REIX: Real Estate Insurance Exchange - Alberta, Saskatchewan
We’re a non-profit organization which means that premiums are used to pay the costs of defending claims and surplus funds are used to keep premiums low.
If you already need a separate passcode (e.g. a code texted to your cell phone) to access your email for the first time on a new device, or to view it on the web, then you already have this.
This will close in 0 seconds
Your computer systems, such as your PC and your phone, contain mission-critical data on them – regular backups are a simple and effective way to ensure disruptions to you and your clients are minimized in the event disaster strikes.
This will close in 0 seconds
Almost all internet connections have a firewall built in to prevent people from freely accessing your home or business network, or worse, your computer’s files. You most likely already have this in place, but we encourage you to familiarize yourself with the key piece of security equipment.
This will close in 0 seconds
An up-to-date endpoint protection software is key to keeping your PC safe from viruses – it’s simple to install and may already have it included free with your computer (e.g. Windows Defender). It scans files, emails, and more to make sure nasty viruses and code to infect your PC.
This will close in 0 seconds
Provides coverage, including legal expenses and damages, for any claim made against you for any actual or alleged breach of privacy, damage to the computers or systems others, unauthorized disclosure of data, and more, arising out of your professional services.
This will close in 0 seconds
a) Pays for the expenses related to investigate, repair, and manage a cyber event, including but not limited to: damage and interruption by a computer virus or malicious code, accidental damage or destruction of data, and malfunctions.
b) Reimburses you for lost income as a result of a cyber event – subject to an 8 hour waiting period.
This will close in 0 seconds
Covers the costs associated with a breach of your systems to ensure you meet the requisite privacy legislation requirements – including notification costs as well as credit monitoring and other support for affected clients.
This will close in 0 seconds
Provides services and coverage for expenses related to cyber extorsion threats (e.g. ransomware) – including the costs to manage the event and, where necessary, pay the ransom.
This will close in 0 seconds
This is coverage for your clients – it covers them for lost deductibles as a result of somebody using your identity and business relationship as part of a real estate deal to convince them to send their deposit to the wrong place.
This will close in 0 seconds
Covers legal expenses and damages for any claim made against you for breach of privacy, damage to the computers or systems of others, unauthorized disclosure of data, and more, arising out of your professional services.
This will close in 0 seconds
Pays for expenses related to investigating, repairing, and managing a cyber event, and reimburses you for the income lost due to the event.
This will close in 0 seconds
Covers costs associated with ensuring you meet the requisite privacy legislation requirements post-incident — including notification costs, credit monitoring, and other support for affected clients.
This will close in 0 seconds
Provides services and coverage for expenses related to cyber extortion threats (e.g. ransomware) — including costs to manage the event and if necessary, pay the ransom.
This will close in 0 seconds
Covers the actions of third parties who fraudulently cause the diversion of deposit funds from a real estate trade.
This will close in 0 seconds
Multi-step account login process that requires users to enter more information than just a password, like a code sent to their email or phone.
This will close in 0 seconds
Copies your files to a safe secondary location for preservation in case of equipment failure or cyber incident.
This will close in 0 seconds
Network security device that monitors traffic to or from your network to prevent people from freely accessing your home or business network, or worse, your computer’s files.
This will close in 0 seconds
Endpoint security system scans files, emails, and more to protect against viruses, malicious code, and other cybersecurity threats on your desktop, laptop, and mobile devices.
This will close in 0 seconds