Introduction
Burglary and Housebreaking Insurance policy provides financial compensation against loss or
damage to property contained in your premises by acts of Burglary and or Housebreaking.
What can be Insured
Burglary Insurance policy covers property contained in business premises, stocks owned, or for
which insured is responsible or held in trust and/or commission. It also covers cash, valuables,
securities kept in a locked safe or cash box in locked steel cupboard on specific request.
This Burglary Insurance covers loss or damage caused by
      Burglary and Theft (i.e. theft following upon an actual forcible and violent entry of and /
       or exit from the premises)
      Robbery
In respect of contents of offices, warehouses, shops, etc. and cash in safe or strong room and also
damage caused to the premises
Extensions
      It is possible to extend the policy to include loss of the insured property to cover burglary
       as a result of riot & strike risks.
      It is possible to extend the cover to include theft and larceny not accompanied by violent
       ingress or exit. The extension does not cover losses detected during routine stock taking/
       checking.
Additional benefits
      Costs for changing locks and cost for repair of damage caused to the insured premises
       after an insured event up to 10 % of the total sum insured. This extension is available
       regardless of whether the Insured is a tenant responsible for such repairs or owner of the
       premises. 
      Loss minimisation expenses up to 10 % of the total sum insured 
      Expenses towards restoring paper files, plans, records and drawings, data and installation
       costs for computer programs up to Rs 10000
      Expenses towards clearance of debris and movement and protection up to 10 % of the
       loss subject to a maximum of Rs 10,000
     Loss or damage to the properties of the employees of the Insured up to Rs 5,000
Exclusions
  The Policy does not cover loss or damage arising from
     War and warlike operation, Riot & strike, civil commotion, Terrorist activities conclusion
      of nature and / or Consequential loss by use of the keys to the safe unless obtained by
      force or threat
     any inmate or member of the Insured's household or his business staff or any other person
      lawfully in the premises
     ionizing radiation or contamination by radioactivity 
     Nuclear weapons material
      Identity theft is a form of fraud or cheating of another person's identity in which someone
      pretends to be someone else by assuming that person's identity, typically in order to
      access resources or obtain credit and other benefits in that person's name. The victim of
      identity theft (here meaning the person whose identity has been assumed by the identity
      thief) can suffer adverse consequences if he or she is held accountable for the
      perpetrator's actions. Organizations and individuals who are duped or defrauded by the
      identity thief can also suffer adverse consequences and losses, and to that extent are also
      victims.
      The term identity theft was coined in 1964 and is actually a misnomer, since it is not
      literally possible to steal an identity as such - more accurate terms would be identity
      fraud or impersonation or identity cloning but identity theft has become common place.
      "Determining the link between data breaches and identity theft is challenging, primarily
      because identity theft victims often do not know how their personal information was
      obtained," and identity theft is not always detectable by the individual victims, according
      to a report done for the FTC. Identity fraud is often but not necessarily the consequence
      of identity theft. Someone can steal or misappropriate personal information without then
      committing identity theft using the information about every person, such as when a major
      data breach occurs. A US Government Accountability Office study determined that "most
      breaches have not resulted in detected incidents of identity theft" the report also warned
      that "the full extent is unknown". A later unpublished study by Carnegie Mellon
      University noted that "Most often, the causes of identity theft is not known," but reported
      that someone else concluded that "the probability of becoming a victim to identity theft
       as a result of a data breach is ... around only 2%". More recently, an association of
       consumer data companies noted that one of the largest data breaches ever, accounting for
       over four million records, resulted in only about 1,800 instances of identity theft,
       according to the company whose systems were breached.
Sources such as the non-profit Identity Theft Resource Center sub-divide identity theft into five
categories:
      Business/commercial identity theft (using another's business name to obtain credit)
      Criminal identity theft (posing as another person when apprehended for a crime)
      Financial identity theft (using another's identity to obtain credit, goods and services)
      Identity cloning (using another's information to assume his or her identity in daily life)
      Medical identity theft (using another's identity to obtain medical care or drugs)
Identity theft may be used to facilitate or fund other crimes including illegal
immigration, terrorism, and espionage. There are cases of identity cloning to attack payment
systems, including online credit card processing and medical insurance.
Identity thieves occasionally impersonate others for non-financial reasons—for instance, to
receive praise or attention for the victim's achievements.
Identity cloning and concealment
In this situation, the identity thief impersonates someone else in order to conceal their own true
identity. Examples might be illegal immigrants, people hiding from creditors or other
individuals, or those who simply want to become "anonymous" for personal reasons. Unlike
identity theft used to obtain credit which usually comes to light when the debts mount,
concealment may continue indefinitely without being detected, particularly if the identity thief is
able to obtain false credentials in order to pass various authentication tests in everyday life.
Criminal identity theft
When a criminal fraudulently identifies himself to police as another individual at the point of
arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases criminals have
previously obtained state-issued identity documents using credentials stolen from others, or have
simply presented fake ID. Provided the subterfuge works, charges may be placed under the
victim's name, letting the criminal off the hook. Victims might only learn of such incidents by
chance, for example by receiving court summons, discovering their drivers licenses are
suspended when stopped for minor traffic violations, or through background checks performed
for employment purposes.
It can be difficult for the victim of a criminal identity theft to clear their record. The steps
required to clear the victim's incorrect criminal record depend on what jurisdiction the crime
occurred in and whether the true identity of the criminal can be determined. The victim might
need to locate the original arresting officers and prove their own identity by some reliable means
such as fingerprinting or DNA fingerprinting, and may need to go to a court hearing to be cleared
of the charges. Obtaining an expungement of court records may also be required. Authorities
might permanently maintain the victim's name as an alias for the criminal's true identity in their
criminal records databases. One problem that victims of criminal identity theft may encounter is
that various data aggregators might still have the incorrect criminal records in their databases
even after court and police records are corrected. Thus it is possible that a future background
check will return the incorrect criminal records. This is just one example of the kinds of impact
that may continue to affect the victims of identity theft for some months or even years after the
crime, aside from the psychological trauma that being 'cloned' typically engenders.
Synthetic identity theft
A variation of identity theft which has recently become more common is synthetic identity theft,
in which identities are completely or partially fabricated. The most common technique involves
combining a real social security number with a name and birthdate other than the ones associated
with the number. Synthetic identity theft is more difficult to track as it doesn't show on either
person's credit report directly, but may appear as an entirely new file in the credit bureau or as a
subfile on one of the victim's credit reports. Synthetic identity theft primarily harms the creditors
who unwittingly grant the fraudsters credit. Individual victims can be affected if their names
become confused with the synthetic identities, or if negative information in their subfiles impacts
their credit ratings.
Medical identity theft
Medical identity theft occurs when someone uses a person's name and sometimes other parts of
their identity—such as insurance information—without the person's knowledge or consent to
obtain medical services or goods, or uses the person’s identity information to make false claims
for medical services or goods. Medical identity theft frequently results in erroneous entries being
put into existing medical records, which may in turn lead to inappropriate and potentially life-
threatening decisions by medical staff.
Techniques for obtaining and exploiting personal information for
identity theft
Identity thieves typically obtain and exploit personally identifiable information about
individuals, or various credentials they use to authenticate themselves, in order to impersonate
them. Examples include:
      Rummaging through rubbish for personal information (dumpster diving)
       Retrieving personal data from redundant IT equipment and storage media including PCs,
    servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed
    of carelessly at public dump sites, given away or sold on without having been properly
    sanitized
       Using public records about individual citizens, published in official registers such as
    electoral rolls
       Stealing bank or credit cards, identification cards, passports, authentication tokens ...
    typically by pickpocketing, housebreaking or mail theft
       Skimming information from bank or credit cards using compromised or hand-held card
    readers, and creating clone cards
      Using 'contactless' credit card readers to acquire data wirelessly from RFID-enabled
    passports
      Observing users typing their login credentials, credit/calling card numbers etc. into IT
    equipment located in public places (shoulder surfing)
      Stealing personal information from computers using malware, particularly Trojan
    horse keylogging programs or other forms of spyware
      Hacking computer networks, systems and databases to obtain personal data, often in large
    quantities
       Exploiting breaches that result in the publication or more limited disclosure of personal
    information such as names, addresses, Social Security number or credit card numbers
       Advertising bogus job offers in order to accumulate resumes and applications typically
    disclosing applicants' names, home and email addresses, telephone numbers and sometimes
    their banking details
       Exploiting insider access and abusing the rights of privileged IT users to access personal
    data on their employers' systems
       Infiltrating organizations that store and process large amounts or particularly valuable
    personal information
       Impersonating trusted organizations in emails, SMS text messages, phone calls or other
    forms of communication in order to dupe victims into disclosing their personal information
    or login credentials, typically on a fake corporate website or data collection form (phishing)
      Brute-force attacking weak passwords and using inspired guesswork to compromise weak
    password reset questions
      Obtaining castings of fingers for falsifying fingerprint identification ... or famously using
    gummy bears to fool low quality fingerprint scanners
       Browsing social networking websites for personal details published by users, often using
    this information to appear more credible in subsequent social engineering activities
      Diverting victims' email or post in order to obtain personal information and credentials
    such as credit cards, billing and bank/credit card statements, or to delay the discovery of new
    accounts and credit agreements opened by the identity thieves in the victims' names
      Using false pretenses to trick individuals, customer service representatives and help desk
    workers into disclosing personal information and login details or changing user
    passwords/access rights (pretexting)
       Stealing checks to acquire banking information, including account numbers and bank
    routing numbers
      Guessing Social Security numbers by using information found on Internet social
    networks such as Facebook and MySpace.
Individual identity protection
The acquisition of personal identifiers is made possible through serious breaches of privacy. For
consumers, this is usually a result of them naively providing their personal information or login
credentials to the identity thieves as a result of being duped but identity-related documents such
as credit cards, bank statements, utility bills, checkbooks etc. may also be physically stolen from
vehicles, homes and offices, or directly from victims by pickpockets and bag snatchers.
Guardianship of personal identifiers by consumers is the most common intervention strategy
recommended by the US Federal Trade Commission, Canadian Phone Busters and most sites that
address identity theft. Such organizations offer recommendations on how individuals can prevent
their information falling into the wrong hands.
Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form of
information security control known as risk avoidance). This implies that organizations, IT
systems and procedures should not demand excessive amounts of personal information or
credentials for identification and authentication. Requiring, storing and processing personal
identifiers (such as Social Security number, national identification number, drivers license
number, credit card number, etc.) increases the risks of identity theft unless this valuable
personal information is adequately secured at all times.
To protect themselves against electronic identity theft by phishing, hacking or malware,
individual are well advised to maintain computer security, for example by keeping
their operating systems fully patched against known security vulnerabilities, running antivirus
software and being cautious in their use of IT.
Identity thieves sometimes impersonate dead people, using personal information obtained from
death notices, gravestones and other sources to exploit delays between the death and the closure
of the person's accounts, the inattentiveness of grieving families and weaknesses in the processes
for credit-checking. Such crimes may continue for some time until the deceased's families or the
authorities notice and react to anomalies.
In recent years, commercial identity theft protection/insurance services have become available in
many countries. These services purport to help protect the individual from identity theft or help
detect that identity theft has occurred in exchange for a monthly or annual membership fee or
premium. The services typically work either by setting fraud alerts on the individual's credit files
with the three major credit bureaus or by setting up credit report monitoring with the credit
bureaux. While identity theft protection/insurance services have been heavily marketed, their
value has been called into question.
Identity protection by organizations
In their May 1998 testimony before the United States Senate, the Federal Trade Commission
(FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-
raters and data miners. The FTC agreed to the industry's self-regulating principles restricting
access to information on credit reports. According to the industry, the restrictions vary according
to the category of customer. Credit reporting agencies gather and disclose personal and credit
information to a wide business client base.
Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive
data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse has
documented over 900 individual data breaches by US companies and government agencies since
January 2005, which together have involved over 200 million total records containing sensitive
personal information, many containing social security numbers. Poor corporate diligence
standards which can result in data breaches include:
      failure to shred confidential information before throwing it into dumpsters
      failure to ensure adequate network security
       the theft of laptop computers or portable media being carried off-site containing vast
    amounts of personal information. The use of strong encryption on these devices can reduce
    the chance of data being misused should a criminal obtain them.
      the brokerage of personal information to other businesses without ensuring that the
    purchaser maintains adequate security controls
       Failure of governments, when registering sole proprietorships, partnerships, and
    corporations, to determine if the officers listed in the Articles of Incorporation are who they
    say they are. This potentially allows criminals access to personal information through credit-
    rating and data mining services.
The failure of corporate or government organizations to protect consumer privacy, client
confidentiality and political privacy has been criticized for facilitating the acquisition of personal
identifiers by criminals.
Using various types of biometric information, such as fingerprints, for identification and
authentication has been cited as a way to thwart identity thieves, however there are technological
limitations and privacy concerns associated with these methods as well.
Conclusion
        As only stocks are casually covered under this type of policy, the market value of the
stocks held should be furnished as the sum to be insured. The insurance may be extended to
cover cash or valuables in strong rooms of banks and safe deposits and safes other than banks.