Insurium is a unified solution providing a 360 degree view of the insurance process lifecycle. The Insurium platform is a market-leading cloud-based core insurance software suite built from the ground-up specifically for P&C insurers and claim administrators.
Insurium uses security tools to scan our internal environment, system and services. We also engage professional security vendors to perform third-party penetration tests and audits of our environment on an annual basis, respectively, while internal system scans are performed quarterly. The Core Insurance Platform service is hosted in multiple data centers to provide redundancy. The data centers are geographically distributed and highly redundant in themselves.
Access to Customer Data
A subset of Insurium’s Personnel has access to customer data as necessary to support the platform and provide the service. Individual access is granted based on individual role and job responsibilities. Access to systems containing customer data is reviewed on a regular basis and is monitored on an ongoing basis.
Secure Data Handling and Destruction
Our solution is hosted on one or more cloud-based Infrastructure-as-a-Service platforms. These cloud providers are responsible for the security of the underlying cloud infrastructure and Insurium takes the responsibility of securing workloads we deploy inside the cloud infrastructure. Cloud providers monitor and audit computing environments continuously, with certifications from accreditation bodies across geographies and verticals, including ISO 27001, FedRAMP, DoD CSM, and PCI DSS. Any device storing any data is subjected to data-at-rest encryption. The service makes use of code-level logic and permissions to segregate customer data.
As a user of the Core Insurance Platform, customers should be proactive in recognizing the value and sensitivity of the information provided by the service as well as the need to safeguard such data appropriately. This document details Insurium’s customer responsibilities as they relate to use of the Core Insurance Platform. It is the responsibility of Insurium customers to familiarize themselves with the information and procedures set forth below and comply with them.
Safeguarding of Assets and Information
To safeguard information assets and policy enforcement capabilities available in the Core Insurance Platform, the customers’ IT governance processes should include end-user training regarding appropriate use and awareness of the need for securing access to their Core Insurance Platform account credentials. As with most cloud services, access to the Core Insurance Platform requires a login ID and password or integration with a Single-Sign-On (SSO) provider. When an organization subscribes to the Core Insurance Platform service, it is the customer’s responsibility to manage which users should be given access to the service. Customers should also define when access should be removed. For example, removing access upon termination of employment or as part of departmental changes that result in change of duties or responsibilities. Only valid account credentials should be used by authorized users to access the Insurium Core Insurance Platform service; users should not share authentication credentials.
Insurium’s Core Insurance Platform service should be considered sensitive and confidential by users of the service. Users should follow information security best practices to ensure that access to their account credentials is appropriately limited, and the information and functionality provided by the Core Insurance Platform service is protected from unauthorized use. Core Insurance Platform users are responsible for maintaining the security and confidentiality of their user credentials (e.g., Login ID and Password), and are responsible for all activities and uses performed under their account credentials whether authorized by them or not. By establishing user credentials and accessing the platform, users of the Insurium Core Insurance Platform service agree to comply with these requirements to safeguard assets and account information.
Insurium service can be terminated by contacting [email protected].
The Core Insurance Platform service is accessible via the Internet. As a result, great care must be exercised by Core Insurance Platform users in protecting their subscription against unauthorized access and use of their credentials. By establishing user credentials and accessing the service, users agree to proactively protect the security and confidentiality of their user credentials and never share service account credentials, disclose any passwords or user identifications to any unauthorized persons, or permit any unauthorized person to use or access their Core Insurance Platform accounts. Any loss of control of passwords or user identifications could result in the loss or disclosure of confidential information and the responsible account owner(s) may be liable for the actions taken under their service account credentials whether they authorized the activity or not. Additionally, when establishing Core Insurance Platform account credentials, end users are required to establish strong passwords following password strength and complexity best practices; passwords should not be easily guessable.
Reporting Operational Issues
All Insurium services are monitored 24×7 to meet our service commitments. All planned maintenance will be performed in accordance with Insurium’s maintenance plan, which is communicated to customers when they sign up for the service. If there is a need to perform emergency maintenance for a vulnerability or bug fix, we will notify customers prior to the work being performed. To get updates in real-time, customers can subscribe to email notifications. On the occasion that Insurium customers observe performance issues, problems or service outages, they can contact [email protected] or open a support ticket to report such issues.
Incidents and Breaches
By establishing Core Insurance Platform account credentials or accessing its service, customers agree to notify Insurium immediately of any security incident, including any suspected or confirmed breach of security. Also, users of the service agree to log out or exit the service immediately at the end of each session to provide further protection against unauthorized use and intrusion. Insurium customers should also notify Insurium immediately if they observe any activity or communications in other forums that may indicate that other Insurium customers have had their accounts compromised. Lastly, Insurium encourages users to practice responsible disclosure by notifying Insurium of any potential or confirmed security vulnerabilities. Insurium is dedicated to providing secure services to clients, and will triage all security vulnerabilities that are reported. Furthermore, Insurium will prioritize and fix security vulnerabilities in accordance with the risk that they pose.
Regulatory requirements and industry mandates are continuously increasing in scope & depth and can vary from industry to industry. Insurium users agree to abide by the regulatory requirements, industry mandates, and other compliance requirements imposed on their organizations and understand that use of cloud-based services does not exclude the organizations from responsibilities for restricting access to application information and functionality.
Responsible Disclosure Policy
Insurium is dedicated to keeping its cloud platform safe from all types of security issues thereby providing a safe and secure environment to our customers. Data security is a matter of utmost importance and a top priority for us. If you believe you have discovered a security flaw in the Core Insurance Platform or the underlying infrastructure, we appreciate your support in disclosing the issue to us in a responsible manner. Our responsible disclosure process is managed by the security team at Insurium. We are always ready to recognize the efforts of security researchers by rewarding them with a token of appreciation, provided the reported security issue is of high severity and not already known to us. When reporting the security vulnerability to our Security team, please refrain from disclosing the vulnerability details to the public outside of this process without explicit permission. Please provide the complete details necessary for reproducing the issue. We determine the risk of each vulnerability by assessing the ease of exploitation and business impact associated with the vulnerability.
As a security researcher, if you identify or discover a security vulnerability in compliance with the responsible disclosure guidelines, Insurium commits to:
- Acknowledge the receipt of the reported security vulnerability in a timely fashion
- Notify you when the vulnerability is remediated
- Extend our gratitude by providing a token of appreciation in supporting us to make our customers safer and more secure
Please report security issues to: itsupport@ahollenbeckinsurium-com
Insurium maintains a whistleblower policy for reporting suspected or confirmed issues that violate our Code of Conduct. Issues can be reported by emailing [email protected].
By default, we will retain your data indefinitely. You can ask to close your account by contacting us at [email protected]m and we will delete your information upon request. We may, however, retain information, including personal information to the extent applicable, for an additional period as is required under applicable laws, for legal, tax, or regulatory reasons, or for legitimate and lawful business purposes.
Changes to our Service Commitments
While rare, we may occasionally change our service terms. This includes, but is not limited to, our commitments regarding security, confidentiality, performance or availability. In the event that we intend to make such changes, we will notify the business contact for organization at the email address we have within our customer database at least thirty (30) days prior to such changes taking effect.
For general inquiries, please contact us at [email protected]