{"id":8532,"date":"2025-10-15T10:03:17","date_gmt":"2025-10-15T03:03:17","guid":{"rendered":"https:\/\/ligaasuransi.com\/?p=8532"},"modified":"2025-10-15T10:03:17","modified_gmt":"2025-10-15T03:03:17","slug":"luas-jaminan-asuransi-cyber-apa-saja-yang-dilindungi-dan-dikecualikan","status":"publish","type":"post","link":"http:\/\/ligaasuransi.com\/en\/luas-jaminan-asuransi-cyber-apa-saja-yang-dilindungi-dan-dikecualikan\/","title":{"rendered":"Cyber \u200b\u200bInsurance Coverage: What&#8217;s Covered and Excluded?"},"content":{"rendered":"<p><\/p>\n<h3><span style=\"font-weight: 400;\">Cyberattacks Can Destroy a Business in an Instant<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Imagine your company&#8217;s entire operational system suddenly being locked down. Customer data is inaccessible, transactions are halted, and company email is compromised by hackers. Within hours, your reputation and customer trust are destroyed, and financial losses begin to mount.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That is the real impact of cyber attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cases like this are no longer fiction or confined to foreign countries. Indonesia now has one of the highest rates of cyberattacks in Asia, especially following major incidents such as:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ransomware attack on National Data Center (PDN) in 2024,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tokopedia and BSI data leak,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Up to 1.3 million users&#8217; data sales MyPertamina in dark forums.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Amidst these increasing threats, Cyber \u200b\u200bInsurance is present as a very important form of financial protection for companies.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">However, many business people in Indonesia do not yet understand what is actually guaranteed and excluded by cyber insurance policies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker) plays a role in helping companies thoroughly understand the policy&#8217;s contents, ensuring that protection is truly effective when an incident occurs.<\/span><\/p>\n<p><b>Contact L&amp;G Insurance Broker now at<\/b> <b>Phone number<\/b> <a href=\"https:\/\/wa.me\/628118507773?text=Halo%20Liberty,%20Saya%20sudah%20berkunjung%20ke%20website%20lngrisk.co.id.%20Boleh%20saya%20tanya%20lebih%20jauh?\"><b>08118507773<\/b><\/a><b> for a free consultation before the risks haunt your business.<\/b><\/p>\n<h3><span style=\"font-weight: 400;\">What is Cyber \u200b\u200bInsurance and Why is it Necessary<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200binsurance is a type of protection that covers financial losses resulting from attacks or disruptions to a company&#8217;s digital systems, data, or computer networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The main objectives of this insurance are:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect asset digital,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cover the cost of recovery,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provide compensation for lost income,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">And manage legal and reputational impacts.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In the Indonesian context, this need has become increasingly relevant since the enactment of the Personal Data Protection Law (PDP Law) in 2022, which requires every data manager to maintain security and be accountable for any leaks of personal information.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Types of Protection (Coverage) in Cyber \u200b\u200bInsurance Policy<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber \u200b\u200binsurance coverage can be divided into two large groups: first-party cover (losses experienced by the company itself) and third-party cover (legal liability towards other parties).<\/span><\/p>\n<p><b>Here is the complete explanation:<\/b><\/p>\n<ol>\n<li><b> First-Party Cover (Direct Loss)<\/b><\/li>\n<\/ol>\n<ul>\n<li aria-level=\"1\"><b>Data Breach Response<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cover the costs arising from a breach of customer or employee personal data, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Notification to data owners,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Legal consultation fees,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Credit monitoring services,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public relations (PR) costs to control a reputation crisis.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">Example: An e-commerce company in Jakarta experienced a data breach involving 200,000 customers. Notification and media management costs reached Rp 1.2 billion\u2014all covered by a cyber insurance policy.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Cyber Extortion \/ Ransomware<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cover the costs of system recovery, negotiations, and even ransom payments to hackers (within applicable legal limits).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It usually also includes the cost of a forensic IT consultant.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">Example: A ransomware attack on Bank Syariah Indonesia (2023) caused national disruption. With cyber policy, the company could obtain emergency funding to restore its systems and negotiate with the hackers.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Business Interruption<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Provides compensation for lost income or additional costs arising from computer system disruptions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">Example: A factory&#8217;s ERP system is down for 5 days due to malware. The policy covers lost revenue and the cost of renting a backup server.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Data Restoration<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Covers the costs of recovering, restoring, or replacing digital data lost or damaged due to an attack.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Reputation Management<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Covers the costs of PR consultants, media campaigns, and crisis communications to restore the company&#8217;s image after a cyber incident.<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><b> Third-Party Cover (Legal Liability)<\/b><\/li>\n<\/ol>\n<ul>\n<li aria-level=\"1\"><b>Network Security Liability<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Bear legal responsibility if the company system is used as a source of attack that harms other parties.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udccc<\/span><span style=\"font-weight: 400;\">Example: Your company&#8217;s server is hacked and used to launch a DDoS attack on another company \u2014 you could be sued, and your legal defense costs would be covered by the policy.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Privacy Liability<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cover legal costs and compensation due to negligence in protecting the personal data of third parties (customers, clients, or employees).<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Regulatory Fines and Penalties<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Bear fines or sanctions from regulators for violations of personal data policies, as long as they do not conflict with applicable laws.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Media Liability<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cover legal risks related to digital content such as publication errors, defamation, or copyright infringement on the company&#8217;s website\/social media.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Optional Endorsements<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Brokers like L&amp;G Insurance Broker often help companies add additional coverage to better suit industry-specific needs, including:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Additional Coverage<\/b><\/td>\n<td><b>Description<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Social Engineering Fraud<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Covering losses due to social manipulation such as fake emails (phishing) that cause staff to transfer funds to fraudsters&#8217; accounts.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Cryptojacking<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Protection against misuse of company servers to mine cryptocurrency without permission.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Reputational Harm Loss<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Compensation for decreased income due to negative media coverage following the attack.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">System Failure (Non-Malicious)<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Covers losses due to internal system disruptions, not due to hacker attacks.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">What is Excluded (Exclusions)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It is equally important to understand what the police do not cover.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Brokers like L&amp;G ensure clients understand all exclusions before purchasing a policy, to avoid any surprises when it comes to claims.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some common exclusions in cyber insurance:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Category<\/b><\/td>\n<td><b>Exceptions<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Intentional Acts<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Attacks or leaks carried out intentionally by company employees or management.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">War and Terrorism<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Cyber \u200b\u200battacks are categorized as acts of cyber war or national-scale terrorism.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Public Infrastructure Failure<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Disruptions due to power outages, internet outages, or third-party network failures.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Physical Loss<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Hardware damage is not included, unless specifically guaranteed.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Criminal Fines \/ Illegal Actions<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Criminal penalties or sanctions for violations of the law are not guaranteed.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Extreme Carelessness Complete failure to implement basic security systems, such as not using passwords or firewalls.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Why Is Cyber \u200b\u200bPolicy Wording So Complex?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Unlike fire or vehicle insurance, cyber insurance policies do not have global standards.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Each insurance company has different definitions, clauses and limitations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, the role of brokers like L&amp;G is very important to:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Examining the policy wording in detail,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explaining the meaning of each technical term,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Comparing policies between insurers,<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Negotiating a waiver of exclusion.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">A single misinterpretation of a term can lead to a claim being denied. For example, the difference between &#8220;cyber extortion&#8221; and &#8220;cyber terrorism&#8221; can determine whether or not a claim is covered.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Real Case Example: Scope Differences Make a Big Difference<\/span><\/h3>\n<p><b>Case 1: Phishing Attack Without Social Engineering Coverage<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A financial company lost Rp 8 billion because its staff transferred money to a hacker&#8217;s account after receiving a fake email from the &#8220;Director&#8221;.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Their cyber policy did not cover social engineering fraud, so the claim was rejected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After consulting with L&amp;G Insurance Broker, their new policy was added with a Social Engineering Coverage clause.<\/span><\/p>\n<p><b>Case 2: Data Leak at a Health Clinic<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Patient data was leaked due to a Trojan horse. L&amp;G assisted the client in preparing notification documents, reporting to regulators, and processing a claim for PR costs totaling Rp 2 billion.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The claim was approved within 30 days as all documentation was in accordance with the policy provisions.<\/span><\/p>\n<p><b>Case 3: ERP System Downtime<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A factory stopped operating for 4 days because the server was attacked by ransomware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L&amp;G Brokers assist in activating the Business Interruption clause with evidence of IT audits and financial reports.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The claim of Rp 9.7 billion was paid in full by the insurer.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">The Role of L&amp;G Insurance Brokers in Determining Appropriate Coverage<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Determining the extent of cyber insurance coverage cannot be done carelessly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Every business has a different risk profile \u2014 and this is where L&amp;G Insurance Broker&#8217;s expertise comes into play.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Common steps taken by L&amp;G include:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Risk Profiling \u2013 mapping digital exposure and potential financial impact.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Coverage Design \u2013 tailoring coverage to the client&#8217;s specific risks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Policy Review \u2013 comparing wording between insurers and assessing policy limits.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Premium Negotiation \u2013 reducing costs without reducing benefits.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Claim Assistance \u2013 ensures claim payments are in accordance with the actual loss value.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">With experience across sectors such as mining, energy, logistics and technology, L&amp;G is able to tailor policy coverage to the needs of local and international businesses.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Broker Tips: Things to Consider Before Buying Cyber \u200b\u200bInsurance<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Make sure the policy wording is read and explained by the broker.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Choose a coverage limit that is commensurate with the digital risk value.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Don&#8217;t forget to add optional covers such as social engineering and reputation harm.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Set up minimum security protocols (MFA, backup, firewall) to meet underwriting requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2705<\/span><span style=\"font-weight: 400;\">Use an experienced broker like L&amp;G to ensure the claims process runs smoothly.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-weight: 400;\">Conclusion: Coverage Area = Key to Effective Protection<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Having cyber insurance is not just a formality \u2014 it is a strategic investment to ensure business continuity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, an inappropriate policy can render protection useless.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the assistance of PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker), companies not only receive a comprehensive policy but also a thorough understanding of what is covered and excluded.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">L&amp;G helps ensure that every penny of premium paid provides real protection when a cyberattack actually occurs.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">\ud83d\udcbb<\/span><span style=\"font-weight: 400;\">Want to know if your cyber policy covers all of your company&#8217;s digital risks?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consult for free with PT. Liberty and General Insurance Broker (L&amp;G Insurance Broker) \u2014 a trusted partner for cyber risk protection in Indonesia.<\/span><\/p>\n<p><b>HOTLINE L&amp;G 24 JAM:<\/b><a href=\"https:\/\/wa.me\/628118507773?text=Halo%20Liberty,%20Saya%20sudah%20berkunjung%20ke%20website%20lngrisk.co.id.%20Boleh%20saya%20tanya%20lebih%20jauh?\"> <b>0811-8507-773<\/b><\/a> <b>(PHONE \u2013 WHATSAPP \u2013 SMS)<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Website: lngrisk.co.id<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Email: halo@lngrisk.co.id<\/span><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks Can Destroy a Business in an Instant Imagine your company&#8217;s entire operational system suddenly being locked down. Customer data is inaccessible, transactions are halted, and company email is compromised by hackers. Within hours, your reputation and customer trust are destroyed, and financial losses begin to mount. That is the real impact of cyber attacks. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8533,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[129,357],"class_list":{"0":"post-8532","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-asuransi-cyber","8":"tag-asuransi-cyber","9":"tag-cyber-insurance"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/comments?post=8532"}],"version-history":[{"count":1,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8532\/revisions"}],"predecessor-version":[{"id":8534,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/8532\/revisions\/8534"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media\/8533"}],"wp:attachment":[{"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media?parent=8532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/categories?post=8532"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/tags?post=8532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}