Cyber Claims Hub
Cyber incidents can be disruptive and stressful. This page is designed to guide you through what to do in the event of a cyber claim, who to contact, and what to expect throughout the process.
We are here to support you at every step

Cyber incident response –
available 24/7
Contact Info
Step-by-step response
Here’s what happens when a claim is made:
1. Immediate call to helpline
When an incident occurs, contact our cyber claims helpline. This lets us log the claim, capture key details, and provide immediate guidance. You'll be connected to the right expert - whether that's Delta, legal, or a forensic specialist. It's not a call-back service; we connect you immediately to ensure prompt support.
2. Initial triage and containment
We will log the claim, assess the situation, identify and contain any immediate risks, and determine whether legal, forensic, or technical specialists are required - ensuring the business is protected from further impact.
3. Legal and forensic response
For more complex cases, we coordinate a legal and forensic response to investigate the cause, preserve evidence, and manage liability - providing clarity, confidence, and expert support.
4. Claim submission and insurer review
We handle the full claim submission process, gather the required documentation, and liaise with the policyholder to ensure a smooth and timely review - keeping you informed at every stage, so you always know where things stand.
5. Ongoing updates and resolution
Throughout the claim, we provide regular updates and work toward resolution. Once the claim is settled, we provide a risk mitigation review, a lessons learned summary, and the opportunity to review the policy or coverage to help strengthen future resilience.
Making a cyber claim
What you need to know
Please notify us of any incident, even if you're unsure it will lead to a claim
Do not admit liability, agree to, or pay any settlement without our written consent
When you contact us,
please have the following details ready
Policy number
A description of the cyber incident
A timeline of events
Scope of impact; affected parties, compromised data, business disruptions
Any actions already taken to mitigate the breach, including engagement with third parties like forensic firms or lawyers
Any supporting documents (e.g. logs, screenshots, reports)
Delta's Cyber Response Team

Delta
Insurer/Claims handler
Delta’s in-house claims team manages every step of the cyber claims process from first notification through to resolution. We assess the scope of the incident, confirm policy coverage, and coordinate approved payments for covered losses such as data restoration, legal costs, breach response services, or business interruption (if applicable). Working closely with trusted vendors, including forensic experts and breach coaches, Delta ensures the policyholder is supported by the right people at the right time.
Delta
Insurer/Claims handler
Lorem ipsum odor amet, consectetuer adipiscing elit. Interdum vulputate faucibus eleifend et fusce et dui consequat. Hac posuere consectetur erat leo ridiculus. Libero parturient amet odio vehicula suspendisse quis morbi montes. Feugiat feugiat tincidunt eros senectus ultrices accumsan dis suscipit. Elementum taciti ultrices cursus, justo ad phasellus enim purus. Felis duis tempor enim aliquet lectus non. Sodales cursus habitasse nisl feugiat tortor lacinia interdum sit. Ac pellentesque varius tortor montes quisque est ridiculus primis. Ante elit nostra venenatis semper porttitor etiam cursus. Urna augue elementum, varius quam dolor ex. Donec imperdiet vel potenti montes risus mus. Pharetra efficitur efficitur praesent nam donec porttitor dictumst leo quisque. Cras vulputate nec ex lobortis inceptos.

Duncan Cotterill
Legal advisor
When a cyber incident strikes, Duncan Cotterill steps in as your expert breach coach, guiding you and your client through the complex legal, regulatory, and reputational risks. They coordinate the incident response from the outset - advising on compliance with data breach laws, managing external specialists (forensic investigators, PR consultants, technical engineers), overseeing communications with stakeholders, and maintaining rigorous documentation. Their strategic counsel helps minimise legal exposure, reduce financial and reputational damage, and ensure lessons are captured with controls implemented for the future.
Duncan Cotterill
Legal advisor
Lorem ipsum odor amet, consectetuer adipiscing elit. Interdum vulputate faucibus eleifend et fusce et dui consequat. Hac posuere consectetur erat leo ridiculus. Libero parturient amet odio vehicula suspendisse quis morbi montes. Feugiat feugiat tincidunt eros senectus ultrices accumsan dis suscipit. Elementum taciti ultrices cursus, justo ad phasellus enim purus. Felis duis tempor enim aliquet lectus non. Sodales cursus habitasse nisl feugiat tortor lacinia interdum sit. Ac pellentesque varius tortor montes quisque est ridiculus primis. Ante elit nostra venenatis semper porttitor etiam cursus. Urna augue elementum, varius quam dolor ex. Donec imperdiet vel potenti montes risus mus. Pharetra efficitur efficitur praesent nam donec porttitor dictumst leo quisque. Cras vulputate nec ex lobortis inceptos.

Incident Response Solutions
Forensics
Our forensic expert triages the event, secures your systems, and preserves your IT environment for full investigation. Their team specialises in computer forensics, handling the collection, processing, and examination of digital evidence to determine how the attack occurred and assess the full scope and impact. They support legal proceedings and regulatory reviews by acting as expert witnesses and delivering reports to forensic standards. Incident Response Solutions , identify vulnerabilities, advise on containment and recovery, and recommend preventive controls so your clients can restore operations and reduce future risk.
Incident Response Solutions
Forensics
What’s covered under the policy
Cyber insurance can help protect businesses of all sizes against a wide range of events, including these common attacks.
For more information check out our Cyber Liability Product
Business email compromise
A threat actor has hacked into your business email account and sends emails pretending to be you.
Ransom demand
Ransom demand
After locking or stealing data, the threat actor leaves a message asking for money - usually in cryptocurrency - in exchange for unlocking files or keeping stolen data private. Usually the threat actor will threaten to post the data on the dark web unless their demands are met.
Privacy breaches
Privacy breaches
When businesses or their employees either intentionally or accidentally provide unauthorised or accidental access to someone's personal information OR disclose, alter, lose or destroy someone's personal information. Note a privacy breach also occurs when someone is unable to access their personal information due to, for example, their account being hacked.
Business interruption
Business interruption
If your IT systems are attacked, your staff may be unable to work and your customers unable to transact with you. We cover your loss of profit resulting from this.
Third-party liability
Third-party liability
From hacked personal information to accidentally emailing confidential information, your cyber policy covers claims by your customers and others for breaches of their privacy and the release of confidential information. It also covers social media risks, such as defamation.
Encryption of data
Encryption of data
A threat actor breaks into a computer or network, locks the files by scrambling them so that they can’t be opened without the encryption key.
Frequently Asked Questions
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua, visit our damage cover page.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua
Useful cyber security links
Latest articles
Top cybersecurity threats for New Zealand businesses in 2025
Cybersecurity is an ongoing challenge for New Zealand businesses of all sizes.
Claims Example: Cyber Liability Insurance
What became of the claim? Cyber Liability Insurance Event Just before the year-end holidays, a boutique travel agency was...
Introducing Olivia - Liability Underwriter at Delta Insurance New Zealand
We’re delighted to welcome Olivia to the Delta team as a Liability Underwriter.