A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A risk originating outside the organisation, such as hackers, ransomware gangs, or nation-state actors.
Authorized testing of systems to identify vulnerabilities before they are exploited.
The takeover or spoofing of email accounts to conduct fraud or illicit activity.
Encryption Failure occurs when data encryption systems fail to adequately protect information, whether due to misconfiguration, compromised encryption keys, weak encryption methods, or system malfunctions.
Information stored or transmitted in digital form.
The first amount an insured must pay towards a claim before the insurer pays.
An additional benefit or broadened coverage in a policy.
A written amendment to an insurance policy.
Wages, superannuation, or other entitlements due to employees.
An Eligible Data Breach is the term used under the Privacy Act to describe a data breach involving personal information that is likely to result in serious harm and has not been mitigated, triggering mandatory notification obligations under the NDB scheme.
Events or circumstances that are not covered by the policy.