@From Talk Talk
>In the unlikely event that money is stolen - That is irrelevant to a security breach. You don't need to prove that the data obtained was used illegally or just sat on. That the breach occured is at issue. They are weasel words which don't count beans.