Why Cyber@Home

The world's emergency in the last few months has caused most companies to switch to remote home work for a large number of employees. Although businesses are becoming more digital, this change in employees' work patterns leads to an increased risk of cyber security breaks. The following threats occur in the virtual environment:

  • When Working from home, many users have access to the same device;
  • Corporate security systems do not impose 100% protection on remote devices and remote home offices;
  • Communication with the office / corporate environment does not go only through protected areas;
  • It is difficult to identify whether the person who works from home with company resources is really the one who is pretending to be;
  • Phishing scam growth - approximately 900 unique patterns of phishing over the past month (medical status actively exploited);
  • Remote computers are less frequently backed up.

Cyber@Home is insurance designed to protect businesses against cyber attacks and the associated risk of leaking or destroying information when employees are working in the office and from home.

Who is Cyber@Home Insurance for

Targeting small and medium business.

Limit of insurance

Package with 2 optional limits: EUR 50,000 and EUR 100,000.

If you want a higher limit: we can offer you our extended Cyber Liability product. For more information, please contact us from here.


Covered Cyber attacks by Cyber@Home

    • Unauthorized access (breach) to the company's computer system when working from the office or from home, leading to the disclosure of personal and corporate information
    • Denial of Service (DoS) Attack - Deliberate Disruption or Damage to a Service or Communication
    • Unauthorized data manipulation, incl. data destruction
    • Distributed Denial of Service (DDoS) attacks using a botnet
    • Creating and distributing malware (e.g., viruses, worms, trojans)
    • Administrative inquiry by the Data Protection Commission
    • Cyber blackmail for ransom


Cyber@Home covers

Array ( [alt] => WEB [odkaz_nahoru] => Top ^ [emailInvalid] => '%title%' is not a valid email address. [emailLengthExceeded] => '%title%' is not a valid email address (exceeds the allowed length). [emailInvalidHostname] => '%hostname%' is not a valid hostname for email address '%title%'. [notFloat] => '%title%' does not appear to be a float. [notGreaterThan] => '%title%' is not greater than '%min%'. [notHex] => '%title%' has not only hexadecimal digit characters. [notIdentical] => The token '%token%' does not match the given token '%title%'. [notInt] => '%title%' does not appear to be a integer. [notIpAddress] => '%title%' does not appear to be a valid IP address. [notLessThan] => '%title%' is not less than '%max%'. [isEmpty] => '%title%' is required and can't be empty. [stringLengthTooShort] => '%title%' is less than %min% characters long. [stringLengthTooLong] => '%title%' is greater than %max% characters long. [vase_pozice] => Your position [homepage] => Homepage [st2_show_all] => Expand all [st2_hide_all] => Close all [st2_file] => Soubor ke stažení [st2_gallery] => Přejít na galerii [sp2_detail] => Podrobnosti [sp2_close] => Zavřít [sp2_stahnout_katalog] => Download catalog [sp2_stahnout_cenik] => Download pricelist ) 1
Expand all

Data Liability

Covers the Insured for any claim for loss of information which the local legislation deems to be “Personal”:

  • Any information under the Insured’s care which, if stolen, could reveal the identity of an individual.
  • Information which is not readily available to the public.
  • Court expenses are also covered.

Loss of Corporate Information

Covers public disclosure of third parties business secrets or company information.

Outsourcing Liability (third party processing)

Covers the Insured for any claim which arises from a loss of information from an Outsourcer that stores or collects personal data for the Insured.

Network Security

Covers any loss arising out of:

  • Any unauthorized software, computer code or virus on the Insured Computer System which is specially programmed to block the function or to corrupt or destroy software or data stored on the Insured's computer system.
  • The denial of access to an authorised Third Party to its Data.
  • Misappropriation of network access code by the insured.
  • Destruction, modification, corruption, damage or deletion of Third Party Data stored on any Computer System.
  • The physical theft of the Company's Assets by a Third Party or its physical loss.
  • The disclosure of Third Party Databy an employeeof the Company.

Data Administrative Obligations

Covers the fees, costs and expenses for legal advice and representation in connection with regulatory investigation.

Data Administrative Fines

Administrative fines paid by the Insured are reimbursed up to the corresponding sublimit specified in the policy.

Pro-active Forensic Services

The cost of forensic cyber risk specialists for the purpose of substantiating whether a Qualifying Breach of Data Security has occurred and identifying the cause of the breach and for making recommendations as to how this may be prevented or mitigated.

Notification to Data Subject

Cover is provided for any expenses associated with notifying the clients that their data was stolen, as required by personal data protection legislation.

Electronic Data

Covers the expenses of determining if lost/corrupted data can be restored and restoring, recreating or recollecting of the corrupted data.

Cyber/Privacy Extortion Liability

Any Loss connected with an intentional attack of a Computer System for the purpose of demanding money.

  • Covered are are the ransom (if paid) and the costs of cyber security experts to conduct an investigation to identify identify the cause of the Threat of Blackmail and suspend it.
  • All expenses – with the prior written approval of the Insurer after notification of the occurrence of the event.
  • Reasonable and necessary expenses up to 10% of the relevant sublimits, in case of failure to obtain approval form the Insurer.