0% found this document useful (0 votes)
103 views8 pages

What Can Be Insured

This document discusses types of identity theft, including financial identity theft, criminal identity theft, synthetic identity theft, and medical identity theft. It describes how identity thieves obtain personal information, such as through data breaches, in order to impersonate victims and commit fraud. Identity theft has serious negative consequences for victims and can be difficult to detect and resolve.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views8 pages

What Can Be Insured

This document discusses types of identity theft, including financial identity theft, criminal identity theft, synthetic identity theft, and medical identity theft. It describes how identity thieves obtain personal information, such as through data breaches, in order to impersonate victims and commit fraud. Identity theft has serious negative consequences for victims and can be difficult to detect and resolve.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Introduction

Burglary and Housebreaking Insurance policy provides financial compensation against loss or
damage to property contained in your premises by acts of Burglary and or Housebreaking.

What can be Insured


Burglary Insurance policy covers property contained in business premises, stocks owned, or for
which insured is responsible or held in trust and/or commission. It also covers cash, valuables,
securities kept in a locked safe or cash box in locked steel cupboard on specific request.

This Burglary Insurance covers loss or damage caused by

 Burglary and Theft (i.e. theft following upon an actual forcible and violent entry of and /
or exit from the premises)

 Robbery

In respect of contents of offices, warehouses, shops, etc. and cash in safe or strong room and also
damage caused to the premises

Extensions
 It is possible to extend the policy to include loss of the insured property to cover burglary
as a result of riot & strike risks.
 It is possible to extend the cover to include theft and larceny not accompanied by violent
ingress or exit. The extension does not cover losses detected during routine stock taking/
checking.

Additional benefits
 Costs for changing locks and cost for repair of damage caused to the insured premises
after an insured event up to 10 % of the total sum insured. This extension is available
regardless of whether the Insured is a tenant responsible for such repairs or owner of the
premises. 

 Loss minimisation expenses up to 10 % of the total sum insured 

 Expenses towards restoring paper files, plans, records and drawings, data and installation
costs for computer programs up to Rs 10000

 Expenses towards clearance of debris and movement and protection up to 10 % of the


loss subject to a maximum of Rs 10,000
 Loss or damage to the properties of the employees of the Insured up to Rs 5,000

Exclusions
The Policy does not cover loss or damage arising from

 War and warlike operation, Riot & strike, civil commotion, Terrorist activities conclusion
of nature and / or Consequential loss by use of the keys to the safe unless obtained by
force or threat

 any inmate or member of the Insured's household or his business staff or any other person
lawfully in the premises

 ionizing radiation or contamination by radioactivity 

 Nuclear weapons material

Identity theft is a form of fraud or cheating of another person's identity in which someone
pretends to be someone else by assuming that person's identity, typically in order to
access resources or obtain credit and other benefits in that person's name. The victim of
identity theft (here meaning the person whose identity has been assumed by the identity
thief) can suffer adverse consequences if he or she is held accountable for the
perpetrator's actions. Organizations and individuals who are duped or defrauded by the
identity thief can also suffer adverse consequences and losses, and to that extent are also
victims.

The term identity theft was coined in 1964 and is actually a misnomer, since it is not


literally possible to steal an identity as such - more accurate terms would be identity
fraud or impersonation or identity cloning but identity theft has become common place.

"Determining the link between data breaches and identity theft is challenging, primarily
because identity theft victims often do not know how their personal information was
obtained," and identity theft is not always detectable by the individual victims, according
to a report done for the FTC. Identity fraud is often but not necessarily the consequence
of identity theft. Someone can steal or misappropriate personal information without then
committing identity theft using the information about every person, such as when a major
data breach occurs. A US Government Accountability Office study determined that "most
breaches have not resulted in detected incidents of identity theft" the report also warned
that "the full extent is unknown". A later unpublished study by Carnegie Mellon
University noted that "Most often, the causes of identity theft is not known," but reported
that someone else concluded that "the probability of becoming a victim to identity theft
as a result of a data breach is ... around only 2%". More recently, an association of
consumer data companies noted that one of the largest data breaches ever, accounting for
over four million records, resulted in only about 1,800 instances of identity theft,
according to the company whose systems were breached.

Sources such as the non-profit Identity Theft Resource Center sub-divide identity theft into five
categories:

 Business/commercial identity theft (using another's business name to obtain credit)


 Criminal identity theft (posing as another person when apprehended for a crime)
 Financial identity theft (using another's identity to obtain credit, goods and services)
 Identity cloning (using another's information to assume his or her identity in daily life)
 Medical identity theft (using another's identity to obtain medical care or drugs)
Identity theft may be used to facilitate or fund other crimes including illegal
immigration, terrorism, and espionage. There are cases of identity cloning to attack payment
systems, including online credit card processing and medical insurance.

Identity thieves occasionally impersonate others for non-financial reasons—for instance, to


receive praise or attention for the victim's achievements.
Identity cloning and concealment
In this situation, the identity thief impersonates someone else in order to conceal their own true
identity. Examples might be illegal immigrants, people hiding from creditors or other
individuals, or those who simply want to become "anonymous" for personal reasons. Unlike
identity theft used to obtain credit which usually comes to light when the debts mount,
concealment may continue indefinitely without being detected, particularly if the identity thief is
able to obtain false credentials in order to pass various authentication tests in everyday life.

Criminal identity theft


When a criminal fraudulently identifies himself to police as another individual at the point of
arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases criminals have
previously obtained state-issued identity documents using credentials stolen from others, or have
simply presented fake ID. Provided the subterfuge works, charges may be placed under the
victim's name, letting the criminal off the hook. Victims might only learn of such incidents by
chance, for example by receiving court summons, discovering their drivers licenses are
suspended when stopped for minor traffic violations, or through background checks performed
for employment purposes.

It can be difficult for the victim of a criminal identity theft to clear their record. The steps
required to clear the victim's incorrect criminal record depend on what jurisdiction the crime
occurred in and whether the true identity of the criminal can be determined. The victim might
need to locate the original arresting officers and prove their own identity by some reliable means
such as fingerprinting or DNA fingerprinting, and may need to go to a court hearing to be cleared
of the charges. Obtaining an expungement of court records may also be required. Authorities
might permanently maintain the victim's name as an alias for the criminal's true identity in their
criminal records databases. One problem that victims of criminal identity theft may encounter is
that various data aggregators might still have the incorrect criminal records in their databases
even after court and police records are corrected. Thus it is possible that a future background
check will return the incorrect criminal records. This is just one example of the kinds of impact
that may continue to affect the victims of identity theft for some months or even years after the
crime, aside from the psychological trauma that being 'cloned' typically engenders.
Synthetic identity theft
A variation of identity theft which has recently become more common is synthetic identity theft,
in which identities are completely or partially fabricated. The most common technique involves
combining a real social security number with a name and birthdate other than the ones associated
with the number. Synthetic identity theft is more difficult to track as it doesn't show on either
person's credit report directly, but may appear as an entirely new file in the credit bureau or as a
subfile on one of the victim's credit reports. Synthetic identity theft primarily harms the creditors
who unwittingly grant the fraudsters credit. Individual victims can be affected if their names
become confused with the synthetic identities, or if negative information in their subfiles impacts
their credit ratings.
Medical identity theft
Medical identity theft occurs when someone uses a person's name and sometimes other parts of
their identity—such as insurance information—without the person's knowledge or consent to
obtain medical services or goods, or uses the person’s identity information to make false claims
for medical services or goods. Medical identity theft frequently results in erroneous entries being
put into existing medical records, which may in turn lead to inappropriate and potentially life-
threatening decisions by medical staff.
Techniques for obtaining and exploiting personal information for
identity theft
Identity thieves typically obtain and exploit personally identifiable information about
individuals, or various credentials they use to authenticate themselves, in order to impersonate
them. Examples include:

 Rummaging through rubbish for personal information (dumpster diving)


 Retrieving personal data from redundant IT equipment and storage media including PCs,
servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed
of carelessly at public dump sites, given away or sold on without having been properly
sanitized
 Using public records about individual citizens, published in official registers such as
electoral rolls
 Stealing bank or credit cards, identification cards, passports, authentication tokens ...
typically by pickpocketing, housebreaking or mail theft
 Skimming information from bank or credit cards using compromised or hand-held card
readers, and creating clone cards
 Using 'contactless' credit card readers to acquire data wirelessly from RFID-enabled
passports
 Observing users typing their login credentials, credit/calling card numbers etc. into IT
equipment located in public places (shoulder surfing)
 Stealing personal information from computers using malware, particularly Trojan
horse keylogging programs or other forms of spyware
 Hacking computer networks, systems and databases to obtain personal data, often in large
quantities
 Exploiting breaches that result in the publication or more limited disclosure of personal
information such as names, addresses, Social Security number or credit card numbers
 Advertising bogus job offers in order to accumulate resumes and applications typically
disclosing applicants' names, home and email addresses, telephone numbers and sometimes
their banking details
 Exploiting insider access and abusing the rights of privileged IT users to access personal
data on their employers' systems
 Infiltrating organizations that store and process large amounts or particularly valuable
personal information
 Impersonating trusted organizations in emails, SMS text messages, phone calls or other
forms of communication in order to dupe victims into disclosing their personal information
or login credentials, typically on a fake corporate website or data collection form (phishing)
 Brute-force attacking weak passwords and using inspired guesswork to compromise weak
password reset questions
 Obtaining castings of fingers for falsifying fingerprint identification ... or famously using
gummy bears to fool low quality fingerprint scanners
 Browsing social networking websites for personal details published by users, often using
this information to appear more credible in subsequent social engineering activities
 Diverting victims' email or post in order to obtain personal information and credentials
such as credit cards, billing and bank/credit card statements, or to delay the discovery of new
accounts and credit agreements opened by the identity thieves in the victims' names
 Using false pretenses to trick individuals, customer service representatives and help desk
workers into disclosing personal information and login details or changing user
passwords/access rights (pretexting)
 Stealing checks to acquire banking information, including account numbers and bank
routing numbers
 Guessing Social Security numbers by using information found on Internet social
networks such as Facebook and MySpace.

Individual identity protection


The acquisition of personal identifiers is made possible through serious breaches of privacy. For
consumers, this is usually a result of them naively providing their personal information or login
credentials to the identity thieves as a result of being duped but identity-related documents such
as credit cards, bank statements, utility bills, checkbooks etc. may also be physically stolen from
vehicles, homes and offices, or directly from victims by pickpockets and bag snatchers.
Guardianship of personal identifiers by consumers is the most common intervention strategy
recommended by the US Federal Trade Commission, Canadian Phone Busters and most sites that
address identity theft. Such organizations offer recommendations on how individuals can prevent
their information falling into the wrong hands.

Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form of


information security control known as risk avoidance). This implies that organizations, IT
systems and procedures should not demand excessive amounts of personal information or
credentials for identification and authentication. Requiring, storing and processing personal
identifiers (such as Social Security number, national identification number, drivers license
number, credit card number, etc.) increases the risks of identity theft unless this valuable
personal information is adequately secured at all times.

To protect themselves against electronic identity theft by phishing, hacking or malware,


individual are well advised to maintain computer security, for example by keeping
their operating systems fully patched against known security vulnerabilities, running antivirus
software and being cautious in their use of IT.

Identity thieves sometimes impersonate dead people, using personal information obtained from
death notices, gravestones and other sources to exploit delays between the death and the closure
of the person's accounts, the inattentiveness of grieving families and weaknesses in the processes
for credit-checking. Such crimes may continue for some time until the deceased's families or the
authorities notice and react to anomalies.

In recent years, commercial identity theft protection/insurance services have become available in
many countries. These services purport to help protect the individual from identity theft or help
detect that identity theft has occurred in exchange for a monthly or annual membership fee or
premium. The services typically work either by setting fraud alerts on the individual's credit files
with the three major credit bureaus or by setting up credit report monitoring with the credit
bureaux. While identity theft protection/insurance services have been heavily marketed, their
value has been called into question.

Identity protection by organizations


In their May 1998 testimony before the United States Senate, the Federal Trade Commission
(FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-
raters and data miners. The FTC agreed to the industry's self-regulating principles restricting
access to information on credit reports. According to the industry, the restrictions vary according
to the category of customer. Credit reporting agencies gather and disclose personal and credit
information to a wide business client base.

Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive


data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse has
documented over 900 individual data breaches by US companies and government agencies since
January 2005, which together have involved over 200 million total records containing sensitive
personal information, many containing social security numbers. Poor corporate diligence
standards which can result in data breaches include:
 failure to shred confidential information before throwing it into dumpsters
 failure to ensure adequate network security
 the theft of laptop computers or portable media being carried off-site containing vast
amounts of personal information. The use of strong encryption on these devices can reduce
the chance of data being misused should a criminal obtain them.
 the brokerage of personal information to other businesses without ensuring that the
purchaser maintains adequate security controls
 Failure of governments, when registering sole proprietorships, partnerships, and
corporations, to determine if the officers listed in the Articles of Incorporation are who they
say they are. This potentially allows criminals access to personal information through credit-
rating and data mining services.
The failure of corporate or government organizations to protect consumer privacy, client
confidentiality and political privacy has been criticized for facilitating the acquisition of personal
identifiers by criminals.

Using various types of biometric information, such as fingerprints, for identification and


authentication has been cited as a way to thwart identity thieves, however there are technological
limitations and privacy concerns associated with these methods as well.

Conclusion

As only stocks are casually covered under this type of policy, the market value of the
stocks held should be furnished as the sum to be insured. The insurance may be extended to
cover cash or valuables in strong rooms of banks and safe deposits and safes other than banks.

You might also like