PRODUCT HIGHLIGHTS CYBER SECURITY LIABILITY
|
|
- Joseph Porter
- 8 years ago
- Views:
Transcription
1 PRODUCT HIGHLIGHTS CYBER SECURITY LIABILITY Benefits of this Program Philadelphia Insurance Companies Cyber Security Liability program provides both First and Third Party coverage for numerous classes of business. Through eight (8) Insuring Agreements, a wide range of cyber liability exposures are addressed. Benefits Available on an admitted basis in most states via Philadelphia Indemnity Insurance Company (PIIC) paper, rated A++ by A.M. Best Policy limits up to $5,000,000 available Targeted classes of business include private or publicly traded companies, non-profit social service organizations, nursing homes, physician s practices, clinics, home health agencies, technology consultants, and many more Not a market for financial institutions, credit card processors, online gaming, for-profit entities over $250 million in annual sales Enterprise product solution providing both First and Third party coverages, including: 1. First Party Protection, wtih Loss of Digital Assets coverage, Non-Physical Business Interruption, Extra Expense, Cyber Extortion, Cyber Terrorism, and Security Event Costs 2. Third Party Protection with Network Security and Privacy Liability, Employee Privacy Liability, and Electronic Media Liability Coverages Coverage for damages to third parties caused by a breach of network security Coverage for loss resulting from administrative or operational mistakes - extends to acts of the employee, business process outsourcing (BPO) or outsourced IT provider Breach of Privacy coverage - includes damages resulting from alleged violations of HIPAA, state and federal privacy protection laws and regulations Coverage for expenses resulting from a breach of consumer protection laws such as the Fair Credit Reporting Act (FCRA), the California Consumer Credit Reporting Agencies Act (CCCRAA) and the European Union (EU) Data Protection Act Customer Notification Expenses Coverage (via sub-limit) - reimburses for costs to notify and provide 12 months of credit monitoring Coverage for acts of a rogue employee causing intentional damage to the insured s computer network Public Relations Expenses coverage available to repair insured s reputation as a result of a data breach Customer Notification Expenses include legal expenses, credit monitoring expenses, postage and advertising costs Privacy Breach definition extends to acts of the insured and acts of a service provider acting on behalf of the insured Most favorable venue wording for punitive or exemplary damages Definition of claim includes demand for monetary and non-monetary damages or request to toll applicable statutes of limitations Cyber Extortion reimbursement costs for a range of perils including a credible threat to introduce malicious code, pharm and phish customer systems or to corrupt, damage or destroy the Insured s computer system Electronic Media peril broadly defined to include infringement of domain name, copyright, trade name, slogan, service mark on internet or intranet site Interruption expenses include additional costs associated with rented/leased equipment, use of third party services, additional staff expenses or labor costs directly resulting from a covered Loss of Digital Assets claim Personally Identifiable Information (PII) broadly defined to include an individual s name in combination with social security number, driver s license number, account number, credit or debit card or any non-personal information as defined in any privacy regulation Knowledge provision includes President, Executive Officer, Chairman, Chief Information Officer, Chief Technology Officer, Risk Manager or General Counsel Crisis Management Enhancement Endorsement $25,000 limit for crisis management emergency response expenses incurred because of an incident giving rise to a crisis Documents Required for Proposal Completed, signed, and dated PHLY Cyber Security Liability application (a quotation can be provided from an acceptable and properly completed competitor application) Brochure and advertising material Latest annual audited financial statement Additional information may be required, depending on class of business and degree of computer security controls Service Clients are serviced by both our Home Office staff as well as our Regional Offices located throughout the country continues on next page...
2 CYBER SECURITY LIABILITY - continued Carrier These coverages are underwritten by Philadelphia Insurance Companies, rated A++ (Superior) by A.M. Best. Nationally recognized as a member of Ward s Top 50. Forbes Magazine has recognized PHLY as one of the 400 Best Big Companies in America Payment Terms Interest-free installments available for accounts that generate at least $2,000 in premium For more information about our products and services, please visit our website at
3 Focus on the things that Matter, We ll Handle the Risk! Benefits of this Program Philadelphia Insurance Companies Cyber Security Liability program provides both First and Third Party coverage for numerous classes of business. Through eight (8) Insuring Agreements, a wide range of cyber liability exposures are addressed. Benefits Available on an admitted basis in most states via Philadelphia Indemnity Insurance Company (PIIC) paper, rated A++ by A.M. Best Policy limits up to $5,000,000 available Targeted classes of business include private or publicly traded companies, non-profit social service organizations, nursing homes, physician s practices, clinics, home health agencies, technology consultants, and many more Not a market for financial institutions, credit card processors, online gaming, for-profit entities over $250 million in annual sales Enterprise product solution providing both First and Third party coverages, including: 1. First Party Protection, with Loss of Digital Assets coverage, Non-Physical Business Interruption, Extra Expense, Cyber Extortion, Cyber Terrorism, and Security Event Costs 2. Third Party Protection with Network Security and Privacy Liability, Employee Privacy Liability, and Electronic Media Liability Coverages Coverage for damages to third parties caused by a breach of network security Coverage for loss resulting from administrative or operational mistakes extends to acts of the employee, business process outsourcing (BPO) or outsourced IT provider Breach of Privacy coverage includes damages resulting from alleged violations of HIPAA, state and federal privacy protection laws and regulations Coverage for expenses resulting from a breach of consumer protection laws such as the Fair Credit Reporting Act (FCRA), the California Consumer Credit Reporting Agencies Act (CCCRAA) and the European Union (EU) Data Protection Act Customer Notification Expenses Coverage (via sub-limit) reimburses for costs to notify and provide 12 months of credit monitoring Coverage for acts of a rogue employee causing intentional damage to the insured s computer network Public Relations Expenses coverage available to repair insured s reputation as a result of a data breach Customer Notification Expenses include legal expenses, credit monitoring expenses, postage and advertising costs Privacy Breach definition extends to acts of the insured and acts of a service provider acting on behalf of the insured Most favorable venue wording for punitive or exemplary damages Definition of claim includes demand for monetary and non-monetary damages or request to toll applicable statutes of limitations Cyber Extortion reimbursement costs for a range of perils including a credible threat to introduce malicious code, pharm and phish customer systems or to corrupt, damage or destroy the insured s computer system Electronic Media peril broadly defined to include infringement of domain name, copyright, trade name, slogan, service mark on internet or intranet site Interruption expenses include additional costs associated with rented/leased equipment, use of third party services, additional staff expenses or labor costs directly resulting from a covered Loss of Digital Assets claim Personally Identifiable Information (PII) broadly defined to include an individual s name in combination with social security number, driver s license number, account number, credit or debit card or any non-personal information as defined in any privacy regulation Knowledge provision includes President, Executive Officer, Chairman, Chief Information Officer, Chief Technology Officer, Risk Manager or General Counsel Crisis Management Enhancement Endorsement $25,000 limit for crisis management emergency response expenses incurred because of an incident giving rise to a crisis Documents Required for Proposal Completed, signed, and dated PHLY Cyber Security Liability application (a quotation can be provided from an acceptable and properly completed competitor application) Brochure and advertising material Latest annual audited financial statement Additional information may be required, depending on class of business and degree of computer security controls Company Profile In operation since 1962, Philadelphia Insurance Companies designs, markets, and underwrites Commercial Property/Casualty, Personal Lines, and Professional Liability insurance products incorporating value added coverages and services for select markets. Nationally recognized as a premier niche underwriter, the Company has field offices strategically located nationwide to provide local service to our agents and policyholders. The Company has three underwriting divisions: Commercial Lines Management & Professional Liability Personal Lines Philadelphia Insurance Companies provides competitively priced policies, local service relationships, and differentiated coverage features designed to provide a win-win relationship with our customers. A.M. Best Rating The Company s two insurance subsidiaries are pooled for risk assumption and accumulated surplus. A.M. Best Company has assigned the insurance subsidiaries an A++ (Superior) rating. Standard & Poor s Assigned A+ for counterpart credit and financial strength. Ward s Nationally recognized as a member of Ward s Top 50 Benchmark group of Property/Casualty insurance companies for outstanding achievement in the areas of financial strength, claims performance, and consistently favorable underwriting results. Forbes Magazine Forbes Magazine has recognized Philadelphia Insurance Companies as one of the 400 Best Big Companies in America. Philadelphia Insurance Companies is the marketing name for the insurance company subsidiaries of the Philadelphia Consolidated Holding Corp., a Member of the Tokio Marine Group. Your insurance policy, and not the information contained in this document, forms the contract between you and your insurance company. If there is a discrepancy or conflict between the information contained herein and your policy, your policy takes precedence. All coverages are not available in all states due to state insurance regulations. Certain coverage(s) may be provided by a surplus lines insurer. Surplus lines insurers do not generally participate in state guaranty funds and insureds are therefore not protected by such funds Philadelphia Insurance Companies, All Rights Reserved.
4 CLAIM SCENARIOS CYBER SECURITY LIABILITY The average cost of a data breach is $204 per lost record, with more than half of such costs attributable to lost customers and the associated public relations expenses to rebuild an organization s reputation. 1 The below examples illustrate situations in which the costs incurred to remediate a data breach were significant. Unauthorized Access An international computer hacking group gained access electronically to the computerized cash registers of a restaurant chain and stole credit card information of 5,000 customers, starting a flood of fraudulent purchases around the world. Theft of Digital Assets A regional retailer contracted with a third party service provider. A burglar stole two laptops of the service provider containing the data of over 800,000 clients of the retailer. Under applicable notification laws, the retailer - not the service provider - was required to notify affected individuals. Total expenses incurred for notification and crisis management to customers was nearly $5,000,000. Privacy Breach An employee of a rehabilitation center improperly disposed of 4,000 client records in violation of the center s privacy policy. The records contained social security numbers, credit and debit card account numbers, names, addresses, telephone numbers as well as sensitive medical information. The center settled the claim with the state of Massachusetts and agreed to pay fines and penalties imposed by the state as well as extend $890,000 in customer redress funds for credit monitoring on behalf of the victims. Theft of Digital Assets A home healthcare organization had backup tapes, laptops and disks containing social security numbers, clinical and demographic information, and in a small number of cases, patient financial data that was stolen. In total, over 365,000 patient records were exposed. The organization settled with the state attorney general, providing patients with free credit monitoring, credit restoration to patients that were victims of identity fraud, and reimbursement to patients for direct losses that resulted from the data breach. The organization was also required to revamp its security policies, implement technical safeguards and conduct random compliance audits. Human Error A non-profit community action corporation printed two 1099 forms on one piece of paper. An employee was supposed to separate the forms and send each to its rightful owner. Instead, one person received both copies. The mistake sent tax forms and social security numbers to strangers. Approximately 50% of the landlords who work with the community action corporation received their forms in addition to the private information of the others. Cyber Extortion Threat A U.S. based information technology company contracted with an overseas software vendor. The contracted vendor left universal administrator defaults installed on the company s server and a Hacker for Hire was paid $20,000 to exploit such vulnerability. The hacker advised if the requested payment was not made he would post the records of millions of registered users on a blog available for all to see. The extortion expenses and extortion monies are expected to exceed $2,000,000. Human Error An employee of a private high school mistakenly distributed via the names, social security numbers, birthdates and medical information of students and faculty creating a privacy breach. Overall, 1,250 individuals information was compromised. Malicious Code A juvenile released a computer worm directing infected computers to launch a denial of service attack against a regional computer consulting & application outsourcing firm. The infection caused an 18 hour shutdown of the entity s computer systems. The computer consulting & application outsourcing firm incurred extensive costs and expenses to repair and restore their system as well as business interruption expenses which totaled approximately $875,000. 1Ponemon Institute, 4/2009 Global Cost of a Data Breach Study. For all your cyber security liability insurance needs, please visit our website at Ed
5 PHYSICIAN/DENTAL PRACTICES Why would my practice need cyber/privacy insurance? A large majority of doctors and dentists are not aware that their standard insurance coverages (Malpractice, GL, Property) typically don t provide proper coverage for cyber and privacy liability. Most also don t know that they (along with their practice) have an exposure to cyber and privacy risk, especially given the presence of personal health information that they and their vendors have access to and the laws that exist to protect this. Any medical practice that Obtains social security numbers, personal health information, drivers license numbers, bank account numbers of patients Is in the process of going paperless or stores paper files Provides online access for payment Has a website Given our expertise in underwriting small to mediumsized companies insurance We recently developed a cyber product that: Is modular. You are able to pick and choose appropriate coverage lines Is on PHLY s admitted A++ paper Provides industry leading coverage for both 1st party and 3rd party exposures We can help you understand. At any point, a cyber underwriter can help explain the coverage to you, and/or your agent Information needed for a Non-Binding Indication: PHLY Cyber Application (online adobe fill-able) or PHLY Indication Application Financial Threats to Your Practice: Costs to comply with federal and/or state required notification. Data breaches in 2010 cost their companies an average of $214/ record.*ponemon Institute Study Various regulatory proceedings (including fines and penalties) as a result of a privacy breach, including alleged HIPAA violations. Patients/affected individuals suing your organizations for damages as a result of a privacy breach or network intrusion Business interruption expenses as a result of your network or server going down due to a denial of service attack or similar action Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet sites Destruction to your brand as a result of a privacy breach (lost patients) Claim Scenarios for physicians/dentists: A physicians assistant brings a laptop home to update patient records. While on her way home, she stops at the grocery store and her car is broken into and the laptop is stolen. Files on the laptop contained patient names, social security numbers, dates of birth, addresses, phone numbers, and medical condition information In an effort to go paperless, employees organized medical information (to be shredded) and non-medical information (to be thrown out.) The person responsible for discarding the information inadvertently switched the two types of information and the medical information was thrown into an unsecured dumpster without being shredded. Personal information and personal health information of patients is compromised and those affected join a class action suit against the practice A hacker gained unauthorized access to a surgery center s computer system. The practice s failed to timely notify its patients whose personal health information was contained on the computer system. The practice suffered fines and penalties for not adhering to HIPAA laws and regulations A practices computer network is down for 4 days as a result of a Trojan horse attack and are unable to access billing software, appointment scheduler or patient files, resulting in a need to hire experts to come in and correct the system and get it back to where it was functioning A practice has a website and posts testimonials from patients. As a result of the practice not obtaining proper authorization to use one of the patient s comments, they are sued for invasion of privacy
6 HEALTH AND FITNESS ORGANIZATIONS Why Would My Gym Or Studio Need Cyber Liability Coverage? A large majority of gym owners are not aware that their standard insurance coverages (Commercial GL, Property, D&O, Crime) typically don t provide proper coverage for cyber liability. Most fitness instructors, gym personnel and risk managers don t know that they (along with their gym) have an exposure to cyber risk and how that exposure can pose a significant financial threat to their companies. Any gym or fitness studio that Obtains social security numbers, drivers license numbers, bank account numbers of clients or employees Has access to member health information Provides online personal training Is in the process of going paperless or stores paper files Provides online access for members Posts pictures or information about members online Given our expertise in underwriting Commercial Package, D&O & EPLI for the fitness industry We recently developed a cyber product that: Is modular. You and your agent are able to pick and choose appropriate coverage lines Is on PHLY s A.M. Best rated A++. paper in most states Provides industry leading coverage for both 1st party and 3rd party exposures We can help you understand. At any point, a cyber underwriter can help explain the coverage to an agent or Insured Information Needed for a Non-Binding Indication for current or prospective PHLY School customers: Annual Revenues and number of employees Financial Threats to Your Company: Costs to comply with federal and/or state required notification. Per individual, the average cost per record is estimated at $203 Regulatory proceedings (including fines and penalties) as a result of a privacy breach. This includes HIPAA violations Employees (instructors, facilities crew) and/or groups of affected individuals (current or former members) suing for damages as a result of a privacy breach Denial of service attack on your network, causing your computer system to go down and business interruption expenses Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet sites Claim Scenarios Member information was on a gym employee s laptop that was stolen from her office. Membership files on the laptop contained names, social security numbers, bank account numbers, dates of birth, addresses, phone numbers, medical condition information for all members for the past 3 years Third-party vendor that hosted a gym s website experienced a security incident. Members who had online bill-pay set up may have had their names, dates of birth and credit card information accessed Yoga Studio s computer network is down for 4 days as a result of a Trojan horse attack and are unable to accept any monthly member fees, resulting in a need to hire experts to come in and correct your system and get it back to where it was functioning In an effort to go paperless, cleaning crew at a gym discards employee files in an unsecured dumpster. Personal information of all employees is compromised and those affected join a class action suit against the gym A Fitness Club holding a golf tournament posts information regarding the event on their website. They are sued by a golf company for copyright infringement as the club did not obtain permission to use their logo
7 HUMAN & SOCIAL SERVICE ORGANIZATIONS Why would my organization need Cyber Liability Coverage? A large majority of non-profit and social service executive directors, boards of directors and risk managers are not aware that their standard insurance coverages (Commercial GL, Property, D&O, crime) typically don t provide proper coverage for cyber liability. Most employees and IT professionals don t know that they (along with their organization) have an exposure to cyber risks and how that exposure can pose a significant financial threat to their institutions. Any Non-Profit or Social Service organization that Obtains social security numbers, drivers license numbers, bank account numbers of clients or employees Has access to patient medical records Is in the process of going paperless or keeps paper files onsite Provides online access to sensitive data Allows laptops or access to their network from a remote location Given our expertise in underwriting Commercial Package, D&O & EPLI for the social service industry and other non-profit institutions We recently developed a cyber product that Is modular. You and your agent are able to pick and choose the appropriate coverage lines Is on PHLY s admitted A++ paper in most states. Provides industry leading coverage for both 1st party and 3rd party exposures Helps you understand. At any point, a cyber underwriter can help explain the coverage to an agent or insured Information Needed for a Non-Binding Indication for current or prospective PHLY Customers: Annual revenues and number of employees. Financial Threats to Your Institution: Costs to comply with federal and/or state required notification. Per individual, the average cost per record is estimated at $203 Regulatory proceedings(including fines and penalties) as a result of a privacy breach. This includes HIPAA violations Employees (teachers, volunteers) and/or groups of affected individuals(alumni, current students, parents) suing for damages as a result of a privacy breach Denial of service attack on your network, causing computer system to go down and business interruption expenses Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet sites Claim Scenarios for Non-Profit Organizations Client information was on a case manager s laptop that was stolen from her office. Files on the laptop contained patient names, social security numbers, dates of birth, addresses, phone numbers, medical condition information and case information Third-party vendor that hosted a foundation s website experienced a security incident. Customers who donated to the organization may have had their names, dates of birth and credit card information accessed Adult day care s computer network is down for 4 days as a result of a Trojan horse attack and are unable to provide any services as a result. There is a need to hire experts to correct their system and get it back to where it was functioning In an effort to go paperless, cleaning crew at a HIV awareness organization discards all employee files in an unsecured dumpster. Personal information of all employees is compromised and those affected join a class action suit against the non-profit Animal shelter holding a golf tournament posts information regarding the event on their website. As a result of the shelter not getting permission to use a golf company s logo, they are sued for copyright infringement
8 VETERINARIAN PRACTICES Why would my practice need Cyber Liability Coverage? A large majority of veterinarians are not aware that their standard insurance coverages (Malpractice, GL, Property, Crime) typically don t provide proper coverage for cyber and privacy liability. Most vets also don t know that they (along with their practice) have a significant exposure to cyber risk and how that same exposure can pose a significant financial threat to their practice(and them as individuals). Any veterinarian practice that Obtains social security numbers, drivers license numbers, bank account numbers of clients Has access to pet health information Uses an online appointment system Is in the process of going paperless or stores paper files Provides online access for payment Posts pictures or information about pets and/or parents online Given our expertise in underwriting low-premium business We recently developed a cyber product that: Is modular. You and your agent are able to pick and choose the appropriate coverage lines Is on PHLY s admitted A++ paper in most states Provides industry leading coverage for both 1st party and 3rd party exposures We can help you understand. At any point, a cyber underwriter can help explain the coverage to an agent or Insured Information Needed for a Non-Binding Indication for current or prospective PHLY customers: One page Cyber Indication sheet Financial Threats to Your Company: Costs to comply with federal and/or state required notification. Data breaches in 2010 cost their companies an average of $214/ record.*ponemon Institute Study Regulatory proceedings (including fines and penalties) as a result of a privacy breach. Pet owners suing your organizations for damages as a result of a network or security breach Denial of service attack on your network, causing your computer system to go down and business interruption expenses Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet site Claim Scenarios for veterinarians: Patient health records were on an employee s laptop that was stolen from her office. Pet records on the laptop contained names, health records, addresses and diagnoses for all pets treated in the last 3 years. Third-party vendor that hosted a veterinarian s website experienced a security incident. Patient parents who had online bill-pay set up may have had their names, dates of birth and credit card information accessed. State notification is required. Veterinarian s computer network is down for 4 days as a result of a Trojan horse attack and are unable to accept any new appointments; resulting in a need to hire experts to come in and correct your system and get it back to where it was functioning In an effort to go paperless, cleaning crew discards employee files in an unsecured dumpster. Personal information of all employees is compromised and those affected join a class action suit against the practice. A Veterinarian holds a 5K walk to benefit a local animal shelter. They post information regarding the event on their website. They are sued by a dog food company for copyright infringement as the veterinarian did not obtain permission to use their logo
9 RELIGIOUS ORGANIZATIONS Why would my religious organization need Cyber or Privacy Coverage? A large majority of deacons, pastors and rabbis are not aware that their standard insurance coverages (Commercial GL, Property, D&O, crime) typically don t provide proper coverage for cyber liability. Most employees, volunteers and IT professionals don t know that they (along with their organization) have an exposure to cyber risks and don t understand how that exposure can pose a significant financial threat to their organizations. Any religious organization that Accepts online donations Maintains a social networking page Obtains credit card numbers, drivers license numbers, social security numbers or medical histories of its congregation Posts pictures or personal information on the church s website Provides streaming webcasts of their services Allows pastors to maintain a blog Given our expertise in underwriting Commercial Package, D&O & EPLI for Religious institutions and other non-profit organizations We recently developed a cyber product that Is modular. You and your agent are able to pick and choose the appropriate coverage lines Is on PHLY s admitted A++ paper in most states Provides industry leading coverage for both 1st party and 3rd party exposures Helps you understand. At any point in the process, a cyber underwriter can help explain the coverage to an agent or Insured Information Needed for a Non-Binding Indication for current or prospective PHLY customers: Annual revenues and number of employees Financial Threats to Your Institution: Defense costs for intellectual property lawsuits. These include libel/ slander arising out of content that is on your internet or intranet sites Costs to comply with federal and/or state required notification. Per individual, the average cost per record is estimated to be well over $200 Regulatory proceedings (including fines and penalties) as a result of a privacy breach Employees (pastors,office personnel or volunteers) and/or groups of affected individuals (members of your congregation, Sunday school students, parents) suing for damages as a result of a privacy breach Lost income as a result of your online donation service or network going down Claim Scenarios for Religious organizations Synagogue s website developer accidentally uploads personal information of congregation onto their external internet site. Information included social security numbers, addresses, and names. Synagogue is required to notify all affected individuals Pastor s blog on the church s website makes an offensive remark regarding a former congregation member. That former member takes note and files lawsuit for defamation/slander A religious hacktivist attacks the network of a nationwide religious institution because he disagreed with their politically charged blog. As a result, their entire computer network ( , website & congregation information) is down for 4 days Church is sued by songwriter for copyright infringement and royalties due when they post an audio file on their social media site. The suit alleges the content was released without the songwriter s permission Priest has laptop stolen from his car while at his nephew s softball game. Laptop contained names, credit card information & total amount of donations of all church donors. Church is required to notify all affected individuals
10 PRIVATE, ACADEMIC, VOCATIONAL AND CHARTER SCHOOLS Why Would My School Need Cyber Liability Coverage? A large majority of school principals, boards of directors and headmasters are not aware that their standard insurance coverage (Commercial GL, Property, D&O, Crime) typically doesn t provide proper coverage for cyber liability. Most principals, teachers and IT professionals don t know that they (and their organization) have an exposure to cyber risks and how those risks can pose a significant financial threat to their organizations. Any School that Obtains social security numbers, drivers license numbers, bank account numbers, medical histories of students Posts student pictures or personal information on the school s website. Provides online access to student grades or other sensitive data Sells, donates or recycles computers Allows laptops to be removed from the school premises. Given our expertise in underwriting Commercial Package, D&O & EPLI for Schools and other non-profit institutions We recently developed a cyber product that Is scalable. You and your agent are able to pick and choose appropriate coverages for your enitity On PHLY s admitted A++ paper in most states Provides industry leading coverage for both 1st party and 3rd party claims Information Needed for a Non-Binding Indication for current or prospective PHLY School customers: Annual revenues and number of employees Financial Threats to Your Institution: Costs to comply with federal and/or state required notification. Per individual, the average cost per record is estimated at $203 Regulatory proceedings (including fines and penalties) as a result of a privacy breach Employees (teachers, volunteers) and/or groups of affected individuals (alumni, current students, parents) suing for damages as a result of a privacy breach Denial of service attack on your network, causing computer system to go down and business interruption expenses Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet sites Claim Scenarios School Athletic director has laptop stolen from her car. Laptop contained names, social security and health information for all athletic participants for that year Charter school network is down for 4 days as a result of a Trojan horse attack and are unable to hold any classes without their network School posts photos of students without their consent and the pictures are construed by their parents as inappropriate. Parents bring suit against the school as a result In an effort to go paperless, school janitors discard all employee files in an unsecured dumpster. Personal information of all employees is compromised and those affected join a class action suit against the school
Coverage is subject to a Deductible
Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationData Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
More informationInsuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
More informationAPIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
More informationPROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS
PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,
More informationReducing Risk. Raising Expectations. CyberRisk and Professional Liability
Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationCyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
More informationPRODUCT HIGHLIGHTS FLEXI PLUS FIVE
PRODUCT HIGHLIGHTS FLEXI PLUS FIVE Benefits of this Program This policy is a comprehensive liability solution for 501 (c) Non-Profit organizations that offers five unique flexible coverages: Directors
More informationCyber and Privacy Risk What Are the Trends? Is Insurance the Answer?
Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information
More informationCyber Exposure for Credit Unions
Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of
More informationInsurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
More informationCyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
More informationCyber Liability. What School Districts Need to Know
Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have
More informationDATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
More informationManaging Cyber & Privacy Risks
Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationUnderstanding Professional Liability Insurance
Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional
More informationData breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
More informationCyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
More informationHow To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
More informationISO? ISO? ISO? LTD ISO?
Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet
More informationUnderstanding. your Cyber Liability coverage
Understanding your Cyber Liability coverage TEXAS MEDICAL LIABILITY TRUST 901 S. Mopac Expressway Barton Oaks Plaza V, Suite 500 Austin, TX 78746-5942 P.O. Box 160140 Austin, TX 78716-0140 800-580-8658
More informationCyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationSpecialty Risk Protector
Specialty Professional Liability and Data and Network Security Insurance is a single policy that makes it easy for companies to secure the multi-faceted E&O protection our networked world requires. A simplified,
More informationData breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
More informationcyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
More informationManaging Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
More informationData Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
More informationCyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationDon t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks
Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Thank you for joining us. We have a great many participants in today s call. Your phone is currently
More informationCYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014
CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)
More informationCyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029
Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a
More information9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability.
Miscellaneous Current Topics in Healthcare Professional Liability Josh Zirin, FCAS, MAAA Antitrust Notice The Casualty Actuarial Society is committed to adhering strictly to the letter and spirit of the
More informationTools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited
Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial
More informationPolicy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium
Policy Considerations for Covering Special Exposures Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Special exposures Coverage that targets a loss with
More informationTHE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
More informationCyber Liability. AlaHA Annual Meeting 2013
Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages
More informationData Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationEnterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationPractical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance
Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance By Shawn Tuma & Katti Smith Data breaches have become far more common than most people realize.
More informationIRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
More informationJoe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
More informationCyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationCYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
More informationCyber Insurance as one element of the Cyber risk management strategy
Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,
More informationCYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
More informationPrivacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
More information2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage
2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and
More informationBeyond Data Breach: Cyber Trends and Exposures
Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in
More informationCYBER & PRIVACY LIABILITY INSURANCE GUIDE
CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,
More informationBelmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
More informationInsurance implications for Cyber Threats
Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of
More informationLessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd
Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual
More informationTechnology, Privacy and Cyber Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationHow To Buy Cyber Insurance
10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationCyber Risks and Insurance Solutions Malaysia, November 2013
Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare
More informationDiscussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
More informationCAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President
More informationData Security Breaches: Learn more about two new regulations and how to help reduce your risks
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
More informationCyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
More informationImplementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind
Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and
More informationCyber Liability Insurance
Annual Board of Directors Conference 29 April 2014 TOC - 1 The Cyber Risk Landscape 2 Regulation Changes 3 Case Study Why to insure 4 Page 2 The Cyber Risk Landscape 2013 Lloyds Risk Index : Cyber Risk
More informationMISCELLANEOUS MEDICAL PROFESSIONAL AND GENERAL LIABILITY INSURANCE POLICY CLAIMS MADE AND REPORTED COVERAGE ENDORSEMENT
MISCELLANEOUS MEDICAL PROFESSIONAL AND GENERAL LIABILITY INSURANCE POLICY CLAIMS MADE AND REPORTED COVERAGE ENDORSEMENT e-md E1857BA-0712 In consideration of the premium charged, it is understood and agreed
More informationAnatomy of a Privacy and Data Breach
Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions
More informationCyber Risk Insurance for Agents. Frequently Asked Questions
Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship
More informationANATOMY of a DATA BREACH DISASTER. Avoiding a Cyber Catastrophe. June, 2011. Sponsored by:
ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe June, 2011 Sponsored by: ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe An Advisen Special Report Sponsored by Chartis Security
More informationPrivacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec
Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,
More informationTechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application
IRONSHORE INSURANCE COMPANIES One State Street Plaza New York, NY 10004 Tel: 646-826-6600 Toll Free: 877-IRON411 TechDefender SM Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division
More informationTHE DATA BREACH: How to stay defensible before, during and after the incident. after the incident.
THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident. September 22, 2015 Erica Ouellette Beazley Technology, Media & Business Services Alyson Newton, Executive
More informationWhat A Nonprofit Organization Needs To Know About Insurance. Susan R. Smith. Beehive Insurance Agency, Inc.
the the the GOOD UGLY BAD& What A Nonprofit Organization Needs To Know About Insurance Susan R. Smith Beehive Insurance Agency, Inc. c o n t e n t s Introduction 1 General Liability 2 Professional Liability
More informationProtecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks
Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data
More informationCyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
More informationMANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationManaging Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
More informationWhat is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage?
What is Technology, Media and Professional Services (TMPS) Coverage? TMPS is written to: Protect the company from errors and omissions that occur in the company's rendering or failure to render professional
More informationCAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance
Fundamentals of Cyber Risk Brad Gow June 9th, 2015 Endurance But consider the kickoff chuckle to a speech given to the Wharton School in March 1977 by Sidney Homer of Salomon Brothers, the leading bond
More informationCyber Liability & Data Breach Insurance Claims
Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This
More informationINFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:
INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST MADE
More informationWhat Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 marc.tucker@smithmoorelaw.com Presented by: Rob D. Moseley, Jr. 2 West
More informationCyber/Information Security Insurance. Pros / Cons and Facts to Consider
1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner
More informationCyberinsurance: Insuring for Data Breach Risk
View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL
More informationNonProfit 101. Notes: Session 1B: Insurance, What you do not know can hurt you! From Survivability to Sustainability. June 10, 2015 Session 1B page 1
Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 1 Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 2 June 10,
More informationPersonal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
More informationCyber Risks in Italian market
Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES
INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY
More informationData security: A growing liability threat
Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars
More informationWhat would you do if your agency had a data breach?
What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the
More informationMedGuard. Peace of Mind for Maryland Doctors. Coverage for the Legal Expenses of Defending Against Administrative Proceedings
MedGuard Peace of Mind for Maryland Doctors Coverage for the Legal Expenses of Defending Against Administrative Proceedings The Coverage You Need About Medguard coverage MedGuard is a defense coverage
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationData Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com
Data Security 101 A Lawyer s Guide to Ethical Issues in the Digital Age Christopher M. Brubaker cbrubaker@clarkhill.com November 4-5, 2015 Pennsylvania Bar Institute 21 st Annual Business Lawyers Institute
More information