Expenses Costs to provide credit and identity monitoring services to the affected parties of a Security Breach for up to one year, or longer if required by applicable law, from the date of notification to those affected parties of such Security Breach. f. Public Relations Expense Fees and costs of a public relations firm and any other reasonable expenses incurred by You with Our prior written consent to protect or restore Your reputation solely in response to "negative publicity". As used in this provision "negative publicity" means information which has been made public that has caused, or is reasonably likely to cause, a decline or deterioration in the reputation of the Named Insured or of one or more of its products or services. g. Other Expenses Any other reasonable expenses incurred by You in connection with a Security Breach or Cyber Incident with Our prior written consent. With respect to this Insuring Agreement 1, Loss does not include any costs or expenses associated with upgrading or improving a Computer System as a result of a Security Breach. 2. Extortion Threats We will pay for Loss resulting directly from an Extortion Threat that is Discovered during the Policy Period or any extended reporting period, if applicable. With respect to this Insuring Agreement 2, Loss means: a. Fees and costs of: i. a security firm; or SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 20 node INTERNATIONAL ii. a person or organization; hired with Our consent to determine the validity and severity of an Extortion Threat made against You. b. Interest costs paid by You for any loan from a financial institution taken by You to pay a ransom demand. c. Reward payments paid by You to an "informant"which lead to the arrest and conviction of parties responsible for Loss. As used in this provision, "informant" means a person, other than an Employee, providing information not otherwise obtainable, solely in return for a reward offered by You. d. Any other reasonable expenses incurred by You with Our written consent, including, but not limited to: I. fees and costs of independent negotiators; and ii. fees and costs of a company hired by You, upon the recommendation of the security firm, to determine how to protect Your Electronic Data from further threats. e. Monetary value of any Ransom Payment made by and a third party for Random Demands. 3. Replacement or Restoration of Electronic Data We will pay for Loss of Your Electronic Data on "computer programs" stored within a Computer System resulting directly from a Cyber Incident that is discovered during the Policy Period or any extended reporting period, if applicable. With respect to this Insuring Agreement, 3. Loss remains the costs to replace or restore Your Electronic Data or"computer programs"as well as the cost of data entry, reprogramming and computer consultation services. With respect to this Insuring Agreement 3. Loss does not include the cost to duplicate research that led to the development of Your Electronic Data or "computer programs". To the extent that any of Your Electronic Data cannot be replaced or restored, We will pay the cost to replace the media on which such Electronic Data was stored with blank media of substantially identical type. As used in this Insuring Agreement 3, "computer programs" means a set of related electronic instructions, which direct the operation and function of a computer or devices connected to it, which enables the computer or devices to receive, process, store or send Your Electronic Data. 4. Business Income, Contingent Business Income and Extra Expense We will pay for Loss due to an Interruption resulting directly from a Cyber Incident or an Extortion Threat that is Discovered during the Policy Period or during any extended reporting period, if applicable. With respect to this Insuring Agreement 4, Loss means the actual Loss of: (1) "business and contingent business income"You sustain; and/or(2)"extra expense"You incur. As used in this Insuring Agreement 4: a. "Business and contingent business income"means the: net income (net profit or loss before income taxes) that would have been earned or incurred; and SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 3 of 20 node INTERNATIONAL ii. continuing normal operating expenses incurred, including payroll. "Business and contingent business" income does not include: (1) Net Profit that may or would likely have been earned as a result of an increase in volume due to favorable business conditions caused by the impact of network security failures impacting other businesses, loss of market, or any other consequential loss b. "Extra expense" means necessary and reasonable expenses You incur: i. during an Interruption that You would not have incurred if there had been no interruption; or ii. to avoid or minimize the suspension of Your E-Commerce Activities. "Extra expense"does not include: (1) any costs or expenses associated with upgrading, maintaining, repairing, remediating or improving a Computer System as a result of a Cyber Incident or Extortion Threat; or (2) Extortion Expenses covered under Insuring Agreement -Extortion Threats. 5. Security Breach Liability Including Payment Card Industry (PCI) Fines and Penalties We will pay for: a. Loss that the Insured becomes legally obligated to pay and Defense Expenses as a result of a Claim that is Discovered during the Policy Perod or any Extended Reporting Period, if applicable, for a Wrongful Act or a series of interrelated Wrongful Acts taking place on or after Your first date of continuous coverage with Us and before the end of the Policy Period. b. Loss and Defense Expenses as a result of a Claim in the form of a Regulatory Proceeding that is Discovered during the Policy Period any extended reporting period, if applicable, in response to a Wrongful Act or a series of interrelated Wrongful Acts taking place on or after Your first date of continuous coverage with Us and before the end of the Policy Period. c. Loss and Defense Expenses as a result of a Claim in the form of an action by a Card Company for non-compliance with the Payment Card Industry (PCI) Data Security Standards that is Discovered during the Policy Period or any extended reporting period, if applicable, in response to a Wrongful Act or a series of Interrelated Wrongful Acts taking place on or after Your first date of continuous coverage with Us and before the end of the Policy Period. With respect to this Insuring Agreement 5: Loss means: (1) compensatory damages, settlement amounts and costs awarded pursuant to judgments or settlements; (2) punitive and exemplary damages to the extent such damages are insurable by law; (3) fines or penalties assessed against the Insured to the extent such fines or penalties are insurable by law; or (4) the monetary amount owed by You under the terms of a PCI merchant services agreement with a Card Company as a direct result of a Security Breach. Loss does not include: (a) civil or criminal fines or penalties imposed by law, except civil fines or penalties as provided under Paragraph i.(3)above; SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 4 of 20 node INTERNATIONAL (b) the multiplied portion of multiplied damages; (c) taxes; (d) royalties; (e) the amount of any disgorged profits; (f) matters that are uninsurable pursuant to law; (g) any fees resulting from the recall, re-performance or correction of services, content, goods or activities; (h) the costs to comply with injunctive or other non-monetary relief; or (i) liquidated damages pursuant to a contract,to the extent such amount exceeds the amount for which You would have been liable in the absence of such contract, except for amounts under Paragraph i.(4)above. ii. Defense Expenses means the reasonable and necessary fees (attorneys' and experts' fees) and expenses incurred in the defense or appeal of a Claim, including the cost of appeal, attachment or similar bonds (without any obligation on Our part to obtain such bonds)but excluding wages, salaries, benefits or expenses of Your Employees. iii. Wrongful Act means any actual or alleged: (1) Security Breach; (2) failure to prevent unauthorized access to, or use.of, electronic or non-electronic data containing Personal Information; (3) failure to prevent the transmission of a Virus through a Computer System into a computer network, any appplication software, or a computer operating system or related network that is not rented, owned, leased by, by,licensed to or under the direct operational control of the insured; or (4) failure to provide notification of any actual or potential Security Breach if such notification is required by any secuirty breach notification law; by, or asserted against an Insured. iv. Interrelated Wrongful Acts means all Wrongful Acts that have as a common nexus any i) fact, circumstance, situation, event, transaction or cause; or ii) series of causally connected facts, circumstances, situations, events, transactions or causes. v. Regulatory Proceeding means an investigation, demand or proceeding brought by, or on behalf of, the Federal Trade Commission, Federal Communications Commission, the Department of Health and Human Services or other administrative or regulatory agency, or any federal, state, local or foreign governmental entity in such entity's regulatory or official capacity, including, but not limited to any investigation, demand, or proceeding, brought by an administrative or regulatory agency whether involving the California Consumer Privacy Act(CCPA),the General Data Protection Regulation(GDPR),or similar privacy regulations. SECTION II— LIMITS OF INSURANCE 1. Policy Aggregate Limit of Insurance The most We will pay for all covered Loss and Defense Expenses is the Policy Aggregate Limit of Insurance shown in the Declarations. The Policy Aggregate Limit of Insurance shall be reduced by any payment, including Defense Expenses,made under the terms of this Policy. Upon exhaustion of the Policy Aggregate Limit of Insurance by such payments, We will have no further obligations or liability of any kind under this Policy. SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 5 of 20 node INTERNATIONAL 2. Aggregate Sublimit(s)of Insurance The Aggregate Sublimit(s)of Insurance set forth in the Declarations are part of, and not in addition to, the Policy Aggregate Limit of Insurance.Any such Aggregate Sublimit(s)of Insurance shall be reduced by any payment for Loss and, if applicable, Defense Expenses, under the Insuring Agreement to which such Aggregate Sublimit of Insurance applies. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations or liability of any kind with respect to Loss or Defense Expenses, subject to such Sublimit of Insurance. SECTION III—DEDUCTIBLE Subject to Section II—Limits of Insurance: 1. Under Insuring Agreements 1 —Security Breach Expense, 2— Extortion Threats and 3—Replacement or Restoration of Electronic Data, We will pay only the amount of Loss which is in excess of the Policy Deductible amount shown in the Declarations. 2. Under Insuring Agreement 4—Business Income, Contingent Busin ss Income and Extra Expense: We will pay only the amount of Loss which exceeds the great f th ollowing deductible amounts: a. The Policy Deductible Amount shown in the Declaration , b. The amount of Loss incurred during the Time uctible s in the Declarations. 3. Under Insuring Agreement 5—Security Breach • nc • ayment Card Industry(PCI) Fines and Penalties: We will pay only the amount of Loss and D- ' e _ •enses, which is in excess of the Policy Deductible Amount shown in the Declarations, re ing f - s. e Wrongful Act or Interrelated Wrongful Acts. Such Policy Deductible Amount will b- `• - • Yo►, self-insured, and at Your own risk. 4. The Policy Deductible applies -I -ach Cyber Incident, Extortion Threat, Security Breach, Wrongful Act, Interrelated Wro - •r Claim. In the event a Loss is covered under more than one Insuring Agreement, onl ingl. ghest deductible amount applicable to the Loss shall be applied. SECTION IV—DEFENSE A ' ENT The provisions contained within this on apply only to Insuring Agreement 5—Security Breach Liability Including Payment Card Industry(PCI) Fines and Penalties: We shall have the right and duty to select counsel and defend the Insured against any Claim covered under Paragraph 5.a of Insuring Agreement 5— Security Breach Liability Including Payment Card Industry (PCI) Fines and Penalties, even if the allegations of such Claim are groundless, false or fraudulent. However, We shall have the right but not the duty to defend the Insured against a Claim covered under Paragraph 5.b of Insuring Agreement 5-Security Breach Liability Including Payment Card Industry(PCI)Fines and Penalties and We shall have no duty to defend the Insured against any Claim which is not covered under such Insuring Agreement. We may, upon the written consent of the Insured, make any settlement of a Claim which We deem reasonable. If the Insured withholds consent to such settlement, Our liability for all Loss resulting from such Claim will not exceed the amount for which We could have settled such Claim, plus Defense Expenses incurred, as of the date We proposed such settlement in writing to the Insured. Upon refusing to consent to a settlement We deem reasonable, the Insured shall, at its sole expense, assume all further responsibility for its defense, including all additional Defense Expenses, costs associated with the investigation, defense and/or settlement of such Claim. SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 6 of 20 node INTERNATIONAL SECTION V— EXCLUSIONS We will not be liable for Loss or Defense Expenses directly or indirectly based upon, attributable to or arising out of: 1. Lightning, earthquake, hail, volcanic action, wind, smoke, explosion, tidal wave or flood, landslide, electromagnetic pulse, or other electromagnetic disturbances and/or any Space Weather as classified by NOAA, tornado, or any other act of God or nature. 2. Any of the following: a. War, including undeclared or civil war or civil unrest; b. Warlike action by military force, including action hindering or defending against an actual or expected attack, by any government, sovereign or other authority using military personnel or other agents; c. Insurrection, rebellion, revolution, usurped power or action taken by government authority in hindering or defending against any of these; d. Any Cyber Incident, Security Breach,or other Wrongful ct by or on behalf of any government, sovereign, state, or other authority sponsored actor or g that results in, or is carried out in the course of, any of the events in part a, b, or c above. 3. The dispersal or application of pathogenic or poisonous biologic c ical materials, nuclear reaction, nuclear radiation or radioactive contamination, or any r ted act or ent, however caused. 4. Bodily Injury or physical damage to or destructi• gi erty, including loss of use thereof. Bodily Injury means bodily injury, sicknes • • e sustained by a person, including death resulting from any of these at any time. It also mea en injury, mental anguish, mental tension, emotional distress, pain or suffering or shock su fined p- son. However, Bodily Injury does nit mea e anguish or emotional distress resulting directly from a Security Breach or Cyber Inch. lip, 5. Any disruption in normal 'Lite .nction or network service or function due to insufficient capacity to process transactions or .ue t. • • -rload of activity on a Computer System or network. However, this exclusion shall not appl . r •tion is caused by a Cyber Incident or Security Breach. 6. Any disruption of i)internet e;or ii)any external telecommunication network, regardless of the cause; or iii)failure or termination of any core element of internet, telecommunications, or GPS infrastructure that results in a regional, countrywide,or global outage of such infrastructure; or iv)failure of power supply and other utilities unless the provision of power and other utility services is under the Named Insured's direct control. However, parts i)and ii)of this exclusion shall not apply if such disruption is caused by a denial of service attack under Paragraph b. of Definition 5. Cyber Incident. 7. Any failure of, reduction in or surge of power, regardless of the cause. 8. Any actual or alleged violation of the Racketeer Influenced and Corrupt Organizations Act (RICO) and its amendments, or similar provisions of any federal, state or local statutory or common law. 9. Any malfunction or failure of any satellite. 10. Any actual or alleged oral or written publication of material, if done by an Insured or at an Insured's direction with knowledge of its falsity. SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 7 of 20 node INTERNATIONAL 11. An Insured's assumption of liability by contract or agreement, whether oral or written. However, this exclusion shall not apply to any liability that an Insured would have incurred in the absence of such contract or agreement. 12. Any actual or alleged patent or trade secret violation, including any actual or alleged violation of the Patent Act,the Economic Espionage Act of 1996 or the Uniform Trade Secrets Act and their amendments. 13. Any of the following: a. The actual, alleged or threatened discharge, dispersal, seepage, migration, release or escape of Pollutants at any time; b. Any request, demand, order or statutory or regulatory requirement that any Insured or others test for, monitor, clean up, remove, contain, treat, detoxify or neutralize, or in any way respond to, or assess the effects of, Pollutants; or c. Any Claim or Suit brought by, or on behalf of, any governmental authority for damages because of testing for, monitoring,cleaning up, removing, containing,treating, detoxifying or neutralizing, or in any way responding to, or assessing the effects of, Pollutants. 14. Any Claim, Suit or other proceeding against an Insured which pending or existed prior to the Policy Period or arising out of the same or substantially the same ac act ircumstances or allegations which are the subject of, or the basis for, such Claim, Suit or other ng. 15. Any actions or activities related to an Insured's pra es as an oyer including, but not limited to, refusal to employ, termination of employment, coe '•n, motio evaluation, reassignment, discipline, defamation, harassment, humiliation, discriminati• or .li osecution. This exclusion applies: a. Whether the injury-causing event d ib. .ove occurs before employment,during employment or after employment of that person; b. Whether the Insured may be L ble a p . er or in any other capacity; and c. To any obligation to share da i o pay someone else who must pay damages because of the injury. However, this exclusion will not a�- laim resulting directly from a Privacy Breach related to the Personal information of mp e. 16. Any Cyber Incident, E r t, Security Breach, Wrongful Act, or Interrelated Wrongful Acts that any Insured became aware prior to the effective date of the Policy. 17. The same facts, Cyber Incident, Extortion Threat, Security Breach, Wrongful Act, or Interrelated Wrongful Acts alleged or contained in any Claim which has been reported, or in any circumstances of which notice has been given, under any insurance policy of which this Policy is a renewal or replacement. 18. Any criminal, dishonest, malicious or fraudulent act, error or omission or any willful violation of any statute or regulation committed by an Insured, acting alone or in collusion with others. However, with the exception of Claims excluded under Exclusion 12., this exclusion shall not apply to any dishonest, malicious or fraudulent act, error or omission committed by an Employee which gives rise to a Claim or Loss covered under Insuring Agreement 1 —Security Breach Expense or Insuring Agreement 5 — Security Breach Liability Including Payment Card Industry (PCI) Fines and Penalties. This exception does not apply to any Employee who is a Chief Executive Officer, Chief Financial Officer, Chief Security Officer, Chief Technology Officer, Chief Information Officer, Risk Manager, General Counsel, owner, general manager or any functionally equivalent positions of the Insured or any Subsidiary, regardless of title. With the exception of Claims excluded under Exclusion 12,We will defend the Insured against any Claim alleging such acts or violations until final adjudication is rendered against that Insured. Final adjudication SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 8 of 20 node INTERNATIONAL rendered against one Insured shall not be imputed to any other Insured. We will not provide indemnification for any Claim to which any Insured enters a guilty plea or pleads no contest and We will not provide a defense from the time We become aware that any Insured intends to so plead. 19. Any action or proceeding brought by, or on behalf of, any governmental authority or regulatory agency including, but not limited to: a. The seizure or destruction of property by order of a governmental authority; b. Regulatory actions or proceedings brought by, or on behalf of, the Federal Trade Commission, Federal Communications Commission or other regulatory agency, except when covered under Paragraph c.a of Insuring Agreement 5—Security Breach Liability Including Payment Card Industry (PCI) Fines and Penalties; or c. The shutdown or seizure of systems or services by a government or regulatory body. However, this exclusion shall not apply to actions or proceedings brought by a governmental authority or a regulatory agency acting solely in its capacity as a customer of the Named Insured or of a Subsidiary. 20. Any costs or expenses associated with upgrading or improv' a puter System regardless of the reason. 21. Any Claim brought or alleged by one Insured against ther, exc r a Claim brought or alleged by an Employee against an Insured as a result of a Sec ' ach o yber Incident. 22. Fines, penalties or assessments imposed pu• cont t or agreement, whether oral or written, including, but not limited to, Payment Card us I)fines, penalties or assessments. This exclusion shall not apply to the coverage provided un a . aph c. of Insuring Agreement 5 - Security Breach Liability Including Payment Card Indus (PC s . d Penalties. 23. Any costs related to loss of any virtual c n 24. Any actual or alleged restraint o :f- • polization, unfair trade, price fixing, violation of the Federal Trade Commission Act, t. er Antitrust Act, the Clayton Act, including any amendment thereto or any rule or regulation . .mu .. -d der any such statute, or any similar foreign, federal, state or local statute, rule or regulati• ,e, , is exclusion shall not apply to a Claim alleging unfair or deceptive acts or practices in or a'ecting • merce under Section 5(a) of the Federal Trade Commission Act (15 U.S.C.45(a)). 25. any of the following: a. Unlawful or unauthorized collection, harvesting, processing, storage, transfer, distribution or sale of Personal Information or other data; b. Wiretapping, eavesdropping, improper consent practices, unlawful or unauthorized use of tracking/monitoring/surveillance software tools, or audio or video recording; or c. Violation of the Illinois Biometric Information Privacy Act or similar provisions of any federal, state, local, or foreign statutory or common law, directive or regulation regulating the collection, handling, use, or storage of biometric data and/or any required disclosures thereof. However, section 25.b of this exclusion will not apply to Defense Expenses incurred for the failure to prevent unauthorized access to, or use of, electronic or non-electronic data containing identity information. 26. a. The purchase or sale of or offer to purchase or sell any securities or any violation of the Securities Exchange Act of 1934 or the Securities Act of 1933 and any amendments thereto or any other foreign, federal, state or local statute, or any rule or regulation promulgated under such statutes, that regulates the offering, sale or purchase of securities. SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 9 of 20 node INTERNATIONAL b. Any Claim brought by any security holder of the Insured,in their capacity as such,whether directly, by class action, or derivatively on behalf of the Insured. 27. Any Claim arising out of, caused by or related to a"Technology Errors&Omissions Wrongful Act." For purposes of this exclusion,the following definitions apply: a. "Technology Errors & Omissions Wrongful Act" means any negligent act, error or omission, including any negligent act, error or omission resulting in a breach of contract or in a failure of "Technology Products"to perform the function or serve the purpose intended by an Insured or by a person or entity for whom the Insured is legally liable, in the performance of "Technology Services." b. "Technology Services" means the following services performed for others for compensation by an Insured or by any other person or entity for whom the Insured is legally liable: i. analysis, design, integration, wiring, cabling, or conversion of computer and electronic technology systems or networks; ii. designing, developing, programming, servicing, distributing, licensing, installing, maintaining and repairing computer software, computer code and computer firmware or hardware; iii. education and training in the use of computer dw or software; iv. information services; v. computer consulting; vi. computer and network security servi , includin not limited to providing content filtering, patch administration and s- ri udits; vii. internet services; or viii. data processing in connection . the ve listed services,including but not limited to storing, collecting, comp'• ., ssing, mining, conversion, encryption, recording or analysis of data. c. "Technology Products" mean .ny c. • . -r .rdware, firmware, software, or related electronic product, equipment or devic- -)_ 'fi. ly -signed or intended for use in connection with any "Technology Services," telecom i - systems or telecommunication service that is created, manufactured, develop; ' ibu . licensed, leased or sold by the Insured or for any Insured by others acting under th, • ' rade name. SECTION VI—CONDITION 1. Cancellation a. The first Named Insured shown in the Declarations may cancel this Policy by mailing or delivering to Us advance written notice of cancellation. b. We may cancel this Policy by mailing or delivering to the first Named Insured written notice of cancellation at least: i. 10 days before the effective date of cancellation if We cancel for nonpayment of premium; or ii. 30 days before the effective date of cancellation if We cancel for any other reason. c. We will mail or deliver Our notice to the first Named Insured's last mailing address known to Us. d. Notice of cancellation will state the effective date of cancellation.The Policy Period will end on that date. e. If this Policy is canceled, We will send the first Named Insured any premium refund due. If We cancel, the refund will be prorated. If the first Named Insured cancels, the refund may be less than pro rata.The cancellation will be effective even if We have not made or offered a refund. SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 10 of 20 node INTERNATIONAL f. If notice is mailed, proof of mailing will be sufficient proof of notice. 2. Changes This Policy contains all the agreements between You and Us concerning the insurance afforded. The first Named Insured shown in the Declarations is authorized to make changes in the terms of this Policy with Our consent. This Policy's terms can be amended or waived only by endorsement issued by Us and made a part of this Policy. 3. Examination of Your Books and Records We may examine and audit Your books and records as they relate to this Policy at any time during the Policy Period shown in the Declarations and up to three years afterward. 4. Inspections and Surveys We have the right to i)make inspections and surveys at any time; ii)give You reports on the conditions We find; and iii)recommend changes. We are not obligated to make any inspections,surveys, report rec.• mendations,and any such actions We do undertake relate only to insurability and the premiu t. .e ch rged. We do not make safety inspections.We do not undertake to perform the duty of any pers. .r or . ization to provide for the health or safety of workers or the public.And We do not warra at condit. are safe or healthful;or ii)comply with laws, regulations, codes or standards. Paragraph 2 of this condition applies not only t. 447 ' :ISO t ny rating, advisory, rate service or similar organization which makes insurance inspec' s, 11 ys, reports or recommendations. 5. Premiums yr " The first Named Insured shown in the a ;E s: i)is responsible for the payments of all premiums; and ii)will be the payee for any retu ,,ium ° le pay. 6. Transfer of Your Rights Dut nder This Policy Your rights and duties s o y may not be transferred without Our written consent, except in the case of death of an indivi ual N ed Insured. If You are a sole proprietor and You die, Your rights and duties will be transferred to Your legal representative but only while acting within the scope of duties as Your legal representative. Until Your legal representative is appointed,anyone having proper temporary custody of Your property will have Your rights and duties but only with respect to that property. 7. Subrogation With respect to any payment made under this Policy, We shall be subrogated to the Insureds rights of recovery to the extent of such payment. The Insured shall execute all papers required and shall do everything necessary to secure and preserve such rights, including the execution of such documents necessary to enable Us to bring suit in the Insured's name. Any recoveries, less the cost of obtaining them, will be distributed as follows: a. To You, until You are reimbursed for any Loss You sustain that exceed the sum of the Policy Limit of Insurance and the Deductible Amount, if any; b. Then to Us, until We are reimbursed for the payment made under this Policy; and c. Then to You, until You are reimbursed for that part of the payment equal to the Deductible Amount, if any. SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 11 of 20 node INTERNATIONAL 8. Bankruptcy Your bankruptcy, or the bankruptcy of Your estate if You are a sole proprietor, will not relieve Us of Our obligations under this Policy. 9. Representations You represent that all information and statements contained in the Application are true, accurate and complete. All such information and statements are the basis for Our issuing this Policy. Misrepresentation of any material fact may be grounds for the rescission of this Policy. 10. Changes in Exposure a. Acquisition or Creation of Another Organization If before or during the Policy Period: You acquire securities or voting rights in her organization or create another organization which, as a result of such acquis' ' or ation, becomes a Subsidiary; or ii. You acquire any organization through merge c olid ion; then such organization will be covered under t Policy bu with respect to Wrongful Acts or Loss which occurred after the effective dat acq ' ition or creation provided, with regard to Paragraphs a.(i)and a.(ii)above, You: (1) give Us written notice of th- q or creation of such organization within ninety(90) days after the effective date ` c tion; (2) obtain Our written c. sent • i e the coverage provided by this Policy to such organization; and (3) upon obtaining Our con- •t, • s an additional premium. b. Acquisition of Named I V• If during the Po Per' the Name Ins d merges into or consolidates with another organization, such that the Named In is not the surviving organization; or ii. another organization,or person or group of organizations and/or persons acting in concert, acquires securities or voting rights which result in ownership or voting control by the other organization(s)or person(s)of more than fifty percent (50%)of the outstanding securities or voting rights representing the present right to vote for the election of directors, trustees or managers(if a limited liability company)of the Named Insured; then the coverage afforded under this Policy will continue until the end of the Policy Period, but only with respect to Claims arising out of Wrongful Acts which occurred prior to the effective date of such merger, consolidation or acquisition. The full annual premium for the Policy Period will be deemed to be fully earned immediately upon the occurrence of such merger, consolidation or acquisition of the Named Insured. The Named Insured must give written notice of such merger, consolidation or acquisition to Us as soon as practicable, together with such information as We may reasonably require. c. If, before or during the Policy Period, an organization ceases to be a Subsidiary, the coverage afforded under this Policy with respect to such Subsidiary will continue until the end of the Policy SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 12 of 20 node INTERNATIONAL Period but only with respect to Claims arising out of Wrongful Acts which occurred prior to the date such organization ceased to be a Subsidiary. 11. Other Insurance Under Insuring Agreements 1 — Security Breach Expense, 2 — Extortion Threats or 3 — Replacement or Restoration of Electronic Data: If any covered Claim or Loss is insured by any other valid policy, then this Policy shall apply only in excess of the amount of any deductible, retention and limit applicable to such other insurance, whether such other policy is stated to be primary, contributory, excess, contingent or otherwise, unless such other policy is written specifically excess of this Policy by reference in such other policy to this Policy's policy number. When this Policy is excess, We shall have no duty under Insuring Agreement 5—Security Breach Liability Including Payment Card Industry (PCI) Fines and Penalties to defend the Insured against any Suit if any other insurer has a duty to defend the Insured against that Suit. If any covered Claim or Loss is insured by any other valid policy issued by Us,our liability under this Policy and such other policy combined shall not exceed the amount of th largest applicable Aggregate Limits or Sublimit(s)of Insurance. 12. Legal Action Against Us No person or organization has a right: i)to join Us as arty or ot Ise bring Us into a Suit asking for damages from an Insured; or ii)to sue Us under thi li nles II of its terms have been fully complied with. A person or organization may sue Us to rec. r o agreed settlement or on a final judgment against an Insured, but We will not be liable for damag- :t ot payable under Insuring Agreement 5—Security Breach Liability Including Payment C. • Indu 'C Fines and Penalties, or that are in excess of the Policy Aggregate Limit of Insurance. • e • lement means a settlement and release of liability signed by Us,the first Named In ured a t :imant or the claimant's legal representative. You may not bring any legal acti Us involving Loss: i) unless You have complied with all the terms of this Policy;ii)un ' ty( days after You have filed proof of loss with Us;and iii)unless brought within two (2)years fro he reported the Loss to Us. If any limitation in this con ition i rohibited by law, such limitation is amended so as to equal the minimum period of limitation provide ch law. 13. Separation of Insureds Except with respect to the Policy Aggregate Limit of Insurance,and any rights or duties specifically assigned in Insuring Agreement 5 — Security Breach Liability Including Payment Card Industry (PCI) Fines and Penalties to the first Named Insured,this Policy applies separately to each Insured against whom a Claim is made. 14. Duties in the Event of Claim or Loss After a situation that results in,or may result in, a Loss covered under this Policy is Discovered,You must notify Us in writing as soon as practicable, but not to exceed thirty (30) days from the date Discovered, and cooperate with Us in the investigation and settlement of the Claim or Loss. Additionally: a. Under Insuring Agreements 1 —Security Breach Expense, 2—Extortion Threats, 3—Replacement or Restoration of Electronic Data, and 4—Business Income and Extra Expense, You must: notify local law enforcement officials; SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 13 of 20 node INTERNATIONAL ii. submit to examination under oath at Our request and give Us a signed statement of Your answers; and iii. At Our request give Us a detailed, sworn proof of loss within one hundred twenty (120) days. In addition, under Insuring Agreement 2—Extortion Threats, You must also: (1) determine that the Extortion Threat has actually occurred; and (2) with respect to Ransomware, make every reasonable effort to access Your Electronic Data from backup, if any, and to remediate the cause of the Ransomware; and (3) make every reasonable effort to immediately notify Us before making any ransom payment based upon the Extortion Threat; and (4) approve any ransom payment based upon the Extortion Threat. b. Under Insuring Agreement 5 — Security Breach Liability Including Payment Card Industry (PCI) Fines and Penalties, You must: i. immediately record the specifics of the Claim and the date Discovered; ii. immediately send Us copies of any demands, n ' s, summonses or legal papers received in connection with the Claims; iii. authorize Us to obtain records and other info i , and iv. assist Us, upon Our request, in the enforcemen ny t against any person or organization which may be liable to Y ecause oss to which this Policy may also apply. You will not, except at Your own cost, 41, • mak payment, assume any obligation or incur any expense without Our consent. 15. Extended Reporting Periods a. Automatic Extended - . •ortin er If the Named Insured c. renews this Policy, the Insurer cancels or non-renews this Policy,or if there is decr: •- n its, reduction of coverage, increased deductible or self-insured retention, new on, o :ny other change less favorable to the Insured, then the Insured will have an autom ic, n. lable 60-day Extended Reporting Period. b. Supplemental Ext d Reporting Period If the Named Insured cancels or non-renews this Policy, the Insurer cancels or non-renews this Policy,or if there is a decrease in limits, reduction of coverage,increased deductible or self-insured retention, new exclusion, or any other change less favorable to the Insured, the Named Insured will have the right to purchase an optional Extended Reporting Period of up to three (3)years to immediately follow the automatic Extended Reporting Period. The optional Extended Reporting Periods and their respective additional premiums are stated in the Declarations or by endorsement. The premium for such Extended Reporting Period is based on the rating of the canceled or terminated Policy. We must receive written notice of the optional Extended Reporting Period elected together with payment of the applicable additional premium, within either 1) sixty (60) days after the end of the Policy Period or 2) thirty (30) days from the effective date of mailing or deliver of the notification advising You of the availability of,the premium for, and the importance of purchasing optional Extended Reporting Period. If the Insurer does not receive payment within such period, the Insurer will not be required to provide any optional Extended Reporting Period. SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 14 of 20 node INTERNATIONAL If an optional Extended Reporting Period is purchased, we will provide an Additional Extended Reporting Period Additional Limit of Insurance equal to the remaining applicable Limit of Insurance of the canceled or terminated Policy. 16. Valuation—Settlement All premiums, limit(s)of insurance, deductible amounts, Loss and any other monetary amounts under this Policy are expressed and payable in the currency of the United States of America. If judgment is rendered, settlement is agreed to or another component of Loss under this Policy is expressed in any currency other than United States of America dollars, payment under this Policy shall be made in United States dollars at the rate of exchange published in The Wall Street Journal on the date the final judgment is entered, settlement amount is agreed upon or the other component of Loss is due, respectively. a. With respect to Loss covered under Insuring Agreement 4 — Business Income, Contingent Business Income and Extra Expense, the amount of"business and contingent business income" will be determined based on consideration of: the net income generated from Your E-commerce Activities before the Interruption occurred; ii. the likely net income generated by Your E-c• er-,• Activities if no Interruption had occurred, but not including any net income th. . . like have been earned as a result of an increase in the volume of business due to ora, business conditions caused by the impact of the Cyber Incident on c omers or . er businesses; iii. the operating expenses, includin. •a , nec sary to resume Your E-commerce Activities with the same quality . _e e ted before the Interruption; and iv. other relevant sources of inf. •atio nclu g Your financial records and accounting procedures, bills, invoices o •uchers, and debts, liens and contracts. However, the amount of"busi ss an in. •nt business income"will be reduced to the extent that the reduction in the volu si s om the affected E-commerce Activities is offset by an increase in the volume of b e m other channels of commerce such as via telephone, mail or other sources. b. With respect to L.• - ever nder nsuring Agreement 4—Business Income,Contingent Business Income and Ex : Exp-. e, e amount of"extra expense"will be determined based on: necessary expe._`es that exceed the normal operating expenses that would have been incurred in '" urse of Your E-commerce Activities during the period of coverage if no Interruption had occurred. We will deduct from the total of such expenses the salvage value that remains of any property bought for temporary use during the period of coverage once Your E-commerce Activities are resumed; and ii. necessary expenses that reduce the"business and contingent business income"Loss that otherwise would have been incurred during the period of coverage. 17. Confidentiality Under Insuring Agreement 2 — Extortion Threats, Insureds must make every reasonable effort not to divulge the existence of this coverage. 18. Territory This Policy covers Wrongful Acts, Security Breaches, Cyber Incidents and Extortion Threats which occur anywhere in the world. However. Suits must be brought in the United States of America (including its territories and possessions). SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 15 of 20 node INTERNATIONAL 19. Policy Bridge—Discovery Replacing Loss Sustained If this Policy replaces insurance that provided You with an extended period of time after cancellation or nonrenewal in which to Discover Loss resulting directly from any Cyber Incident, Extortion Threat, Security Breach, or Claim and which did not terminate when this Policy became effective: We will not pay for any Loss resulting directly from any Cyber Incident, Extortion Threat, Security Breach,or Claim that occurred during the Policy Period of that prior insurance which is Discovered during such extended period of time, unless the amount of that Loss exceeds the Limit of Insurance and Deductible Amount of that prior insurance. In that case, We will pay for the excess Loss subject to the terms and conditions of this Policy. Condition 11 —Other Insurance does not apply to this condition. 20. Nonrenewal We may non-renew this Policy for any reason allowable by applicable law. If We decide not to renew this Policy, We will mail or deliver to the first Named Insured written notice of the nonrenewal not less than thirty(30)days before the expiration date. If notice is mailed, proof of mailing will be sufficient proof of n SECTION VII— DEFINITIONS 1. Application means the signed application for thi nc • ny attachments,attestations,and other materials submitted in conjunction with the sig ... .tion, igital or otherwise. 2. Card Company means American Express, .` ov. inancial Services, JCB International, MasterCard Worldwide,Visa Inc.or any other credi .rd c• • at requires its merchants to adhere to the Payment Card Industry(PCI)Data Security Sta 3. Claim means: a. A written deman. mo ry or nonmonetary damages, including but not limited to injunctive relief; b. A civil proceedi • • m: c d by the service of a complaint or similar proceeding; c. Under Paragraph .. of I' ring Agreement 5 — Security Breach Liability Including Payment Card Industry(PCI)Fine . 'enalties,a Regulatory Proceeding commenced by the filing of a notice of charges,formal investigative order, service of summons or similar document; or d. Under Paragraph c. of Insuring Agreement 5 — Security Breach Liability Including Payment Card Industry (PCI) Fines and Penalties an action brought by a Card Company of the Payment Card Industry(PCI); against any Insured for a Wrongful Act, including any appeal therefrom. 4. Computer System means any computer, including transportable or handheld devices, electronic storage devices and related peripheral components; any systems and applications software, or any related telecommunications networks connected to or used in connection with such computer or devices: i)which collects, transmits, processes, stores or retrieves Your Electronic Data; and ii)which is: a. Owned by You; b. Leased by You and operated by any Insured; c. Owned and operated by an Employee who has agreed in writing to Your personal device use policy; or d. Operated by an authorized Third Party, but only with respect to Your Electronic Data. SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 16 of 20 node INTERNATIONAL 5. Cyber Incident means: a. Any i)Hacker attack; ii)malicious code; or iii)Virus that is directed at, enacted upon or introduced into a Computer System (including Your Electronic Data) and is designed to access, alter, corrupt,damage,delete, destroy, disrupt,encrypt, use or prevent or restrict access to or the use of any part of a Computer System (including Your Electronic Data)or otherwise disrupt its normal functioning or operation. Recurrence of the same Virus after a Computer System has been restored shall constitute a separate Cyber Incident. b. Any denial of service attack specifically directed at You which disrupts, prevents or restricts access to or use of a Computer System or otherwise disrupts the normal functioning or operation of a Computer System. 6. Discovery or Discovered means the time when any Employee who is a Chief Executive Officer, Chief Financial Officer,Chief Security Officer, Chief Technology Officer, Chief Information Officer, Risk Manager, General Counsel, owner, general manager, or any functionally equivalent positions of the Insured or any Subsidiary, regardless of title first becomes aware of facts wh' would cause a reasonable person to believe that a Loss covered by this Policy has been or will be ' urre regardless of when the act or acts causing or contributing to such Loss occurred, even though e t a unt or details of Loss may not then be known. Discovery or Discovered also means the time w -. Insur first receives notice of an actual or potential Claim in which it is alleged that You an . 'r arty under circumstances which, if true, would constitute a Loss under this Policy. 7. E-commerce Activities means those activit \ .n. Led by You in the normal conduct of Your business via Your web site or Your e-mail syste •. 8. Electronic Data means information, fa. -s or sounds stored as or on, created or used on, or transmitted to or from comput: • are ' cluding systems and applications software) on electronic storage devices including, but nv „•, hard or floppy disks, CD-ROMs, tapes, drives, cells, data processing devices or othedia which are used with electronically controlled equipment. Electronic Data is not gibl o. y. Electronic Data does no includ our Electronic Data that is licensed,leased, rented or loaned to others. 9. Employee means any natural person who was, now is, or will be: a. Employed on a full-or part-time basis; b. Furnished temporarily to You to substitute for a permanent employee on leave or to meet seasonal or short-term workload conditions; c. Leased to You by a labor leasing firm under an agreement between You and the labor leasing firm to perform duties related to the conduct of Your business but does not mean a temporary employee as defined in Paragraph 9.b. above; d. An officer; e. A director, trustee or manager(if a limited liability company); f. A volunteer worker; g. A partner or member(if a limited liability company); or h. An Independent Contractor, of the Named Insured and those of any organization qualifying as a Subsidiary under the terms of this Policy, but only while acting within the scope of their duties as determined by the Named Insured or such Subsidiary. SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 17 of 20 node INTERNATIONAL 10. Extended Reporting Period means a designated period immediately following cancellation, nonrenewal, decrease in limits, reduced coverage, increased deductible or self-insured retention, newly added exclusions,or any other changes which are less favorable to the Insured of the Policy,during which Claims first made against the Insured will be deemed made during the Policy Period, but only for Wrongful Acts or Interrelated Wrongful Acts that first occurred on or after the Retroactive Date, if any, and prior to the effective date of cancellation, nonrenewal, decrease in limits, reduced coverage, increased deductible or self-insured retention, newly added exclusions, or any other changes which are less favorable to the Insured, of the Policy. 11. Extortion Threat means a threat or series of related threats: a. To perpetrate a Cyber Incident; b. To disseminate,divulge or utilize:i)Your proprietary information;or ii)weakness in the source code within a Computer System by gaining unauthorized access to a Computer System; c. To destroy, corrupt or prevent normal access to a Computer System (including Your Electronic Data)by gaining or having gained unauthorized access to a Computer System; d. To inflict Ransomware on a Computer System; or e. To publish Your client's or Employee's Personal Information. Extortion Threat does not include a threat or series of threat any ird Party. 12. Hacker means a person who accesses a Computer System (i din our Electronic Data)who is: i) not authorized to have such access; or ii)authorized t ve such s but who uses such access in an unauthorized manner. 13. Independent Contractor means any person • -ntit ontra d by the Named Insured to perform the same business operations as the Named In e•, •nly while in the course of their performance of such business operations on behalf of, or at the di ' '•n . the Named Insured. 14. Insured means any Named Insured . .1. -es. 15. Interrelated Wrongful Acts II ' •ngful Acts that have as a common nexus any: i) fact, circumstance, situation, event, -- • or cause; or ii) a series of casually connected facts, circumstances, situations ts, sactions or causes. 16. Interruption means: a. With respect to a C ncident: an unanticipated cessation or slowdown for Your E-Commerce Activities; or ii. Your suspension of Your E-Commerce Activities for the purpose of avoiding or mitigating the possibility of transmitting a Virus or malicious code to another person or organization; and, with regard to Paragraphs 16a.i and 16.a.ii. above, shall be deemed to begin when Your E-Commerce Activities are interrupted and ends at the earliest of: (1) one hundred-eighty(180)days after the Interruption begins; (2) the time when Your E-Commerce Activities are resumed; or (3) the time when service is restored to You. b. With respect to an Extortion Threat,Your voluntary suspension of Your E-Commerce Activities: i. based upon clear evidence of a credible threat; or ii. based upon the recommendation of a security firm, if any; and, with regard to Paragraphs 16.b.i and 16.b.ii. above, shall be deemed to begin when SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 18 of 20 node INTERNATIONAL Your E-Commerce Activities are interrupted and ends at the earliest of: (1) one hundred-eighty(180)days after the Interruption begins; (2) the time when Your E-Commerce Activities are resumed; or (3) the time when service is restored to You. 17. Loss means the definitions set forth in each of the respective Insuring Agreements of this Policy. 18. Named Insured means the entity or entities shown in the Declarations and any Subsidiary. 19. Personal Information means any information not available to the general public for any reason through which an individual may be identified including, but not limited to, an individual's: a. Social security number, driver's license number or state identification number; b. Protected health information; c. Financial account numbers; d. Security codes, passwords, PINs associated with credit,debit or charge card numbers which would permit access to financial accounts; or e. Any other nonpublic information as defined in Privacy R lations. 20. Policy Period means the period of time from the inception da f Po y shown in the Declarations to the expiration date shown in the Declarations, or its earlier cance on rmination date,and specifically excludes any Extended Reporting Period. 21. Pollutants means any solid, liquid, gaseous or • it contaminant, including smoke, vapor, soot, fumes, acids, alkalis, chemicals and was — incl s materials to be recycled, reconditioned or reclaimed. 22. Privacy Regulations means any of he f• • •. atutes and regulations, and their amendments, associated with the control and use o •a i• tifiable financial, health or other sensitive information including, but not limited to: a. The Health Insurance Po r. • ccountability Act of 1996 (HIPAA)(Public Law 104-191); b. The Health Inforr •n T. ology for Economic and Clinical Health Act (HITECH) (American Recovery and - nves •.e •ct of 2009); c. The Gramm-L- • " - c of 1999; d. Section 5(a) of the Fede Trade Commission Act (15 U.S.C. 45(a)), but solely for alleged unfair or deceptive acts o ices in or affecting commerce; e. The Identity Theft Red Flags Rules under the Fair and Accurate Credit Transactions Act of 2003; or f. Any other similar local, state, federal or foreign identity theft or privacy protection statute or regulation. 23. Ransomware means any software that is used to demand a ransom payment by: i)restricting access to a Computer System; or ii)encrypting Your Electronic Data held within a Computer System. 24. Ransom Demand means a demand by a third-party actor communicated in an electronic format to You as a request for payment in any form, including virtual currency, to rectify an Extortion Threat that is Discovered during the Policy Period. Ransom Payment means a monetary payment made during the Policy Period in any form, including virtual currency, to a third-party actor with Our prior written consent to resolve an Extortion Threat. Security Breach means a privacy breach that includes the acquisition of Personal Information held within a Computer System or in non-electronic form at or while in the care, custody or control of the Insured or authorized Third Party by a person: i)not authorized to have access to such information; or ii)authorized SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 19 of 20 node INTERNATIONAL to have access to such information but whose access results in the unauthorized disclosure of such information. 25. Subsidiary means any organization in which more than fifty percent(50%)of the outstanding securities or voting rights representing the present right to vote for the election of directors, trustees, managers (if a limited liability company) or persons serving in a similar capacity is owned, in any combination, by one or more Named Insureds. 26. Suit means a civil proceeding in which damages to which this Policy applies are claimed against the Insured. Suit includes: a. An arbitration proceeding in which such damages are claimed and to which the Insured submits with Our consent; or b. Any other alternative dispute resolution proceeding in which such damages are claimed and to which the Insured submits with Our consent. Suit does not include a civil proceeding seeking recognition and/or enforcement of a foreign money judgment. 27. Third Party means any entity that You engage under the term a 'ten contract to perform services for You. 28. Virus means any kind of malicious code designed to d age or d any part of a Computer System (including Your Electronic Data)or disrupt its norm ' ning. 29. Wrongful Act means any actual or alleged: a. Security Breach; b. Failure to prevent unauthorize acce or e of, electronic or non-electronic data containing identity information; c. Failure to prevent the transmis Virus through a Computer System into a computer is network, any applicatio re, computer operating system or related network that is not rented, owned, leased b - .. + or under the direct operational control of the Insured; or d. Failure to provid ifica of any actual or potential Security Breach if such notification is required by an ecur r= h notification law; by, or asserted against, an I su . SP CW 99 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 20 of 20 Policy Number: ('lOcie Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. COMPUTER AND FUNDS TRANSFER FRAUD Computer And Funds Transfer Fraud Coverage Limit: See coverage sheet Computer And Funds Transfer Fraud Deductible: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY With regard to this Computer And Funds Transfer Fraud endorsement, the provisions of the Policy to which this endorsement is attached remain unchanged and apply, unless modified by this endorsement. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSU';,; G P IREEMENTS: f Computer And Funds Transfer Fraud _ a. Subject to the Computer and Funds Transfer iv imit and Deductible set forth above, We will pay for: i. Loss resulting directly from a frau 1. Entry of Electronic Data ter System into; or 2. Change of Elect to omputer System within ito a Compute y tem, a person or organization without authorization to access such Computer s , ed the fraudulent entry or fraudulent change causes, with regard to Paragraphs a. . an .i.(2): a. Your money, securities or other property to be transferred, paid or delivered; or b. Your account at a financial institution to be debited or deleted, or ii. Loss resulting directly from a Fraudulent Instruction directing a financial institution to debit your Transfer Account and transfer, pay or deliver money or securities from that account that is first Discovered during the Policy Period and reported in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI—CONDITIONS. b. As used in Paragraph a.i., "fraudulent entry" or `fraudulent change" of Electronic Data or Computer Program shall include such entry or change made by an Employee acting, in good faith, upon a Fraudulent Instruction received from a computer software contractor who has a written agreement with You to design, implement or service Computer Programs for a Computer System covered under this Insuring Agreement. II. Solely with respect to the coverage afforded under this endorsement: SP CW 80 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 4 Policy Number: node Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL a. Computer Program means a set of related electronic instructions,which direct the operation and function of a computer or devices connected to it, which enables the computer or devices to receive, process, store or send your Electronic Data. b. Loss means: 1. In Paragraph I.a.i.: (a) Your money,securities or other property fraudulently transferred,paid or delivered; or (b) Money or securities fraudulently debited or deleted from Your account at a financial institution. 2. In Paragraph I.a.ii., transferring, paying or delivering money or securities from Your Transfer Account. c. Fraudulent Instruction means: (1) With regard to Paragraph I.a.ii.: k/ (a) A computer,telegraphic, ..le, , ety efacsimile,telephone or other electronic instruction directing a fi •ci. stitution to debit Your Transfer Account and to transfer, pay or deli m• a or securities from that Transfer Account, which instruction purports to ,. b. issued by You, but which in fact was fraudulently issued by som- -.e el su Your knowledge or consent. (b) A written instru N' • to a financial institution directing the financial institution to debit Tran -r . count and to transfer, pay or deliver money or securities or from tha. . -r count, through an electronic funds transfer system at specified o der specified conditions, which instruction purports to have sue, •.y You, but which in fact was issued, forged or altered by someone se ' t •ur knowledge or consent. (2) With re o Paragraph I.b.: A computer,telegraphic,cable,teletype,telefacsimile,telephone or other electronic, written or voice instruction directing an Employee to enter or change Electronic Data or Computer Programs within a Computer System covered under this Insuring Agreement, which instruction in fact was fraudulently issued by Your computer software contractor. d.Transfer Account means an account maintained by you at a financial institution from which You can initiate the transfer, payment or delivery of Money and Securities: (1) By means of computer, telegraphic, cable, teletype, telefacsimile, telephone or other electronic instructions; or (2) By means of written instructions establishing the conditions under which such transfers are to be initiated by such financial institution through an electronic funds transfer system. III. The following is added to SECTION II—LIMITS OF INSURANCE, 2.Aggregate Sublimit(s)of Insurance: SP CW 80 02 23 Includes copyrighted material of Insurance Services Office,Inc.,with its permission Page 2 of 4 Policy Number: r' cJe Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL The most We will pay for all Loss covered under the Computer and Funds Transfer Fraud Insuring Agreement is the Computer and Funds Transfer Fraud Sublimit of Insurance shown above, which is part of, not in addition to the Policy Aggregate Limit of Insurance set forth in the Declarations to this Policy. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations or liability of any kind with respect to Loss subject to such Sublimit of Insurance. IV. Paragraph 1.of Section III—Deductible is deleted in its entirety and replaced with the following: 1. Under Insuring Agreements 1. Security Breach Expense, 2. Extortion Threats, 3. Replacement Or Restoration Of Electronic Data, and Paragraph l.a. of this endorsement: We will pay only the amount of Loss which is in excess of the Policy Deductible Amount shown above. V. The following is added to SECTION V—EXCLUSIONS: 1. We will not be liable for Loss based upon, attributable to, ing out of or resulting from: i. A fraudulent: 1. Entry of Electronic Data or r Pr ram into; or 2. Change of Electronic D . or • mp , rogram within a Computer System, by a perso r• ''zation with authorized access to such Computer System, except when cover and g .ph I.b. ii. The use or pure -• us c dit, debit, charge, access, convenience, identification, stored-value or of o e information contained on such cards. og:11 iii. The givi or • ing of property in any exchange or purchase. iv. An Employ nancial institution acting upon any instruction to: 1. Transfer, pay or deliver money, securities or other property; or 2. Debit or delete Your account; which instruction proves to be fraudulent, except when covered under Paragraph I.b. 2. We will not be liable for Loss, or that part of any Loss, the proof of which as to its existence or amount is dependent upon: i. An inventory computation; or ii. A profit and loss computation. VI. The introductory statement to paragraph a. of Condition 14. Duties in the Event of Claim or Loss in SECTION VI—CONDITIONS is deleted in its entirety and replaced with the following: a. Under Insuring Agreements 2. Extortion Threats, 3. Replacement Or Restoration Of Electronic Data and SP CW 80 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 3 of 4 Policy Number: r' ccJe Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL this Computer Funds Transfer Fraud Insuring Agreement, you must: All other terms and conditions remain unchanged. (1(/ 4(\/ ‘11114 SP CW 80 02 23 Includes copyrighted material of Insurance Services Office,Inc.,with its permission Page 4 of 4 Policy Number: (''iDcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. HARDWARE REPLACEMENT COSTS ENDORSEMENT Hardware Replacement Costs Coverage Limit: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Hardware Replacement Costs Endorsement, all provisions of the Policy to which this endorsement is attached, as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this endorsement are only for convenience. Read the entire policy carefully to determine rights, duties and what is and is not covered. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSURING AGREEMENTS: Hardware Replacement Costs: Subject to the Hardware Replacement Costs Coverage Limit set forth above and any Deductible specified in the Declarations to this policy, We will pay for Loss directly resulting from a Cyber Incident first Discovered during the Policy Period and reported in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI—CONDITIONS, to mitigate the potential of a future Cyber Incident or Security Breach. With respect to this Hardware Replacement Costs Insuring Agreement: a. Loss means the cost to replace hardware, including but not limited to, computers or any associated devices or equipment operated by, and either owned by or leased to, the Insured that are unable to function as intended due to corruption or destruction of software or firmware. b. Loss does not include any sums related to labor costs associated with installing, connecting or setting up the hardware. II. The following is added to SECTION II — LIMITS OF INSURANCE, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the Hardware Replacement Costs Insuring Agreement is the Hardware Replacement Costs Aggregate Sublimit of Insurance, if any, shown above or in the Declarations,which are part of, and not in addition to,the Policy Aggregate Limit of Insurance. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations of liability of any kind with respect to Loss subject to such Sublimit of Insurance. SP CW 86 05 22 Includes copyrighted material of Insurance Services Office,Inc.,with its permission Page 1 of 2 Policy Number: node, Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. III. The following is added to SECTION III—DEDUCTIBLE: Under the Hardware Replacement Costs Insuring Agreement, We will pay only the amount of Loss which is in excess of the Policy Deductible shown in the Declarations. IV. Exclusion 4 in SECTION V—EXCLUSIONS is deleted in its entirety and replaced with the following: 4. Bodily Injury Bodily Injury means bodily injury, sickness or disease sustained by a person, including death resulting from any of these at any time. It also means mental injury, mental anguish, mental tension, emotional distress, pain or suffering or shock sustained by any person. However, Bodily Injury does not mean mental anguish or emotional distress resulting directly from a Security Breach. All other terms and conditions remain unchanged. SP CW 86 05 22 Includes copyrighted material of Insurance Services Office,Inc.,with its permission Page 2 of 2 Policy Number: ('itDcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. POST BREACH REMEDIATION COVERAGE ENDORSEMENT Post Breach Remediation Coverage Limit: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Post Breach Remediation Coverage Endorsement, all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this endorsement are only for convenience. Read the entire policy carefully to determine rights, duties and what is and is not covered. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSURING AGREEMENTS: Post Breach Remediation: Subject to the Post Breach Remediation Coverage Limit set forth above and any Deductible specified in the Declarations to this policy, We will pay Loss incurred with Our prior written approval during the Policy Period and reported in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI — CONDITIONS, to resolve any vulnerabilities or weaknesses in your Computer System that are identified by an independent security firm after a Cyber Incident or Security Breach.The upgrades or improvements must be determined by the independent security firm to reduce the probability or potential damage from a Cyber Incident or Security Breach in the future. With respect to this Post Breach Remediation Insuring Agreement: a. Loss solely means: i. labor costs incurred by an independent security firm to determine whether any vulnerabilities or weaknesses exist in Your Computer System that are identified by an independent security firm after a Cyber Incident or Security Breach; and ii. labor costs incurred to resolve any vulnerabilities or weaknesses in your Computer System that are identified by an independent security firm after a Cyber Incident or Security Breach. II. The following is added to SECTION II — LIMITS OF INSURANCE. 2. Aggregate Sublimit(s) of Insurance: SP CW 87 05 22 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 2 Policy Number: rocJe Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. The most We will pay for all Loss covered under the Post Breach Remediation Insuring Agreement is the Post Breach Remediation Aggregate Sublimit of Insurance, if any, shown above or in the Declarations, which are part of, and not in addition to, the Policy Aggregate Limit of Insurance.Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations of liability of any kind with respect to Loss subject to such Sublimit of Insurance. III. The following is added to SECTION III—DEDUCTIBLE: Under the Post Breach Remediation Insuring Agreement,We will pay only the amount of Loss which is in excess of the Policy Deductible amount shown in the Declarations. All other terms and conditions remain unchanged. SP CW 87 05 22 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 2 Policy Number: node Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. SOCIAL ENGINEERING ENDORSEMENT Social Engineering Coverage Limit: See coverage sheet Social Engineering Deductible: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Social Engineering Endorsement, all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. In consideration of the premium charged for the Policy, it is hereby un.-rstood and agreed that: I. The following Insuring Agreement is added to SECTION I—I A •-EEMENTS: Social Engineering "!:,• Subject to the Social Engineering Coverage I . d le set forth above, We will pay for Social Engineering Loss resulting dire fro ' : So I Engineering Incident that is first Discovered during the Policy Period a p. - . in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI • IONS. With respect to this Social Engine s 'ng greement: 11la. Money means currency, , . - ' notes in current use and having a face value, travelers' checks, register s a oney orders held for sale to the public. The term Money does not include dig' cur c •r other negotiable and nonnegotiable instruments or contracts representing ei o property. b. Securities mean n ble and non-negotiable instruments or contracts representing either Money or property. Securities does not include Money. c. Social Engineering Incident means the intentional misleading of an Insured to transfer Money to a person, place or account beyond the Named Insured's control resulting directly from the Named Insured's employee's good faith reliance upon an instruction transmitted via email, purporting to be from: i. a natural person or entity who exchanges, or is under contract to exchange, goods or services with the Named Insured for a fee (other than a financial institution, asset manager, broker-dealer, armored motor vehicle"named insured"or any similar entity); or ii. an employee of the Named Insured; but which contained a fraudulent and material misrepresentation and was sent by an imposter. SP CW 91 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 3 Policy Number: ("iOcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. As a condition precedent to coverage under this Social Engineering Endorsement, the Named Insured must have an established and documented funds transfer request verification procedure and that procedure must have been followed before acting upon any instruction. d. Social Engineering Loss means the loss of Money as a result of a Social Engineering Incident. Social Engineering Loss does not include indirect and/or consequential loss. II. The following is added to SECTION II — LIMITS OF INSURANCE, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the Social Engineering Insuring Agreement is the Social Engineering Aggregate Sublimit of Insurance, if any, shown above or in the Declarations., which are part of, and not in addition to, the Policy Aggregate it of Insurance. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments e will have no further obligations of liability of any kind with respect to Loss subject to such imi Insurance. III. The following is added to SECTION III—DEDUCTI=LE: Under the Social Engineering Insuring Agree . ill p only the amount of Loss which is in excess of the Policy Deductible shown a.' -, or th- ` arations. IV. SECTION V—EXCLUSIONS is amended to .e: We will not be liable for Social Engine• �t • Z resulting from a Social Engineering Incident based upon, attributable to or arising o f: 1. An actual or alleged infringe , ation of, misappropriation of or assertion of any right to or interest in any: a. Patent, copyrig de rk, trade dress, certification mark, collective mark, service mark, expression, idea, li , name, slogan, style of doing business, symbol,title,trade secret or other intellectual pro rty right by or on behalf of any Insured; or b. Software or computer code or its source content or material by or on behalf of any Insured. 2. A fraudulent,dishonest or criminal act by any Employee or authorized representative of the Named Insured,whether acting alone or in collusion with others. 3. The establishment of any credit or similar promise to pay,or to any party's use of or acceptance of any credit card, debit card or similar instrument, whether or not genuine. 4. Any investment or ownership in any corporation, partnership, real property, or similar instrument, whether or not such investment is genuine. 5. A kidnap, ransom or other extortion payment surrendered as a result of a threat to do bodily harm to any natural person or a threat to harm, take, or transfer property. SP CW 91 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 3 Policy Number: ( '1DcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. All other terms and conditions remain unchanged. telt Atift SP CW 91 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 3 of 3 Policy Number: ( 'lOitJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. TELECOMMUNICATIONS FRAUD ENDORSEMENT Telecommunications Fraud Coverage Limit: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Telecommunications Fraud Endorsement, all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this endorsement are only for convenience. Read the entire policy carefully to determine rights, duties and what is and is not covered. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSURING AGREEMENTS: Telecommunications Fraud: Subject to the Telecommunications Fraud Coverage Limit set forth above and any Deductible specified in the Declarations to this policy, We will pay for any monetary Loss sustained by You, including but not limited to•phone bills, first Discovered during the Policy Period and reported in accordance Condition 14. Duties in the Event of Claim or Loss in SECTION VI- CONDITIONS, directly resulting from an intentional unauthorized access to Your Telephone System by a third party. With respect to this Telecommunications Fraud Insuring Agreement: a. Loss solely means the monetary cost of unauthorized calls or unauthorized use of Your Telephone System's bandwidth. b. Telephone System means the VolP phone system directly under Your control. II. The following is added to SECTION II — LIMITS OF INSURANCE, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the Telecommunications Fraud Insuring Agreement is the Telecommunications Fraud Aggregate Sublimit of Insurance, if any, shown above or in the Declarations., which are part of, and not in addition to, the Policy Aggregate Limit of Insurance. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations of liability of any kind with respect to Loss subject to such Sublimit of Insurance. SP CW 85 05 22 Includes copyrighted material of Insurance Services Office,Inc.,with its permission Page 1 of 2 Policy Number: r'iøcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. III. The following is added to SECTION III—DEDUCTIBLE Under the Telecommunications Fraud Insuring Agreement, We will pay only the amount of Loss which is in excess of the Policy Deductible shown in the Declarations. All other terms and conditions remain unchanged. SP CW 85 05 22 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 2 Policy Number: (' lDcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. WEBSITE MEDIA CONTENT LIABILITY ENDORSEMENT Website Media Content Liability Coverage Limit: See coverage sheet Website Media Content Liability Deductible: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Website Media Content Liability Endorsement, II provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, re n unchanged and applicable. In consideration of the premium charged for the Policy, it is hereb too nd agreed that: I. The following Insuring Agreement is added to SECTIO —INSU AGREEMENTS: Website Media Content Liability Subject to the Website Media Content . • •'li overage Limit and Deductible set forth above, We will pay for Loss that the Insured be. I Ily obligated to pay and Defense Expenses as a result of a Claim that is Di •re• ,u • the Policy Period and reported in accordance with Condition 14. Duties in the 1 aim or Loss in SECTION VI — CONDITIONS, for one or more of the followin s firs •m ted on or after the retroactive date and before the end of the Policy Period in t o our display of Media Material on Your website or on social media web page crea d intained by or on behalf of You: a. invasion o rf n with an individual's right of publicity, including commercial appropriation of na , persona, voice or likeness; or b. plagiarism, piracy or misappropriation of ideas under implied contract; or c. infringement of copyright;or d. infringement of domain name, trademark, trade name, trade dress, logo, title, metatag, slogan, service mark, service name; or e. improper deep-linking or framing within electronic content. With respect to this Website Media Content Liability Insuring Agreement: a. Media Material means any information in electronic form, including words, sounds, numbers, images, or graphics and shall also include advertising, video, streaming content, webcasting, online forums, bulletin boards and chat room content, but does not mean computer software or the actual goods, products or services described, illustrated or displayed in such Media Material. II. Exclusions Applicable to the Website Media Content Liability Insuring Agreement: SP CW 83 05 22 Page 1 of 2 Spinnaker Insurance Company Includes copyrighted material of Insurance Services Office, Inc.,with its permission Policy Number: �O Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. We will not be liable for any Claim resulting from an act based upon, attributable to or arising out of: 1. An actual or alleged infringement of,violation of, misappropriation of or assertion of any right to or interest in any: a. Patent, copyright, trademark, trade dress, certification mark, collective mark, service mark, expression, idea, likeness, name, slogan, style of doing business, symbol,title,trade secret or other intellectual property right by or on behalf of any Insured, provided that this Exclusion does not apply to a claim resulting from an act based upon, attributable to or arising out of infringement of copyright,or infringement of domain name,trademark,trade name,trade dress, logo,title, metatag, slogan, service mark, service name in the course of Your display of Media Material on Your website or on social media web pages created and maintained by or on behalf of You; or b. Software or computer code or its source content or rial or on behalf of any Insured. III. The following is added to SECTION II — LIMITS SURA , 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss cove e the Website Media Content Liability Insuring Agreement is the Website Media Conte '.bi Sublimit of Insurance shown above,which is part of, not in addition to the Policy Aggrega • it nsurance set forth in the Declarations to this Policy. Upon exhaustion of any . -.at- .1 it of Insurance by such payments, We will have no further obligations or liability . - •k% with respect to Loss subject to such Sublimit of Insurance. All othe s conditions remain unchanged. • SP CW 83 05 22 Page 2 of 2 Spinnaker Insurance Company Includes copyrighted material of Insurance Services Office, Inc.,with its permission Policy Number: ( OcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. SERVICE FRAUD INCLUDING CRYPTOJACKING ENDORSEMENT Service Fraud Coverage Limit: See policy cover sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Service Fraud Endorsement, all provisions of the Policy to which this endorsement is attached,as well as all terms and conditions, remain unchanged an pplicable. This endorsement extends certain coverages. The headers in thi do ment are only for convenience. Read the entire policy carefully to determine rights, duties and wha d is covered. In consideration of the premium charged for the Policy, it is eby unde ood and agreed that: I. The following Insuring Agreement is added • ON I—INSURING AGREEMENTS: Service Fraud: Subject to the Service Fraud • - •:A im set forth above and any Deductible specified in the Declarations to this •• 'cy, - ill •. for any monetary Loss sustained by You, including but not limited to phon- •u• -sed service bills, and Cryptojacking, first Discovered during the Policy Period •• -.. -d in accordance Condition 14. Duties in the Event of Claim or Los EC •N VI - CONDITIONS, directly resulting from an intentional unauthorized a ess elephone System by a third party. With respect to this el mmunications Fraud Insuring Agreement: a. Loss means the additional monetary costs incurred by You as a direct result of: 1. unauthorized calls or unauthorized use of Your Telephone System's bandwidth; 2. unauthorized access or use of Your Cloud Based Services; and 3. unauthorized access or use of a Computer System for the purpose of mining for Virtual Currency with the use of any of the following services or resources: • electricity • natural gas • oil • internet. b.Monetary Costs include only those additional amounts billed to You by the respective service provider, including usage or consumption information, incurred in a periodic billing statement pursuant to a written contract executed before the Loss first occurred with You, and does not SP CW 70 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 2 Policy Number: roc:Je Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. include any amounts charged at a flat fee that does not scale with the rate or use of the respective service due for payment during the Policy Period. c. Telephone System means the Voice over Internet Protocol (VoIP) phone system directly under Your control. d. Cloud Based Services means Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service(SaaS). e.Virtual Currency means a type of digital representation of currency or asset which is stored, transferred, and transacted in electronic form, utilizes cryptography to secure its network, regulate its generation, and verify its transfer, and operated independently of a central bank or other central authority in the majority of financial jurisdictions.* II. The following is added to SECTION II — LIMITS OF INSUR CE, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the S e Fr Insuring Agreement is the Service Fraud Aggregate Sublimit of Insuranc if any, s bove or in the Declarations., which are part of, and not in addition to, the licy A gate Limit of Insurance. Upon exhaustion of any Aggregate Sublimit of I e s payments,We will have no further obligations of liability of any kind with r_ 4or os ject to such Sublimit of Insurance. III. The following is added to SECTION III— , . • IBLE 'Under the Service Fraud Ins ', ,..re - We will pay only the amount of Loss which is in excess of the Policy Deductible .o .;' .the Declarations. II • and conditions remain unchanged. SP CW 70 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 2 Policy Number: node Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. DEDICATED BREACH COSTS ENDORSEMENT Security Breach Expense Coverage Limit: See policy cover sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Security Breach Expense Outside of Limit Endorsement,all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this •ors= ent are only for convenience. Read the entire policy carefully to determine rights, duties and w 's . . is n.t covered. In consideration of the premium charged for the Policy, it is ereby un. • •d and agreed that: I. Paragraph 1. Policy Aggregate Limit of I ; of ION II—LIMITS OF INSURANCE is deleted in its entirety and replaced with t e . .: 1. Policy Aggregate Limit of Insura8' Except as provided below und- . • ,•h .Security Breach Expense Limit of Insurance, the most We will pay f. coy- . L• s and Defense Expenses is the Policy Aggregate Limit of Insurance show •e• .rations. Furthermore, except as provided below under Paragraph 3. Security B • - sense Limit of Insurance, the Policy Aggregate Limit of Insurance shall uce. •y any payment, including Defense Expenses, made under the terms of this P icy. - austion of the Policy Aggregate Limit of Insurance and, only if applicable, the rity reach Expense Limit of Insurance, We will have no further obligations or liabili y kind under this Policy. II. Paragraph 2. Aggregate Sublimit(s) of Insurance of SECTION II— LIMITS OF INSURANCE is deleted in its entirety and replaced with the following: The Aggregate Sublimit(s)of Insurance set forth in the Declarations are part of,and not in addition to, the Policy Aggregate Limit of Insurance.Any such Aggregate Sublimit(s) of Insurance shall be reduced by any payment for Loss and, if applicable, Defense Expenses, under the Insuring Agreement to which such Aggregate Sublimit of Insurance applies. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations or liability of any kind with respect to Loss or Defense Expenses, subject to such Sublimit of Insurance. 2.Aggregate Sublimit(s)of Insurance Except as provided below under Paragraph 3.Additional Security Breach Expense Limit of Insurance, Subject to the Policy Aggregate Limit of Insurance,the most We will pay for all Loss covered under: SP CW 71 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 2 Policy Number: rccJe Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. a. Insuring Agreement 2—Extortion Threats, is the Ransom Payments Aggregate Sublimit Of Insurance, if any, shown in the Declarations; and b. Insuring Agreement 4—Business Income and Extra Expense, is the Business Income and Extra Expense Aggregate Sublimit Of Insurance, if any, shown in the Declarations. The Aggregate Sublimit(s)of Insurance described in Paragraphs 2.a. and 2.b. above are part of, and not in addition to, the Policy Aggregate Limit of Insurance. Any such Aggregate Sublimit(s)of Insurance shall be reduced by any payment for Loss and, if applicable, Defense Expenses, under the Insuring Agreement to which such Aggregate Sublimit of Insurance applies. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations or liability of any kind with re ct to Loss or Defense Expenses, subject to such Sublimit of Insurance. III. The following is added to SECTION II—LIMITS O SURAN• :.. 3.Additional Security Breach Expens•, ni 4•fTivilbce Solely with respect to SECTION I—I. ,U• AGREEMENTS,1.Security Breach Expense: a. All Loss covered und- SEC • 'SURING AGREEMENTS, 1.Security Breach Expense incurred by • ured in excess of the Policy Deductible amount shown in the Declaratio - • • directly from a Security Breach or Cyber Incident Discovered du '. Po Period or any extended reporting period, if applicable, shall only apply e, the Additional Security Breach Expense Limit of Insuran II s oss shall not apply to or reduce the Policy Aggregate Limit of Insura . b. Upon exhaustio f the Additional Security Breach Expense Limit of Insurance We will have her obligations or liability of any kind SECTION I — INSURING AGREEMENTS, 1. Security Breach Expense under the Policy. All other terms and conditions remain unchanged. SP CW 71 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 2 Policy Number: ( OJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. REVERSE SOCIAL ENGINEERING ENDORSEMENT Reverse Social Engineering Coverage Limit: See cover sheet Reverse Social Engineering Deductible: See cover sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Reverse Social Engineering Endorsement, all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this endorsement are only for convenience. Read the entire policy carefully to determine rights, duties and what is and is not covered. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSURING AGREEMENTS: Reverse Social Engineering: Subject to the Reverse Social Engineering Coverage Limit and Deductible set forth above, We will pay for a Reverse Social Engineering Loss resulting directly from a Reverse Social Engineering Event that is first Discovered during the Policy Period and reported in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI —CONDITIONS. With respect to this Reverse Social Engineering Insuring Agreement: a. Client means any person or entity with whom You have entered into a written contract to provide services or deliverables. b. Money means currency,coins or banknotes in current use and having a face value,travelers' checks, register checks and money orders held for sale to the public. The term Money does not include digital currency or other negotiable and nonnegotiable instruments or contracts representing either Money or property. c. Reverse Social Engineering Event means the intentional use of Your Computer System by a person or organization that is not an Insured to mislead or deceive Your Client or Vendor into transferring Money intended for You to another person or entity. d. Reverse Social Engineering Loss means the loss of Money as a result of a Reverse Social Engineering Event. e. Vendor means any person or entity with whom You have entered into a written contract to provide services to You provided that entity is not owned, operated or controlled by You. Vendor does not include any financial institutions with which you directly or indirectly do business. SP CW 82 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 2 Policy Number: riOcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. II. The following is added to SECTION II — LIMITS OF INSURANCE, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the Reverse Social Engineering Insuring Agreement is the Reverse Social Engineering Aggregate Sublimit of Insurance, if any, shown above, which is part of, not in addition to the Policy Aggregate Limit of Insurance set forth on the Declarations to this Policy. Any such Aggregate Sublimit(s)of Insurance shall be reduced by the amount of any payment for Loss under the Insuring Agreement to which such Aggregate Sublimit of Insurance applies.Upon exhaustion of any Aggregate Sublimit of Insurance by such payments,We will have no further obligations or liability of any kind with respect to Loss subject to such Sublimit of Insurance. III. The following is added to SECTION III-DEDUCTIBLE Under the Reverse Social Engineering Insuring Agreement, We will pay only the amount of Loss which is in excess of the Reverse Social Engineering Deductible amount shown above. All other terms and conditions remain unchanged. SP CW 82 02 23 Includes copyrighted material of Insurance Services Office,Inc.,with its permission Page 2 of 2 Policy Number: (''iOcJ€Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. ENHANCED BUSINESS INCOME, CONTINGENT BUSINESS INCOME AND EXTRA EXPENSE COVERAGE ENDORSEMENT - INCLUSIVE OF SYSTEMS FAILURE This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Endorsement,all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this end. -me, are only for convenience. Read the entire policy carefully to determine rights, duties and what is and is not . e .. In consideration of the premium charged for the Policy, it is hereb dersto • nd agreed that: I. Insuring Agreement 4.Business Income,Continge t : Income and Extra Expense is deleted in its entirety and replaced with the following: 4. Business Income, Contingent Busin nco e d xtra Expense We will pay for Loss due to an I. - rupti res ing directly from a Cyber Incident, Extortion Threat or System Failure that is Discove j; .•• Policy Period or during any extended reporting period, if applicable. With respect to this InsC t 4, Loss means the actual Loss of: (1) "business and contingent business income"You san r(2)"extra expense"You incur. As used in this Insuring Agree ent 4: a. "Business and contingent business income"means the: i. net income(net profit or loss before income taxes)that would have been earned or incurred; and ii. continuing normal operating expenses incurred, including payroll. "Business and contingent business"income does not include: (1)Net Profit that would likely have been earned as a result of an increase in volume due to favorable business conditions caused by the impact of network security failures impacting other businesses, loss of market, or any other consequential loss b. "Extra expense" means necessary and reasonable expenses You incur during the period of restoration as a result of the measurable Interruption of the Insured's business operations, in order to reduce the period of restoration and minimize or reduce Business and Contingent Business income. "Extra expense"does not include: SP CW 76 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 3 Policy Number: rocJe Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL (1) any costs or expenses associated with upgrading, maintaining, repairing, remediating or improving a Computer System as a result of a Cyber Incident,Extortion Threat or System Failure; or (2) Extortion Expenses covered under Insuring Agreement 2—Extortion Threats. II. The following definition in SECTION VII — DEFINITIONS is deleted in its entirety and replaced with the following: Interruption means: a. With respect to a Cyber Incident or System Failure: an unanticipated cessation or slowdown for Your business operations; or ii. Your suspension of Your business operations for the purpose of avoiding or mitigating the possibility of transmitting a Virus or malicious code to another person or organization; and,with regard to Paragraphs 14.a.i and 14.a.ii. ve,shall be deemed to begin when Your business operations are interrupted and ends e iest of: (1) one hundred-eighty(180)days after the I r on begins; (2) the time when Your business o tions are umed; or (3) the time when service is re . ou. • b. With respect to an Extortion Threat,You of ."ary su pension of Your business operations: based upon clear evidence o . -di. threat; or ii. based upon the recom• -.dati. s-curity firm, if any; and,with regard t• 'aragr. qs - ..i and 14.b.ii.above,shall be deemed to begin when Your business operatic < . ' to •ted and ends at the earliest of: (1) o ndre -ighty(180)days after the Interruption begins; (2) e ti e Your business operations are resumed; or (3) e n service is restored to You. Ill. The following definition is ad o SECTION VII—DEFINITIONS: System Failure means: any sudden, unintentional, or unexpected and continuous Interruption of your Computer System which disrupts, prevents,or restricts the normal functioning of your business operations which would otherwise have been handled in whole or in part by the Computer System and is directly caused by a Cyber Incident, malfunction in normal computer function or network service, or hardware failure. System Failure does not include: (1) any hardware failure due to design/manufacturing defects or use of hardware past End of Life Announcements (EOLA)or Last Date of Support(LODS); (2) failure of hosted computer systems that results in an outage that extends beyond the services being provided to you by hosted Computer Systems; (3) failure to adequately anticipate or capacity plan for expected and/or above-normal operational demand for Computer Systems except where this demand is a denial of service attack; (4) any Interruption of a Computer System resulting from a Security Breach; or (5) any Interruption of a Computer System operated by any Third Party. SP CW 76 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 3 Policy Number: rccJe Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL IV. Condition 16. Valuation—Settlement in SECTION VI—CONDITIONS is deleted in its entirety and replaced with the following: 16. Valuation—Settlement All premiums, limit(s) of insurance, deductible amounts, Loss and any other monetary amounts under this Policy are expressed and payable in the currency of the United States of America. If judgment is rendered, settlement is agreed to or another component of Loss under this Policy is expressed in any currency other than United States of America dollars, payment under this Policy shall be made in United States dollars at the rate of exchange published in The Wall Street Journal on the date the final judgment is entered, settlement amount is agreed upon or the other component of Loss is due, respectively. a. With respect to Loss covered under Insuring Agreement 4—Business Income, Contingent Business Income and Extra Expense, the amount of "business and contingent business income" will be determined based on consideration of: the net income generated from Your business activ' 'es before the Interruption occurred; ii. the likely net income generated by Your busines ctivities if no Interruption had occurred, but not including any net income that would lik av en earned as a result of an increase in the volume of business due to favorable bus ond. ' ns caused by the impact of the Cyber Incident or System Failure on customers n er businesses; iii. the operating expenses, including payr ecessa esume Your business activities with the same quality of service that exis - •e the erruption; and iv. other relevant sources of infor • ion, nc Your financial records and accounting procedures, bills, invoices and o • v. hers, nd debts, liens and contracts. However,the amount of"business an. in. •t business income"will be reduced to the extent that the reduction in the volume of . 'nes . h- affected business activities is offset by an increase in the volume of business fro •nn-Is of commerce such as via telephone, mail or other sources. b. With respect to Loss cove suring Agreement 4—Business Income, Contingent Business Income and Extr nse, e amount of"extra expense"will be determined based on: i. necessa en hat exceed the normal operating expenses that would have been incurred in e rse of Your business activities during the period of coverage if no Interruption occurred. We will deduct from the total of such expenses the salvage value that remains of any property bought for temporary use during the period of coverage once Your business activities are resumed; and ii. necessary expenses that reduce the "business and contingent business income" Loss that otherwise would have been incurred during the period of coverage. All other terms and conditions remain unchanged. SP CW 76 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 3 of 3 Policy Number: ( r1tD1cJ€ Issued Date: INTERNATIONAL Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. INCREASE OF OR ELIMINATION OF BUSINESS AND CONTINGENT BUSINESS INCOME AND EXTRA EXPENSE SUBLIMIT This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY SCHEDULE Effective Date of Endorsement: Inception Date Business and Contingent Business Income and Extra Expens ;Bublimit: See coverage sheet ., Premium: TBC ' :,,_- J • ii In consideration of the premium charged for the Policy, i ' by un r tood and agreed that: The following sentence is added to Para a gregate Sublimit(s)of Insurance of SECTION II—LIMITS OF INSURANCE, 2.Aggre! S 'mit(s) of Insurance: Insuring Agreement 4 — Busines . • C. ti nt Business Income and Extra Expense: is the Business Income and Extra Expe - • -gate Sublimit of Insurance, if any, shown in the Schedule of this endorsem o er to s and conditions remain unchanged. SP CW 72 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 1 Policy Number: ("iOcJ€ Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. COMPUTER AND FUNDS TRANSFER FRAUD Computer And Funds Transfer Fraud Coverage Limit: See coverage sheet Computer And Funds Transfer Fraud Deductible: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY With regard to this Computer And Funds Transfer Fraud endorsement, the provisions of the Policy to which this endorsement is attached remain unchanged and apply, unless modified by this endorsement. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSU G EEMENTS: Computer And Funds Transfer Fraud a. Subject to the Computer and Funds Transfer . iv imit and Deductible set forth above, We will pay for: i. Loss resulting directly from a frau 1. Entry of Electronic Data ter System into; or iiiip 2. Change of Elect to omputer System within a Compute y tern, a person or organization without authorization to access such Computer s ed the fraudulent entry or fraudulent change causes, with regard to Paragraphs a. . an .i.(2): a. Your money, securities or other property to be transferred, paid or delivered; or b. Your account at a financial institution to be debited or deleted, or ii. Loss resulting directly from a Fraudulent Instruction directing a financial institution to debit your Transfer Account and transfer, pay or deliver money or securities from that account that is first Discovered during the Policy Period and reported in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI—CONDITIONS. b. As used in Paragraph a.i., "fraudulent entry" or "fraudulent change" of Electronic Data or Computer Program shall include such entry or change made by an Employee acting, in good faith, upon a Fraudulent Instruction received from a computer software contractor who has a written agreement with You to design, implement or service Computer Programs for a Computer System covered under this Insuring Agreement. II. Solely with respect to the coverage afforded under this endorsement: SP CW 80 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 4 Policy Number: r'iocJe Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL a. Computer Program means a set of related electronic instructions,which direct the operation and function of a computer or devices connected to it, which enables the computer or devices to receive, process, store or send your Electronic Data. b. Loss means: 1. In Paragraph I.a.i.: (a) Your money, securities or other property fraudulently transferred, paid or delivered; or (b) Money or securities fraudulently debited or deleted from Your account at a financial institution. 2. In Paragraph I.a.ii., transferring, paying or delivering money or securities from Your Transfer Account. c. Fraudulent Instruction means: (1) With regard to Paragraph I.a.ii.: (a) A computer,telegraphic, .•le, i ety lefacsimile,telephone or other electronic instruction directing a fi •ci. stituti n to debit Your Transfer Account and to transfer, pay or deli ,.m• a or securities from that Transfer Account, which instruction purports t• •. - b. issued by You, but which in fact was fraudulently issued by som- ••e el •u Your knowledge or consent. (b) A written instru N.I • to a financial institution directing the financial institution to debit • Tran -r . count and to transfer, pay or deliver money or securities from tha. r count, through an electronic funds transfer system at specified 'o"- der specified conditions, which instruction purports to have • sue.:•••y You, but which in fact was issued, forged or altered by someone se ' t .,ur knowledge or consent. (2) With re o Paragraph I.b.: A computer,telegraphic,cable,teletype,telefacsimile,telephone or other electronic, written or voice instruction directing an Employee to enter or change Electronic Data or Computer Programs within a Computer System covered under this Insuring Agreement, which instruction in fact was fraudulently issued by Your computer software contractor. d.Transfer Account means an account maintained by you at a financial institution from which You can initiate the transfer, payment or delivery of Money and Securities: (1) By means of computer, telegraphic, cable, teletype, telefacsimile, telephone or other electronic instructions; or (2) By means of written instructions establishing the conditions under which such transfers are to be initiated by such financial institution through an electronic funds transfer system. III. The following is added to SECTION II—LIMITS OF INSURANCE,2.Aggregate Sublimit(s)of Insurance: SP CW 80 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 4 Policy Number: node Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL The most We will pay for all Loss covered under the Computer and Funds Transfer Fraud Insuring Agreement is the Computer and Funds Transfer Fraud Sublimit of Insurance shown above, which is part of, not in addition to the Policy Aggregate Limit of Insurance set forth in the Declarations to this Policy. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations or liability of any kind with respect to Loss subject to such Sublimit of Insurance. IV. Paragraph 1.of Section III—Deductible is deleted in its entirety and replaced with the following: 1. Under Insuring Agreements 1. Security Breach Expense, 2. Extortion Threats, 3. Replacement Or Restoration Of Electronic Data, and Paragraph I.a.of this endorsement: We will pay only the amount of Loss which is in excess of the Policy Deductible Amount shown above. V. The following is added to SECTION V—EXCLUSIONS: 1. We will not be liable for Loss based upon, attributable to, ing out of or resulting from: i. A fraudulent: 1. Entry of Electronic Data or r Pr am into; or 2. Change of Electronic D • mp rogram within a Computer System, by a perso r. •'zation with authorized access to such Computer System, except when cover and g .ph I.b. ii. The use or pure -. us c dit, debit, charge, access, convenience, identification, lit,stored-value or of o e information contained on such cards. iii. The givi or . ing of property in any exchange or purchase. iv. An Employ nancial institution acting upon any instruction to: 1. Transfer, pay or deliver money, securities or other property; or 2. Debit or delete Your account; which instruction proves to be fraudulent, except when covered under Paragraph I.b. 2. We will not be liable for Loss, or that part of any Loss,the proof of which as to its existence or amount is dependent upon: i. An inventory computation; or ii. A profit and loss computation. VI. The introductory statement to paragraph a. of Condition 14. Duties in the Event of Claim or Loss in SECTION VI—CONDITIONS is deleted in its entirety and replaced with the following: a. Under Insuring Agreements 2. Extortion Threats, 3. Replacement Or Restoration Of Electronic Data and SP CW 80 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 3 of 4 Policy Number: rcJ€ Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL this Computer Funds Transfer Fraud Insuring Agreement, you must: All other terms and conditions remain unchanged. lq SP CW 80 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 4 of 4 Policy Number: (' lOcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. HARDWARE REPLACEMENT COSTS ENDORSEMENT Hardware Replacement Costs Coverage Limit: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Hardware Replacement Costs Endorsement, all provisions of the Policy to which this endorsement is attached, as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this endorsement are only for convenience. Read the entire policy carefully to determine rights, duties and what is and is not covered. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSURING AGREEMENTS: Hardware Replacement Costs: Subject to the Hardware Replacement Costs Coverage Limit set forth above and any Deductible specified in the Declarations to this policy, We will pay for Loss directly resulting from a Cyber Incident first Discovered during the Policy Period and reported in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI—CONDITIONS, to mitigate the potential of a future Cyber Incident or Security Breach. With respect to this Hardware Replacement Costs Insuring Agreement: a. Loss means the cost to replace hardware, including but not limited to, computers or any associated devices or equipment operated by, and either owned by or leased to, the Insured that are unable to function as intended due to corruption or destruction of software or firmware. b. Loss does not include any sums related to labor costs associated with installing,connecting or setting up the hardware. II. The following is added to SECTION II — LIMITS OF INSURANCE, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the Hardware Replacement Costs Insuring Agreement is the Hardware Replacement Costs Aggregate Sublimit of Insurance, if any, shown above or in the Declarations,which are part of, and not in addition to, the Policy Aggregate Limit of Insurance. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations of liability of any kind with respect to Loss subject to such Sublimit of Insurance. SP CW 86 05 22 Includes copyrighted material of Insurance Services Office,Inc.,with its permission Page 1 of 2 Policy Number: ( OcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. III. The following is added to SECTION III—DEDUCTIBLE: Under the Hardware Replacement Costs Insuring Agreement, We will pay only the amount of Loss which is in excess of the Policy Deductible shown in the Declarations. IV. Exclusion 4 in SECTION V—EXCLUSIONS is deleted in its entirety and replaced with the following: 4. Bodily Injury Bodily Injury means bodily injury, sickness or disease sustained by a person, including death resulting from any of these at any time. It also means mental injury, mental anguish, mental tension, emotional distress, pain or suffering or shock sustained by any person. However, Bodily Injury does not mean mental anguish or emotional distress resulting directly from a Security Breach. All other terms and conditions remain unchanged. SP CW 86 05 22 Includes copyrighted material of Insurance Services Office,Inc.,with its permission Page 2 of 2 Policy Number: ( 'ltDcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. POST BREACH REMEDIATION COVERAGE ENDORSEMENT Post Breach Remediation Coverage Limit: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Post Breach Remediation Coverage Endorsement, all provisions of the Policy to which this endorsement is attached,as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this endorsement are only for convenience. Read the entire policy carefully to determine rights,duties and what is and is not covered. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSURING AGREEMENTS, Post Breach Remediation: Subject to the Post Breach Remediation Coverage Limit set forth above and any Deductible specified in the Declarations to this policy, We will pay Loss incurred with Our prior written approval during the Policy Period and reported in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI — CONDITIONS, to resolve any vulnerabilities or weaknesses in your Computer System that are identified by an independent security firm after a Cyber Incident or Security Breach.The upgrades or improvements must be determined by the independent security firm to reduce the probability or potential damage from a Cyber Incident or Security Breach in the future. With respect to this Post Breach Remediation Insuring Agreement: a.Loss solely means: i. labor costs incurred by an independent security firm to determine whether any vulnerabilities or weaknesses exist in Your Computer System that are identified by an independent security firm after a Cyber Incident or Security Breach; and ii. labor costs incurred to resolve any vulnerabilities or weaknesses in your Computer System that are identified by an independent security firm after a Cyber Incident or Security Breach. II. The following is added to SECTION II — LIMITS OF INSURANCE. 2. Aggregate Sublimit(s) of Insurance: SP CW 87 05 22 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 2 Policy Number: node. Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. The most We will pay for all Loss covered under the Post Breach Remediation Insuring Agreement is the Post Breach Remediation Aggregate Sublimit of Insurance, if any, shown above or in the Declarations, which are part of, and not in addition to, the Policy Aggregate Limit of Insurance.Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations of liability of any kind with respect to Loss subject to such Sublimit of Insurance. III. The following is added to SECTION III—DEDUCTIBLE: Under the Post Breach Remediation Insuring Agreement,We will pay only the amount of Loss which is in excess of the Policy Deductible amount shown in the Declarations. All other terms and conditions remain unchanged. SP CW 87 05 22 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 2 Policy Number: nO Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. SOCIAL ENGINEERING ENDORSEMENT Social Engineering Coverage Limit: See coverage sheet Social Engineering Deductible: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Social Engineering Endorsement, all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. In consideration of the premium charged for the Policy, it is hereby un rstood and agreed that: I. The following Insuring Agreement is added to SECTION I—I A EEMENTS: Social Engineering Subject to the Social Engineering Coverage I . d le set forth above, We will pay for Social Engineering Loss resulting dire fro ' : So I Engineering Incident that is first Discovered during the Policy Period a p. - . in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI • IONS. With respect to this Social Engine 'ng greement: a. Money means currency, r/' . - notes in current use and having a face value,travelers' checks, register s a oney orders held for sale to the public. The term Money does not include dig cur c ,r other negotiable and nonnegotiable instruments or contracts representing ei o property. b. Securities mean n ble and non-negotiable instruments or contracts representing either Money or property. Securities does not include Money. c. Social Engineering Incident means the intentional misleading of an Insured to transfer Money to a person, place or account beyond the Named Insured's control resulting directly from the Named Insured's employee's good faith reliance upon an instruction transmitted via email, purporting to be from: i. a natural person or entity who exchanges, or is under contract to exchange, goods or services with the Named Insured for a fee (other than a financial institution, asset manager, broker-dealer, armored motor vehicle"named insured"or any similar entity);or ii. an employee of the Named Insured; but which contained a fraudulent and material misrepresentation and was sent by an imposter. SP CW 91 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 3 Policy Number: node Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. As a condition precedent to coverage under this Social Engineering Endorsement, the Named Insured must have an established and documented funds transfer request verification procedure and that procedure must have been followed before acting upon any instruction. d. Social Engineering Loss means the loss of Money as a result of a Social Engineering Incident. Social Engineering Loss does not include indirect and/or consequential loss. II. The following is added to SECTION II — LIMITS OF INSURANCE, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the Social Engineering Insuring Agreement is the Social Engineering Aggregate Sublimit of Insurance, if any, shown above or in the Declarations., which are part of, and not in addition to, the Policy Aggregate it of Insurance. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments a will have no further obligations of liability of any kind with respect to Loss subject to such imi Insurance. III. The following is added to SECTION III—DEDUCT!:LE: Under the Social Engineering Insuring Agree ill p only the amount of Loss which is in excess of the Policy Deductible shown a., -, or,. th- larations. IV. SECTION V—EXCLUSIONS is amended to •e: We will not be liable for Social Engine- �. -- resulting from a Social Engineering Incident based upon, attributable to or arising o f: 1. An actual or alleged infringe , ation of, misappropriation of or assertion of any right to or interest in any: a. Patent, copyrig de rk, trade dress, certification mark, collective mark, service mark, expression, idea, li , name, slogan, style of doing business, symbol, title,trade secret or other intellectual pro rty right by or on behalf of any Insured; or b. Software or computer code or its source content or material by or on behalf of any Insured. 2. A fraudulent,dishonest or criminal act by any Employee or authorized representative of the Named Insured,whether acting alone or in collusion with others. 3. The establishment of any credit or similar promise to pay, or to any party's use of or acceptance of any credit card, debit card or similar instrument,whether or not genuine. 4. Any investment or ownership in any corporation, partnership, real property, or similar instrument, whether or not such investment is genuine. 5. A kidnap, ransom or other extortion payment surrendered as a result of a threat to do bodily harm to any natural person or a threat to harm, take, or transfer property. SP CW 91 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 3 Policy Number: node Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. All other terms and conditions remain unchanged. (1(1/ 4q\/ \14%1 SP CW 91 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 3 of 3 Policy Number: ( iOcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. TELECOMMUNICATIONS FRAUD ENDORSEMENT Telecommunications Fraud Coverage Limit: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Telecommunications Fraud Endorsement, all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this endorsement are only for convenience. Read the entire policy carefully to determine rights, duties and what is and is not covered. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSURING AGREEMENTS: Telecommunications Fraud: Subject to the Telecommunications Fraud Coverage Limit set forth above and any Deductible specified in the Declarations to this policy, We will pay for any monetary Loss sustained by You, including but not limited to phone bills, first Discovered during the Policy Period and reported in accordance Condition 14. Duties in the Event of Claim or Loss in SECTION VI- CONDITIONS, directly resulting from an intentional unauthorized access to Your Telephone System by a third party. With respect to this Telecommunications Fraud Insuring Agreement: a. Loss solely means the monetary cost of unauthorized calls or unauthorized use of Your Telephone System's bandwidth. b. Telephone System means the VoIP phone system directly under Your control. II. The following is added to SECTION II — LIMITS OF INSURANCE, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the Telecommunications Fraud Insuring Agreement is the Telecommunications Fraud Aggregate Sublimit of Insurance, if any, shown above or in the Declarations., which are part of, and not in addition to, the Policy Aggregate Limit of Insurance. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations of liability of any kind with respect to Loss subject to such Sublimit of Insurance. SP CW 85 05 22 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 2 Policy Number: rcKJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. III. The following is added to SECTION III—DEDUCTIBLE Under the Telecommunications Fraud Insuring Agreement, We will pay only the amount of Loss which is in excess of the Policy Deductible shown in the Declarations. All other terms and conditions remain unchanged. SP CW 85 05 22 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 2 Policy Number: (w101cJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. WEBSITE MEDIA CONTENT LIABILITY ENDORSEMENT Website Media Content Liability Coverage Limit: See coverage sheet Website Media Content Liability Deductible: See coverage sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Website Media Content Liability Endorsement, II provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, re n unchanged and applicable. In consideration of the premium charged for the Policy, it is hereb too nd agreed that: I. The following Insuring Agreement is added to SECTIO —INSU AGREEMENTS: Website Media Content Liability Subject to the Website Media Content • •'li overage Limit and Deductible set forth above, We will pay for Loss that the Insured be. I Ily obligated to pay and Defense Expenses as a result of a Claim that is Di • e' ,u • the Policy Period and reported in accordance with Condition 14. Duties in the N' aim or Loss in SECTION VI — CONDITIONS, for one or more of the followin s firs •m ted on or after the retroactive date and before the end of the Policy Period in t o our display of Media Material on Your website or on social media web page crea d intained by or on behalf of You: a. invasion o rf n e with an individual's right of publicity, including commercial appropriation of na , persona, voice or likeness; or b. plagiarism, piracy or misappropriation of ideas under implied contract; or c. infringement of copyright; or d. infringement of domain name, trademark, trade name, trade dress, logo, title, metatag, slogan, service mark, service name; or e. improper deep-linking or framing within electronic content. With respect to this Website Media Content Liability Insuring Agreement: a. Media Material means any information in electronic form, including words, sounds, numbers, images, or graphics and shall also include advertising, video, streaming content, webcasting, online forums, bulletin boards and chat room content, but does not mean computer software or the actual goods, products or services described, illustrated or displayed in such Media Material. II. Exclusions Applicable to the Website Media Content Liability Insuring Agreement: SP CW 83 05 22 Page 1 of 2 Spinnaker Insurance Company Includes copyrighted material of Insurance Services Office, Inc.,with its permission Policy Number: node Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. We will not be liable for any Claim resulting from an act based upon, attributable to or arising out of: 1. An actual or alleged infringement of, violation of, misappropriation of or assertion of any right to or interest in any: a. Patent, copyright, trademark, trade dress, certification mark, collective mark, service mark, expression, idea, likeness, name,slogan, style of doing business, symbol,title,trade secret or other intellectual property right by or on behalf of any Insured, provided that this Exclusion does not apply to a claim resulting from an act based upon, attributable to or arising out of infringement of copyright,or infringement of domain name,trademark,trade name,trade dress, logo,title, metatag, slogan, service mark, service name in the course of Your display of Media Material on Your website or on social media web pages created and maintained by or on behalf of You; or b. Software or computer code or its source content or ria or on behalf of any Insured. III. The following is added to SECTION II — LIMITS SURA , 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss cove e the Website Media Content Liability Insuring Agreement is the Website Media Conte ...ID' Sublimit of Insurance shown above,which is part of, not in addition to the Policy Aggrega ' it nsurance set forth in the Declarations to this Policy. Upon exhaustion of any -.at- •u. '1 it of Insurance by such payments, We will have no further obligations or liability . - 0 with respect to Loss subject to such Sublimit of Insurance. All othe s conditions remain unchanged. SP CW 83 05 22 Page 2 of 2 Spinnaker Insurance Company Includes copyrighted material of Insurance Services Office, Inc.,with its permission Policy Number: ( 'iOcJ€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. SERVICE FRAUD INCLUDING CRYPTOJACKING ENDORSEMENT Service Fraud Coverage Limit: See policy cover sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Service Fraud Endorsement, all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged an pplicable. This endorsement extends certain coverages. The headers in thi ndo ment are only for convenience. Read the entire policy carefully to determine rights, duties and wha d is covered. In consideration of the premium charged for the Policy, it is eby unde ood and agreed that: I. The following Insuring Agreement is added • ON I—INSURING AGREEMENTS: Service Fraud: Subject to the Service Fraud •" •. im set forth above and any Deductible specified in the Declarations to this •• .cy, _ ill .. for any monetary Loss sustained by You, including but not limited to phon- 'il •u• -sed service bills, and Cryptojacking, first Discovered during the Policy Period • -•. -d in accordance Condition 14. Duties in the Event of Claim or Los N VI - CONDITIONS, directly resulting from an intentional unauthorized a Coeshone System by a third party. With respect to this el mmunications Fraud Insuring Agreement: a. Loss means the additional monetary costs incurred by You as a direct result of: 1. unauthorized calls or unauthorized use of Your Telephone System's bandwidth; 2. unauthorized access or use of Your Cloud Based Services; and 3. unauthorized access or use of a Computer System for the purpose of mining for Virtual Currency with the use of any of the following services or resources: • electricity • natural gas • oil • internet. b.Monetary Costs include only those additional amounts billed to You by the respective service provider, including usage or consumption information, incurred in a periodic billing statement pursuant to a written contract executed before the Loss first occurred with You, and does not SP CW 70 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 2 Policy Number: roc:Je Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. include any amounts charged at a flat fee that does not scale with the rate or use of the respective service due for payment during the Policy Period. c. Telephone System means the Voice over Internet Protocol (VolP) phone system directly under Your control. d. Cloud Based Services means Infrastructure as a Service (laaS), Platform as a Service (PaaS), and Software as a Service (SaaS). e.Virtual Currency means a type of digital representation of currency or asset which is stored, transferred, and transacted in electronic form, utilizes cryptography to secure its network, regulate its generation, and verify its transfer, and operated independently of a central bank or other central authority in the majority of financial jurisdictions.* II. The following is added to SECTION II — LIMITS OF INSU E, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the S e Fr Insuring Agreement is the Service Fraud Aggregate Sublimit of Insuranc if any, s ove or in the Declarations., which are part of, and not in addition to, the licy A gate Limit of Insurance. Upon 4 10, exhaustion of any Aggregate Sublimit of I. e s payments, We will have no further obligations of liability of any kind with r; os ject to such Sublimit of Insurance. III. The following is added to SECTION III— ' IBLE Under the Service Fraud Ins re We will pay only the amount of Loss which is in excess of the Policy Deductible ' the Declarations. II and conditions remain unchanged. SP CW 70 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 2 Policy Number: roc:Je Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. DEDICATED BREACH COSTS ENDORSEMENT Security Breach Expense Coverage Limit: See policy cover sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Security Breach Expense Outside of Limit Endorsement,all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this - .ors, ent are only for convenience. Read the entire policy carefully to determine rights, duties and w . "s . . is n.t covered. In consideration of the premium charged for the Policy, it is ereby un. . .d and agreed that: I. Paragraph 1. Policy Aggregate Limit of I of ION II—LIMITS OF INSURANCE is deleted in its entirety and replaced with t e . :: 1. Policy Aggregate Limit of Insura`` 'Except as provided below und-``7 - . Ih Security Breach Expense Limit of Insurance, the most We will pay f. cov- . L. s and Defense Expenses is the Policy Aggregate Limit of Insurance show De. .rations. Furthermore, except as provided below under Paragraph 3. Security B 'sense Limit of Insurance, the Policy Aggregate Limit of Insurance shall uce• •y any payment, including Defense Expenses, made under the terms of this P icy. - austion of the Policy Aggregate Limit of Insurance and, only if • applicable, the rity reach Expense Limit of Insurance, We will have no further obligations or Iiabili y kind under this Policy. II. Paragraph 2. Aggregate Sublimit(s) of Insurance of SECTION II— LIMITS OF INSURANCE is deleted in its entirety and replaced with the following: The Aggregate Sublimit(s)of Insurance set forth in the Declarations are part of, and not in addition to, the Policy Aggregate Limit of Insurance. Any such Aggregate Sublimit(s) of Insurance shall be reduced by any payment for Loss and, if applicable, Defense Expenses, under the Insuring Agreement to which such Aggregate Sublimit of Insurance applies. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations or liability of any kind with respect to Loss or Defense Expenses, subject to such Sublimit of Insurance. 2.Aggregate Sublimit(s)of Insurance Except as provided below under Paragraph 3.Additional Security Breach Expense Limit of Insurance, Subject to the Policy Aggregate Limit of Insurance, the most We will pay for all Loss covered under: SP CW 71 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 2 Policy Number: ("iiDci€ Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. a. Insuring Agreement 2—Extortion Threats, is the Ransom Payments Aggregate Sublimit Of Insurance, if any,shown in the Declarations; and b. Insuring Agreement 4—Business Income and Extra Expense, is the Business Income and Extra Expense Aggregate Sublimit Of Insurance, if any, shown in the Declarations. The Aggregate Sublimit(s)of Insurance described in Paragraphs 2.a. and 2.b. above are part of, and not in addition to, the Policy Aggregate Limit of Insurance. Any such Aggregate Sublimit(s)of Insurance shall be reduced by any payment for Loss and, if applicable, Defense Expenses, under the Insuring Agreement to which such Aggregate Sublimit of Insurance applies. Upon exhaustion of any Aggregate Sublimit of Insurance by such payments, We will have no further obligations or liability of any kind with re ct to Loss or Defense Expenses, subject to such Sublimit of Insurance. III. The following is added to SECTION II—LIMITS 0 SURAN 3.Additional Security Breach Expens> f ce Solely with respect to SECTION I—I U:AGREEMENTS, 1.Security Breach Expense: a. All Loss covered und- SEC •• - URING AGREEMENTS, 1.Security Breach Expense incurred by •ured in excess of the Policy Deductible amount shown in the Declaratio - . . directly from a Security Breach or Cyber Incident Discovered du ,- - Po Period or any extended reporting period, if applicable, shall only apply ? - e, the Additional Security Breach Expense Limit of Insuran II s oss shall not apply to or reduce the Policy Aggregate Limit of Insura . b. Upon ex austio f the Additional Security Breach Expense Limit of Insurance We will have her obligations or liability of any kind SECTION I — INSURING AGREEMENTS, 1. Security Breach Expense under the Policy. All other terms and conditions remain unchanged. SP CW 71 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 2 Policy Number: r'iccJe Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. REVERSE SOCIAL ENGINEERING ENDORSEMENT Reverse Social Engineering Coverage Limit: See cover sheet Reverse Social Engineering Deductible: See cover sheet This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Reverse Social Engineering Endorsement, all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this endorsement are only for convenience. Read the entire policy carefully to determine rights, duties and what is and is not covered. In consideration of the premium charged for the Policy, it is hereby understood and agreed that: I. The following Insuring Agreement is added to SECTION I—INSURING AGREEMENTS: Reverse Social Engineering: Subject to the Reverse Social Engineering Coverage Limit and Deductible set forth above, We will pay for a Reverse Social Engineering Loss resulting directly from a Reverse Social Engineering Event that is first Discovered during the Policy Period and reported in accordance with Condition 14. Duties in the Event of Claim or Loss in SECTION VI —CONDITIONS. With respect to this Reverse Social Engineering Insuring Agreement: a. Client means any person or entity with whom You have entered into a written contract to provide services or deliverables. b. Money means currency,coins or banknotes in current use and having a face value,travelers' checks, register checks and money orders held for sale to the public. The term Money does not include digital currency or other negotiable and nonnegotiable instruments or contracts representing either Money or property. c. Reverse Social Engineering Event means the intentional use of Your Computer System by a person or organization that is not an Insured to mislead or deceive Your Client or Vendor into transferring Money intended for You to another person or entity. d. Reverse Social Engineering Loss means the loss of Money as a result of a Reverse Social Engineering Event. e. Vendor means any person or entity with whom You have entered into a written contract to provide services to You provided that entity is not owned, operated or controlled by You. Vendor does not include any financial institutions with which you directly or indirectly do business. SP CW 82 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 2 Policy Number: rocJe Endorsement Issued Date: INTERNATIONAL Endorsement Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. II. The following is added to SECTION II — LIMITS OF INSURANCE, 2. Aggregate Sublimit(s) of Insurance: The most We will pay for all Loss covered under the Reverse Social Engineering Insuring Agreement is the Reverse Social Engineering Aggregate Sublimit of Insurance, if any, shown above, which is part of, not in addition to the Policy Aggregate Limit of Insurance set forth on the Declarations to this Policy. Any such Aggregate Sublimit(s)of Insurance shall be reduced by the amount of any payment for Loss under the Insuring Agreement to which such Aggregate Sublimit of Insurance applies.Upon exhaustion of any Aggregate Sublimit of Insurance by such payments,We will have no further obligations or liability of any kind with respect to Loss subject to such Sublimit of Insurance. III. The following is added to SECTION III-DEDUCTIBLE Under the Reverse Social Engineering Insuring Agreement, We will pay only the amount of Loss which is in excess of the Reverse Social Engineering Deductible amount shown above. All other terms and conditions remain unchanged. SP CW 82 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 2 Policy Number: node. Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. ENHANCED BUSINESS INCOME, CONTINGENT BUSINESS INCOME AND EXTRA EXPENSE COVERAGE ENDORSEMENT - INCLUSIVE OF SYSTEMS FAILURE This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY Unless modified by this Endorsement, all provisions of the Policy to which this endorsement is attached, as well as all terms and conditions, remain unchanged and applicable. This endorsement extends certain coverages. The headers in this end. .-me! are only for convenience. Read the entire policy carefully to determine rights, duties and what is and is not':,, a Z In consideration of the premium charged for the Policy, it is hereb dersto .`and agreed that: I. Insuring Agreement 4. Business Income, Continge t c Income and Extra Expense is deleted in its entirety and replaced with the following: 4. Business Income, Contingent Busin:_ nco ,e 'd xtra Expense We will pay for Loss due to an I+.,_- rupb. r res. ing directly from a Cyber Incident, Extortion Threat or System Failure that is Discove •. Policy Period or during any extended reporting period, if applicable. With respect to this Ins in t 4, Loss means the actual Loss of: (1) "business and contingent business income"You s ; an r(2)"extra expense"You incur. As used in this Insuring Agree ent 4: a. "Business and contingent business income"means the: i. net income(net profit or loss before income taxes)that would have been earned or incurred; and ii. continuing normal operating expenses incurred, including payroll. "Business and contingent business" income does not include: (1)Net Profit that would likely have been earned as a result of an increase in volume due to favorable business conditions caused by the impact of network security failures impacting other businesses, loss of market, or any other consequential loss b. "Extra expense" means necessary and reasonable expenses You incur during the period of restoration as a result of the measurable Interruption of the Insured's business operations, in order to reduce the period of restoration and minimize or reduce Business and Contingent Business income. "Extra expense"does not include: SP CW 76 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 3 Policy Number: r"iøcJ€ Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL (1) any costs or expenses associated with upgrading, maintaining, repairing, remediating or improving a Computer System as a result of a Cyber Incident, Extortion Threat or System Failure; or (2) Extortion Expenses covered under Insuring Agreement 2—Extortion Threats. II. The following definition in SECTION VII — DEFINITIONS is deleted in its entirety and replaced with the following: Interruption means: a. With respect to a Cyber Incident or System Failure: an unanticipated cessation or slowdown for Your business operations; or ii. Your suspension of Your business operations for the purpose of avoiding or mitigating the possibility of transmitting a Virus or malicious code to another person or organization; and,with regard to Paragraphs 14.a.i and 14.a.ii. ve,shall be deemed to begin when Your business operations are interrupted and ends e iest of: (1) one hundred-eighty(180)days after the I r on begins; (2) the time when Your business o tions are umed; or (3) the time when service is re ou. b. With respect to an Extortion Threat,Yo. of -ry su pension of Your business operations: based upon clear evidence o -di. threat; or ii. based upon the recom, -.dati. ' . • s-curity firm, if any; and,with regard t• 'aragr. •s •.i and 14.b.ii.above,shall be deemed to begin when Your business operatic<100, ' to •ted and ends at the earliest of: (1) o ndre -ighty(180)days after the Interruption begins; (2) e ti Your business operations are resumed; or (3) e n service is restored to You. III. The following definition is ad o SECTION VII—DEFINITIONS: System Failure means: any sudden, unintentional, or unexpected and continuous Interruption of your Computer System which disrupts,prevents,or restricts the normal functioning of your business operations which would otherwise have been handled in whole or in part by the Computer System and is directly caused by a Cyber Incident, malfunction in normal computer function or network service, or hardware failure. System Failure does not include: (1) any hardware failure due to design/manufacturing defects or use of hardware past End of Life Announcements (EOLA)or Last Date of Support(LODS); (2) failure of hosted computer systems that results in an outage that extends beyond the services being provided to you by hosted Computer Systems; (3) failure to adequately anticipate or capacity plan for expected and/or above-normal operational demand for Computer Systems except where this demand is a denial of service attack; (4) any Interruption of a Computer System resulting from a Security Breach; or (5) any Interruption of a Computer System operated by any Third Party. SP CW 76 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 2 of 3 Policy Number: node Endorsement Issued Date: Endorsement Effective Date: INTERNATIONAL IV. Condition 16.Valuation—Settlement in SECTION VI—CONDITIONS is deleted in its entirety and replaced with the following: 16. Valuation—Settlement All premiums, limit(s) of insurance, deductible amounts, Loss and any other monetary amounts under this Policy are expressed and payable in the currency of the United States of America. If judgment is rendered, settlement is agreed to or another component of Loss under this Policy is expressed in any currency other than United States of America dollars, payment under this Policy shall be made in United States dollars at the rate of exchange published in The Wall Street Journal on the date the final judgment is entered, settlement amount is agreed upon or the other component of Loss is due, respectively. a. With respect to Loss covered under Insuring Agreement 4—Business Income, Contingent Business Income and Extra Expense, the amount of "business and contingent business income" will be determined based on consideration of: the net income generated from Your business activ' 'es before the Interruption occurred; ii. the likely net income generated by Your busines ctivities if no Interruption had occurred, but not including any net income that would lik av en earned as a result of an increase in the volume of business due to favorable bus and' ns caused by the impact of the Cyber Incident or System Failure on customers n er businesses; iii. the operating expenses, including payr ecessa esume Your business activities with the same quality of service that exis.: ;•,e the idterruption; and iv. other relevant sources of infor s '`ion, •nc Your financial records and accounting procedures, bills, invoices and o`• -r v. • hers, dnd debts, liens and contracts. However,the amount of"business an. in. •t business income"will be reduced to the extent that the reduction in the volume of nes • h- affected business activities is offset by an increase in the volume of business fro �� '- nn Is of commerce such as via telephone, mail or other sources. b. With respect to Loss cove suring Agreement 4—Business Income, Contingent Business Income and Extr nse, e amount of"extra expense"will be determined based on: i. necessa en s hat exceed the normal operating expenses that would have been incurred in e rse of Your business activities during the period of coverage if no Interruption occurred. We will deduct from the total of such expenses the salvage value that remains of any property bought for temporary use during the period of coverage once Your business activities are resumed; and ii. necessary expenses that reduce the "business and contingent business income" Loss that otherwise would have been incurred during the period of coverage. All other terms and conditions remain unchanged. SP CW 76 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 3 of 3 Policy Number: node Issued Date: INTERNATIONAL Effective Date: THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ IT CAREFULLY. INCREASE OF OR ELIMINATION OF BUSINESS AND CONTINGENT BUSINESS INCOME AND EXTRA EXPENSE SUBLIMIT This endorsement modifies insurance provided under the following: COMMERCIAL CYBER INSURANCE POLICY SCHEDULE Effective Date of Endorsement: Inception Date Business and Contingent Business Income and Extra Expense Sublimit: See coverage sheet Premium: TBC In consideration of the premium charged for the Policy, i ' by un r tood and agreed that: The following sentence is added to Para• a gregate Sublimit(s)of Insurance of SECTION II—LIMITS OF INSURANCE, 2.Aggre• S 'mit(s) of Insurance: Insuring Agreement 4 — Busines `: ._,• C• ti nt Business Income and Extra Expense: is the Business Income and Extra Expe - • -gate Sublimit of Insurance, if any, shown in the Schedule of this endorseme o er to s and conditions remain unchanged. SP CW 72 02 23 Includes copyrighted material of Insurance Services Office, Inc.,with its permission Page 1 of 1