Online shopping, social media posts, e-banking: just how safe are you in the digital world? The various modules of our Cyber Plus insurance provide you and your children with all-round protection against the various online risks and the financial damage they can cause.
Whether hackers have stolen your customer or account information, you’ve ordered goods from a fake online shop or your child has been the victim of cyberbullying, our experts are there for you. They’ll work out how to help you and your family browse, shop, and use social media safely.
AXA’s personal cyber insurance doesn’t just insure you against losses, it also offers prevention services. AXA customers benefit from our cooperation with Silenccio, an innovative Swiss start-up offering an online service that identifies and filters out negative posts and hateful comments on social media and reports them to you.
On request, Silenccio can intervene, send the offending poster a warning, and act immediately to have what they have written deleted. In the event of a lawsuit for defamation or violation of legal personality rights, AXA-ARAG covers your lawyer’s fees and court costs.
Silenccio also monitors e-mails and phishing scams and offers a browser extension for shopping sites.
Our insurance comprises four modules, each of which can be taken out on its own. Regardless of which module or modules you choose, the cyber insurance for individuals offers all-round protection against online threats through a combination of AXA insurance coverage, AXA-ARAG legal protection, and Silenccio’s online services.
Select several AXA Cyber insurance modules to benefit from an attractive premium discount.
AXA Cyber Plus insurance can be tailored precisely to your needs – you only choose and pay for what you really need. Phishing, data recovery, cyberbullying: read about the types of case where we can help you.
1. Hacker attack
Cybercriminals have hacked Oliver Meier’s credit card information and booked a vacation costing CHF 5,000.
2. Data theft
Five million customer accounts of an online retailer, including e-mail addresses, have been leaked. The hackers acted fast and have already used Carina Maurizio’s account to order goods.
3. ID for sale on Darknet
Mark Bändli has sent several scanned copies of his ID card via e-mail over the past few years, for example when requesting an extract from the Criminal Register. Now his e-mail account has been hacked. Not long after it happened, his ID was offered for sale on the Darknet and used to carry out a transaction in Mark’s name, for which Mark is now liable.
1. Copyright violation
Peter and Tobias are photographed having fun and holding a beer at a festival. The picture is used without permission in connection with an article about binge drinking among young people on 20min.ch. After colleagues tell Peter and Tobias about the article, the two men want their photo removed.
Anouk Berger, a student, is bullied on Instagram because of her appearance. Several users post insulting personal comments under one of her pictures.
1. Exchange refused
Anna Bertschinger orders a PlayStation 4 but receives a PlayStation 3. The online shop refuses to exchange it, insisting that it delivered the right console.
Cédric Müller, who has signed up with Silenccio and uses its browser extension, is looking for a very specific pair of sneakers online.
Sabine Meier’s computer is corrupted by a virus that deletes her files and e-mail program.
AXA covers the cost of an expert who
Yes, your claims are still covered even if you don’t use the Silenccio prevention services.
Yes, claims relating to online banking are covered.
No, there’s no qualifying period.
Credit card issuers often pay out the first time as a goodwill gesture but then reject any further claims, and they’re under no obligation to cover financial losses resulting from credit card misuse. That’s why we offer subsidiary coverage for this risk, which only takes effect if the credit card issuer doesn’t cover the loss.
Cyber Plus insurance covers these cases. AXA doesn’t check your passwords. The insurance coverage still applies, even if you ignore a message prompting you to change your password.
Each insured person can register up to five e-mail addresses.
Customers currently receive Silenccio’s alerts by e-mail. At some point in the future, it will also be possible to receive them by text message or in WhatsApp.
AXA-ARAG legal protection covers you against exaggerated or unsubstantiated claims.
Silenccio sends your ex-partner a warning. AXA-ARAG helps you to file a criminal complaint.
AXA-ARAG advises you on the criminal proceedings and provides a legal representative if needed.
Minors can be prosecuted under the Juvenile Criminal Law Act from the age of 10. They can also face criminal charges.
You’re correct in assuming that they can’t be monitored automatically, which is why we rely on your help here. As soon as you see anything negative on a “closed” social network like Snapchat or WhatsApp, you can inform us via the platform. All you need to do is upload a screenshot and tell us which platform or app it’s from and, if known, who wrote it.
Technically speaking, monitoring works a lot like a search engine query. We combine your name and/or profile name with the keywords you specify, and Silenccio informs you with a push message as soon as it finds a match containing any of the offensive terms stored in its database.
Disputes in connection with self-employment are not insured.
A total of CHF 3,000 per claim and year (no more than two claims per year) for IT assistance is covered.
Yes, cellphones are covered.
Silenccio complies with all of AXA’s standards in terms of security precautions and has passed all the appropriate tests (e.g. a penetration test).
You can access the Silenccio platform via a link on myAXA and enter the details needed to use the services. Please consult the onboarding flyer for more information.
All monitoring services offered by Silenccio are subject to the current data protection regulations, so you need have no concerns about the privacy of your data.
Online shopping: No browsing data are stored. Whether you use the browser extension or enter a URL manually, each website address is immediately checked against the database and then discarded. It’s a simple matter of “yes” or “no”: if a URL is compromised when you type it in or click on a link, you see a warning, otherwise nothing happens.
Cyberbullying: Only data that are in the public domain are searched. We can’t monitor environments that are off limits due to data protection regulations, nor do we want to. The searches carried out for each user are more or less like carrying out an automated search with a search engine such as Google, the difference being that we can pre-filter the results and determine whether they are potentially critical.
Hacking: We only determine when data leaks have happened; we don’t view the content of hacked accounts. There are thus no data protection concerns here. We simply check whether the e-mail address appears in a database linked to the hacking of one or more platforms. The content of the platforms themselves and thus the individual user profiles are not accessed at any point.
Phishing: The same logic applies here as with online shopping, i.e. no data are stored.