PRODUCT HIGHLIGHTS CYBER SECURITY LIABILITY

Size: px
Start display at page:

Download "PRODUCT HIGHLIGHTS CYBER SECURITY LIABILITY"

Transcription

1 PRODUCT HIGHLIGHTS CYBER SECURITY LIABILITY Benefits of this Program Philadelphia Insurance Companies Cyber Security Liability program provides both First and Third Party coverage for numerous classes of business. Through eight (8) Insuring Agreements, a wide range of cyber liability exposures are addressed. Benefits Available on an admitted basis in most states via Philadelphia Indemnity Insurance Company (PIIC) paper, rated A++ by A.M. Best Policy limits up to $5,000,000 available Targeted classes of business include private or publicly traded companies, non-profit social service organizations, nursing homes, physician s practices, clinics, home health agencies, technology consultants, and many more Not a market for financial institutions, credit card processors, online gaming, for-profit entities over $250 million in annual sales Enterprise product solution providing both First and Third party coverages, including: 1. First Party Protection, wtih Loss of Digital Assets coverage, Non-Physical Business Interruption, Extra Expense, Cyber Extortion, Cyber Terrorism, and Security Event Costs 2. Third Party Protection with Network Security and Privacy Liability, Employee Privacy Liability, and Electronic Media Liability Coverages Coverage for damages to third parties caused by a breach of network security Coverage for loss resulting from administrative or operational mistakes - extends to acts of the employee, business process outsourcing (BPO) or outsourced IT provider Breach of Privacy coverage - includes damages resulting from alleged violations of HIPAA, state and federal privacy protection laws and regulations Coverage for expenses resulting from a breach of consumer protection laws such as the Fair Credit Reporting Act (FCRA), the California Consumer Credit Reporting Agencies Act (CCCRAA) and the European Union (EU) Data Protection Act Customer Notification Expenses Coverage (via sub-limit) - reimburses for costs to notify and provide 12 months of credit monitoring Coverage for acts of a rogue employee causing intentional damage to the insured s computer network Public Relations Expenses coverage available to repair insured s reputation as a result of a data breach Customer Notification Expenses include legal expenses, credit monitoring expenses, postage and advertising costs Privacy Breach definition extends to acts of the insured and acts of a service provider acting on behalf of the insured Most favorable venue wording for punitive or exemplary damages Definition of claim includes demand for monetary and non-monetary damages or request to toll applicable statutes of limitations Cyber Extortion reimbursement costs for a range of perils including a credible threat to introduce malicious code, pharm and phish customer systems or to corrupt, damage or destroy the Insured s computer system Electronic Media peril broadly defined to include infringement of domain name, copyright, trade name, slogan, service mark on internet or intranet site Interruption expenses include additional costs associated with rented/leased equipment, use of third party services, additional staff expenses or labor costs directly resulting from a covered Loss of Digital Assets claim Personally Identifiable Information (PII) broadly defined to include an individual s name in combination with social security number, driver s license number, account number, credit or debit card or any non-personal information as defined in any privacy regulation Knowledge provision includes President, Executive Officer, Chairman, Chief Information Officer, Chief Technology Officer, Risk Manager or General Counsel Crisis Management Enhancement Endorsement $25,000 limit for crisis management emergency response expenses incurred because of an incident giving rise to a crisis Documents Required for Proposal Completed, signed, and dated PHLY Cyber Security Liability application (a quotation can be provided from an acceptable and properly completed competitor application) Brochure and advertising material Latest annual audited financial statement Additional information may be required, depending on class of business and degree of computer security controls Service Clients are serviced by both our Home Office staff as well as our Regional Offices located throughout the country continues on next page...

2 CYBER SECURITY LIABILITY - continued Carrier These coverages are underwritten by Philadelphia Insurance Companies, rated A++ (Superior) by A.M. Best. Nationally recognized as a member of Ward s Top 50. Forbes Magazine has recognized PHLY as one of the 400 Best Big Companies in America Payment Terms Interest-free installments available for accounts that generate at least $2,000 in premium For more information about our products and services, please visit our website at

3 Focus on the things that Matter, We ll Handle the Risk! Benefits of this Program Philadelphia Insurance Companies Cyber Security Liability program provides both First and Third Party coverage for numerous classes of business. Through eight (8) Insuring Agreements, a wide range of cyber liability exposures are addressed. Benefits Available on an admitted basis in most states via Philadelphia Indemnity Insurance Company (PIIC) paper, rated A++ by A.M. Best Policy limits up to $5,000,000 available Targeted classes of business include private or publicly traded companies, non-profit social service organizations, nursing homes, physician s practices, clinics, home health agencies, technology consultants, and many more Not a market for financial institutions, credit card processors, online gaming, for-profit entities over $250 million in annual sales Enterprise product solution providing both First and Third party coverages, including: 1. First Party Protection, with Loss of Digital Assets coverage, Non-Physical Business Interruption, Extra Expense, Cyber Extortion, Cyber Terrorism, and Security Event Costs 2. Third Party Protection with Network Security and Privacy Liability, Employee Privacy Liability, and Electronic Media Liability Coverages Coverage for damages to third parties caused by a breach of network security Coverage for loss resulting from administrative or operational mistakes extends to acts of the employee, business process outsourcing (BPO) or outsourced IT provider Breach of Privacy coverage includes damages resulting from alleged violations of HIPAA, state and federal privacy protection laws and regulations Coverage for expenses resulting from a breach of consumer protection laws such as the Fair Credit Reporting Act (FCRA), the California Consumer Credit Reporting Agencies Act (CCCRAA) and the European Union (EU) Data Protection Act Customer Notification Expenses Coverage (via sub-limit) reimburses for costs to notify and provide 12 months of credit monitoring Coverage for acts of a rogue employee causing intentional damage to the insured s computer network Public Relations Expenses coverage available to repair insured s reputation as a result of a data breach Customer Notification Expenses include legal expenses, credit monitoring expenses, postage and advertising costs Privacy Breach definition extends to acts of the insured and acts of a service provider acting on behalf of the insured Most favorable venue wording for punitive or exemplary damages Definition of claim includes demand for monetary and non-monetary damages or request to toll applicable statutes of limitations Cyber Extortion reimbursement costs for a range of perils including a credible threat to introduce malicious code, pharm and phish customer systems or to corrupt, damage or destroy the insured s computer system Electronic Media peril broadly defined to include infringement of domain name, copyright, trade name, slogan, service mark on internet or intranet site Interruption expenses include additional costs associated with rented/leased equipment, use of third party services, additional staff expenses or labor costs directly resulting from a covered Loss of Digital Assets claim Personally Identifiable Information (PII) broadly defined to include an individual s name in combination with social security number, driver s license number, account number, credit or debit card or any non-personal information as defined in any privacy regulation Knowledge provision includes President, Executive Officer, Chairman, Chief Information Officer, Chief Technology Officer, Risk Manager or General Counsel Crisis Management Enhancement Endorsement $25,000 limit for crisis management emergency response expenses incurred because of an incident giving rise to a crisis Documents Required for Proposal Completed, signed, and dated PHLY Cyber Security Liability application (a quotation can be provided from an acceptable and properly completed competitor application) Brochure and advertising material Latest annual audited financial statement Additional information may be required, depending on class of business and degree of computer security controls Company Profile In operation since 1962, Philadelphia Insurance Companies designs, markets, and underwrites Commercial Property/Casualty, Personal Lines, and Professional Liability insurance products incorporating value added coverages and services for select markets. Nationally recognized as a premier niche underwriter, the Company has field offices strategically located nationwide to provide local service to our agents and policyholders. The Company has three underwriting divisions: Commercial Lines Management & Professional Liability Personal Lines Philadelphia Insurance Companies provides competitively priced policies, local service relationships, and differentiated coverage features designed to provide a win-win relationship with our customers. A.M. Best Rating The Company s two insurance subsidiaries are pooled for risk assumption and accumulated surplus. A.M. Best Company has assigned the insurance subsidiaries an A++ (Superior) rating. Standard & Poor s Assigned A+ for counterpart credit and financial strength. Ward s Nationally recognized as a member of Ward s Top 50 Benchmark group of Property/Casualty insurance companies for outstanding achievement in the areas of financial strength, claims performance, and consistently favorable underwriting results. Forbes Magazine Forbes Magazine has recognized Philadelphia Insurance Companies as one of the 400 Best Big Companies in America. Philadelphia Insurance Companies is the marketing name for the insurance company subsidiaries of the Philadelphia Consolidated Holding Corp., a Member of the Tokio Marine Group. Your insurance policy, and not the information contained in this document, forms the contract between you and your insurance company. If there is a discrepancy or conflict between the information contained herein and your policy, your policy takes precedence. All coverages are not available in all states due to state insurance regulations. Certain coverage(s) may be provided by a surplus lines insurer. Surplus lines insurers do not generally participate in state guaranty funds and insureds are therefore not protected by such funds Philadelphia Insurance Companies, All Rights Reserved.

4 CLAIM SCENARIOS CYBER SECURITY LIABILITY The average cost of a data breach is $204 per lost record, with more than half of such costs attributable to lost customers and the associated public relations expenses to rebuild an organization s reputation. 1 The below examples illustrate situations in which the costs incurred to remediate a data breach were significant. Unauthorized Access An international computer hacking group gained access electronically to the computerized cash registers of a restaurant chain and stole credit card information of 5,000 customers, starting a flood of fraudulent purchases around the world. Theft of Digital Assets A regional retailer contracted with a third party service provider. A burglar stole two laptops of the service provider containing the data of over 800,000 clients of the retailer. Under applicable notification laws, the retailer - not the service provider - was required to notify affected individuals. Total expenses incurred for notification and crisis management to customers was nearly $5,000,000. Privacy Breach An employee of a rehabilitation center improperly disposed of 4,000 client records in violation of the center s privacy policy. The records contained social security numbers, credit and debit card account numbers, names, addresses, telephone numbers as well as sensitive medical information. The center settled the claim with the state of Massachusetts and agreed to pay fines and penalties imposed by the state as well as extend $890,000 in customer redress funds for credit monitoring on behalf of the victims. Theft of Digital Assets A home healthcare organization had backup tapes, laptops and disks containing social security numbers, clinical and demographic information, and in a small number of cases, patient financial data that was stolen. In total, over 365,000 patient records were exposed. The organization settled with the state attorney general, providing patients with free credit monitoring, credit restoration to patients that were victims of identity fraud, and reimbursement to patients for direct losses that resulted from the data breach. The organization was also required to revamp its security policies, implement technical safeguards and conduct random compliance audits. Human Error A non-profit community action corporation printed two 1099 forms on one piece of paper. An employee was supposed to separate the forms and send each to its rightful owner. Instead, one person received both copies. The mistake sent tax forms and social security numbers to strangers. Approximately 50% of the landlords who work with the community action corporation received their forms in addition to the private information of the others. Cyber Extortion Threat A U.S. based information technology company contracted with an overseas software vendor. The contracted vendor left universal administrator defaults installed on the company s server and a Hacker for Hire was paid $20,000 to exploit such vulnerability. The hacker advised if the requested payment was not made he would post the records of millions of registered users on a blog available for all to see. The extortion expenses and extortion monies are expected to exceed $2,000,000. Human Error An employee of a private high school mistakenly distributed via the names, social security numbers, birthdates and medical information of students and faculty creating a privacy breach. Overall, 1,250 individuals information was compromised. Malicious Code A juvenile released a computer worm directing infected computers to launch a denial of service attack against a regional computer consulting & application outsourcing firm. The infection caused an 18 hour shutdown of the entity s computer systems. The computer consulting & application outsourcing firm incurred extensive costs and expenses to repair and restore their system as well as business interruption expenses which totaled approximately $875,000. 1Ponemon Institute, 4/2009 Global Cost of a Data Breach Study. For all your cyber security liability insurance needs, please visit our website at Ed

5 PHYSICIAN/DENTAL PRACTICES Why would my practice need cyber/privacy insurance? A large majority of doctors and dentists are not aware that their standard insurance coverages (Malpractice, GL, Property) typically don t provide proper coverage for cyber and privacy liability. Most also don t know that they (along with their practice) have an exposure to cyber and privacy risk, especially given the presence of personal health information that they and their vendors have access to and the laws that exist to protect this. Any medical practice that Obtains social security numbers, personal health information, drivers license numbers, bank account numbers of patients Is in the process of going paperless or stores paper files Provides online access for payment Has a website Given our expertise in underwriting small to mediumsized companies insurance We recently developed a cyber product that: Is modular. You are able to pick and choose appropriate coverage lines Is on PHLY s admitted A++ paper Provides industry leading coverage for both 1st party and 3rd party exposures We can help you understand. At any point, a cyber underwriter can help explain the coverage to you, and/or your agent Information needed for a Non-Binding Indication: PHLY Cyber Application (online adobe fill-able) or PHLY Indication Application Financial Threats to Your Practice: Costs to comply with federal and/or state required notification. Data breaches in 2010 cost their companies an average of $214/ record.*ponemon Institute Study Various regulatory proceedings (including fines and penalties) as a result of a privacy breach, including alleged HIPAA violations. Patients/affected individuals suing your organizations for damages as a result of a privacy breach or network intrusion Business interruption expenses as a result of your network or server going down due to a denial of service attack or similar action Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet sites Destruction to your brand as a result of a privacy breach (lost patients) Claim Scenarios for physicians/dentists: A physicians assistant brings a laptop home to update patient records. While on her way home, she stops at the grocery store and her car is broken into and the laptop is stolen. Files on the laptop contained patient names, social security numbers, dates of birth, addresses, phone numbers, and medical condition information In an effort to go paperless, employees organized medical information (to be shredded) and non-medical information (to be thrown out.) The person responsible for discarding the information inadvertently switched the two types of information and the medical information was thrown into an unsecured dumpster without being shredded. Personal information and personal health information of patients is compromised and those affected join a class action suit against the practice A hacker gained unauthorized access to a surgery center s computer system. The practice s failed to timely notify its patients whose personal health information was contained on the computer system. The practice suffered fines and penalties for not adhering to HIPAA laws and regulations A practices computer network is down for 4 days as a result of a Trojan horse attack and are unable to access billing software, appointment scheduler or patient files, resulting in a need to hire experts to come in and correct the system and get it back to where it was functioning A practice has a website and posts testimonials from patients. As a result of the practice not obtaining proper authorization to use one of the patient s comments, they are sued for invasion of privacy

6 HEALTH AND FITNESS ORGANIZATIONS Why Would My Gym Or Studio Need Cyber Liability Coverage? A large majority of gym owners are not aware that their standard insurance coverages (Commercial GL, Property, D&O, Crime) typically don t provide proper coverage for cyber liability. Most fitness instructors, gym personnel and risk managers don t know that they (along with their gym) have an exposure to cyber risk and how that exposure can pose a significant financial threat to their companies. Any gym or fitness studio that Obtains social security numbers, drivers license numbers, bank account numbers of clients or employees Has access to member health information Provides online personal training Is in the process of going paperless or stores paper files Provides online access for members Posts pictures or information about members online Given our expertise in underwriting Commercial Package, D&O & EPLI for the fitness industry We recently developed a cyber product that: Is modular. You and your agent are able to pick and choose appropriate coverage lines Is on PHLY s A.M. Best rated A++. paper in most states Provides industry leading coverage for both 1st party and 3rd party exposures We can help you understand. At any point, a cyber underwriter can help explain the coverage to an agent or Insured Information Needed for a Non-Binding Indication for current or prospective PHLY School customers: Annual Revenues and number of employees Financial Threats to Your Company: Costs to comply with federal and/or state required notification. Per individual, the average cost per record is estimated at $203 Regulatory proceedings (including fines and penalties) as a result of a privacy breach. This includes HIPAA violations Employees (instructors, facilities crew) and/or groups of affected individuals (current or former members) suing for damages as a result of a privacy breach Denial of service attack on your network, causing your computer system to go down and business interruption expenses Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet sites Claim Scenarios Member information was on a gym employee s laptop that was stolen from her office. Membership files on the laptop contained names, social security numbers, bank account numbers, dates of birth, addresses, phone numbers, medical condition information for all members for the past 3 years Third-party vendor that hosted a gym s website experienced a security incident. Members who had online bill-pay set up may have had their names, dates of birth and credit card information accessed Yoga Studio s computer network is down for 4 days as a result of a Trojan horse attack and are unable to accept any monthly member fees, resulting in a need to hire experts to come in and correct your system and get it back to where it was functioning In an effort to go paperless, cleaning crew at a gym discards employee files in an unsecured dumpster. Personal information of all employees is compromised and those affected join a class action suit against the gym A Fitness Club holding a golf tournament posts information regarding the event on their website. They are sued by a golf company for copyright infringement as the club did not obtain permission to use their logo

7 HUMAN & SOCIAL SERVICE ORGANIZATIONS Why would my organization need Cyber Liability Coverage? A large majority of non-profit and social service executive directors, boards of directors and risk managers are not aware that their standard insurance coverages (Commercial GL, Property, D&O, crime) typically don t provide proper coverage for cyber liability. Most employees and IT professionals don t know that they (along with their organization) have an exposure to cyber risks and how that exposure can pose a significant financial threat to their institutions. Any Non-Profit or Social Service organization that Obtains social security numbers, drivers license numbers, bank account numbers of clients or employees Has access to patient medical records Is in the process of going paperless or keeps paper files onsite Provides online access to sensitive data Allows laptops or access to their network from a remote location Given our expertise in underwriting Commercial Package, D&O & EPLI for the social service industry and other non-profit institutions We recently developed a cyber product that Is modular. You and your agent are able to pick and choose the appropriate coverage lines Is on PHLY s admitted A++ paper in most states. Provides industry leading coverage for both 1st party and 3rd party exposures Helps you understand. At any point, a cyber underwriter can help explain the coverage to an agent or insured Information Needed for a Non-Binding Indication for current or prospective PHLY Customers: Annual revenues and number of employees. Financial Threats to Your Institution: Costs to comply with federal and/or state required notification. Per individual, the average cost per record is estimated at $203 Regulatory proceedings(including fines and penalties) as a result of a privacy breach. This includes HIPAA violations Employees (teachers, volunteers) and/or groups of affected individuals(alumni, current students, parents) suing for damages as a result of a privacy breach Denial of service attack on your network, causing computer system to go down and business interruption expenses Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet sites Claim Scenarios for Non-Profit Organizations Client information was on a case manager s laptop that was stolen from her office. Files on the laptop contained patient names, social security numbers, dates of birth, addresses, phone numbers, medical condition information and case information Third-party vendor that hosted a foundation s website experienced a security incident. Customers who donated to the organization may have had their names, dates of birth and credit card information accessed Adult day care s computer network is down for 4 days as a result of a Trojan horse attack and are unable to provide any services as a result. There is a need to hire experts to correct their system and get it back to where it was functioning In an effort to go paperless, cleaning crew at a HIV awareness organization discards all employee files in an unsecured dumpster. Personal information of all employees is compromised and those affected join a class action suit against the non-profit Animal shelter holding a golf tournament posts information regarding the event on their website. As a result of the shelter not getting permission to use a golf company s logo, they are sued for copyright infringement

8 VETERINARIAN PRACTICES Why would my practice need Cyber Liability Coverage? A large majority of veterinarians are not aware that their standard insurance coverages (Malpractice, GL, Property, Crime) typically don t provide proper coverage for cyber and privacy liability. Most vets also don t know that they (along with their practice) have a significant exposure to cyber risk and how that same exposure can pose a significant financial threat to their practice(and them as individuals). Any veterinarian practice that Obtains social security numbers, drivers license numbers, bank account numbers of clients Has access to pet health information Uses an online appointment system Is in the process of going paperless or stores paper files Provides online access for payment Posts pictures or information about pets and/or parents online Given our expertise in underwriting low-premium business We recently developed a cyber product that: Is modular. You and your agent are able to pick and choose the appropriate coverage lines Is on PHLY s admitted A++ paper in most states Provides industry leading coverage for both 1st party and 3rd party exposures We can help you understand. At any point, a cyber underwriter can help explain the coverage to an agent or Insured Information Needed for a Non-Binding Indication for current or prospective PHLY customers: One page Cyber Indication sheet Financial Threats to Your Company: Costs to comply with federal and/or state required notification. Data breaches in 2010 cost their companies an average of $214/ record.*ponemon Institute Study Regulatory proceedings (including fines and penalties) as a result of a privacy breach. Pet owners suing your organizations for damages as a result of a network or security breach Denial of service attack on your network, causing your computer system to go down and business interruption expenses Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet site Claim Scenarios for veterinarians: Patient health records were on an employee s laptop that was stolen from her office. Pet records on the laptop contained names, health records, addresses and diagnoses for all pets treated in the last 3 years. Third-party vendor that hosted a veterinarian s website experienced a security incident. Patient parents who had online bill-pay set up may have had their names, dates of birth and credit card information accessed. State notification is required. Veterinarian s computer network is down for 4 days as a result of a Trojan horse attack and are unable to accept any new appointments; resulting in a need to hire experts to come in and correct your system and get it back to where it was functioning In an effort to go paperless, cleaning crew discards employee files in an unsecured dumpster. Personal information of all employees is compromised and those affected join a class action suit against the practice. A Veterinarian holds a 5K walk to benefit a local animal shelter. They post information regarding the event on their website. They are sued by a dog food company for copyright infringement as the veterinarian did not obtain permission to use their logo

9 RELIGIOUS ORGANIZATIONS Why would my religious organization need Cyber or Privacy Coverage? A large majority of deacons, pastors and rabbis are not aware that their standard insurance coverages (Commercial GL, Property, D&O, crime) typically don t provide proper coverage for cyber liability. Most employees, volunteers and IT professionals don t know that they (along with their organization) have an exposure to cyber risks and don t understand how that exposure can pose a significant financial threat to their organizations. Any religious organization that Accepts online donations Maintains a social networking page Obtains credit card numbers, drivers license numbers, social security numbers or medical histories of its congregation Posts pictures or personal information on the church s website Provides streaming webcasts of their services Allows pastors to maintain a blog Given our expertise in underwriting Commercial Package, D&O & EPLI for Religious institutions and other non-profit organizations We recently developed a cyber product that Is modular. You and your agent are able to pick and choose the appropriate coverage lines Is on PHLY s admitted A++ paper in most states Provides industry leading coverage for both 1st party and 3rd party exposures Helps you understand. At any point in the process, a cyber underwriter can help explain the coverage to an agent or Insured Information Needed for a Non-Binding Indication for current or prospective PHLY customers: Annual revenues and number of employees Financial Threats to Your Institution: Defense costs for intellectual property lawsuits. These include libel/ slander arising out of content that is on your internet or intranet sites Costs to comply with federal and/or state required notification. Per individual, the average cost per record is estimated to be well over $200 Regulatory proceedings (including fines and penalties) as a result of a privacy breach Employees (pastors,office personnel or volunteers) and/or groups of affected individuals (members of your congregation, Sunday school students, parents) suing for damages as a result of a privacy breach Lost income as a result of your online donation service or network going down Claim Scenarios for Religious organizations Synagogue s website developer accidentally uploads personal information of congregation onto their external internet site. Information included social security numbers, addresses, and names. Synagogue is required to notify all affected individuals Pastor s blog on the church s website makes an offensive remark regarding a former congregation member. That former member takes note and files lawsuit for defamation/slander A religious hacktivist attacks the network of a nationwide religious institution because he disagreed with their politically charged blog. As a result, their entire computer network ( , website & congregation information) is down for 4 days Church is sued by songwriter for copyright infringement and royalties due when they post an audio file on their social media site. The suit alleges the content was released without the songwriter s permission Priest has laptop stolen from his car while at his nephew s softball game. Laptop contained names, credit card information & total amount of donations of all church donors. Church is required to notify all affected individuals

10 PRIVATE, ACADEMIC, VOCATIONAL AND CHARTER SCHOOLS Why Would My School Need Cyber Liability Coverage? A large majority of school principals, boards of directors and headmasters are not aware that their standard insurance coverage (Commercial GL, Property, D&O, Crime) typically doesn t provide proper coverage for cyber liability. Most principals, teachers and IT professionals don t know that they (and their organization) have an exposure to cyber risks and how those risks can pose a significant financial threat to their organizations. Any School that Obtains social security numbers, drivers license numbers, bank account numbers, medical histories of students Posts student pictures or personal information on the school s website. Provides online access to student grades or other sensitive data Sells, donates or recycles computers Allows laptops to be removed from the school premises. Given our expertise in underwriting Commercial Package, D&O & EPLI for Schools and other non-profit institutions We recently developed a cyber product that Is scalable. You and your agent are able to pick and choose appropriate coverages for your enitity On PHLY s admitted A++ paper in most states Provides industry leading coverage for both 1st party and 3rd party claims Information Needed for a Non-Binding Indication for current or prospective PHLY School customers: Annual revenues and number of employees Financial Threats to Your Institution: Costs to comply with federal and/or state required notification. Per individual, the average cost per record is estimated at $203 Regulatory proceedings (including fines and penalties) as a result of a privacy breach Employees (teachers, volunteers) and/or groups of affected individuals (alumni, current students, parents) suing for damages as a result of a privacy breach Denial of service attack on your network, causing computer system to go down and business interruption expenses Intellectual property/privacy lawsuits. These include libel/slander arising out of content that is on your internet or intranet sites Claim Scenarios School Athletic director has laptop stolen from her car. Laptop contained names, social security and health information for all athletic participants for that year Charter school network is down for 4 days as a result of a Trojan horse attack and are unable to hold any classes without their network School posts photos of students without their consent and the pictures are construed by their parents as inappropriate. Parents bring suit against the school as a result In an effort to go paperless, school janitors discard all employee files in an unsecured dumpster. Personal information of all employees is compromised and those affected join a class action suit against the school

Coverage is subject to a Deductible

Coverage is subject to a Deductible Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insuring Innovation. CyberFirst Coverage for Technology Companies Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Cyber-Crime Protection

Cyber-Crime Protection Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living

More information

PRODUCT HIGHLIGHTS FLEXI PLUS FIVE

PRODUCT HIGHLIGHTS FLEXI PLUS FIVE PRODUCT HIGHLIGHTS FLEXI PLUS FIVE Benefits of this Program This policy is a comprehensive liability solution for 501 (c) Non-Profit organizations that offers five unique flexible coverages: Directors

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

Cyber Exposure for Credit Unions

Cyber Exposure for Credit Unions Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Cyber Insurance Presentation

Cyber Insurance Presentation Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance

More information

Cyber Liability. What School Districts Need to Know

Cyber Liability. What School Districts Need to Know Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Understanding Professional Liability Insurance

Understanding Professional Liability Insurance Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

How To Cover A Data Breach In The European Market

How To Cover A Data Breach In The European Market SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

Understanding. your Cyber Liability coverage

Understanding. your Cyber Liability coverage Understanding your Cyber Liability coverage TEXAS MEDICAL LIABILITY TRUST 901 S. Mopac Expressway Barton Oaks Plaza V, Suite 500 Austin, TX 78746-5942 P.O. Box 160140 Austin, TX 78716-0140 800-580-8658

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

Specialty Risk Protector

Specialty Risk Protector Specialty Professional Liability and Data and Network Security Insurance is a single policy that makes it easy for companies to secure the multi-faceted E&O protection our networked world requires. A simplified,

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Thank you for joining us. We have a great many participants in today s call. Your phone is currently

More information

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014 CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)

More information

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a

More information

9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability.

9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability. Miscellaneous Current Topics in Healthcare Professional Liability Josh Zirin, FCAS, MAAA Antitrust Notice The Casualty Actuarial Society is committed to adhering strictly to the letter and spirit of the

More information

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial

More information

Policy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium

Policy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Policy Considerations for Covering Special Exposures Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Special exposures Coverage that targets a loss with

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

Cyber Liability. AlaHA Annual Meeting 2013

Cyber Liability. AlaHA Annual Meeting 2013 Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages

More information

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Enterprise PrivaProtector 9.0

Enterprise PrivaProtector 9.0 IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance By Shawn Tuma & Katti Smith Data breaches have become far more common than most people realize.

More information

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Cyber Insurance as one element of the Cyber risk management strategy

Cyber Insurance as one element of the Cyber risk management strategy Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

Privacy Rights Clearing House

Privacy Rights Clearing House 10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights

More information

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage 2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and

More information

Beyond Data Breach: Cyber Trends and Exposures

Beyond Data Breach: Cyber Trends and Exposures Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C. Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.

More information

Insurance implications for Cyber Threats

Insurance implications for Cyber Threats Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

Technology, Privacy and Cyber Protection Modular application form

Technology, Privacy and Cyber Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

How To Buy Cyber Insurance

How To Buy Cyber Insurance 10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cyber Risks and Insurance Solutions Malaysia, November 2013 Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare

More information

Discussion on Network Security & Privacy Liability Exposures and Insurance

Discussion on Network Security & Privacy Liability Exposures and Insurance Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter

More information

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection

Cyber Liability Insurance Data Security, Privacy and Multimedia Protection Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT

More information

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and

More information

Cyber Liability Insurance

Cyber Liability Insurance Annual Board of Directors Conference 29 April 2014 TOC - 1 The Cyber Risk Landscape 2 Regulation Changes 3 Case Study Why to insure 4 Page 2 The Cyber Risk Landscape 2013 Lloyds Risk Index : Cyber Risk

More information

MISCELLANEOUS MEDICAL PROFESSIONAL AND GENERAL LIABILITY INSURANCE POLICY CLAIMS MADE AND REPORTED COVERAGE ENDORSEMENT

MISCELLANEOUS MEDICAL PROFESSIONAL AND GENERAL LIABILITY INSURANCE POLICY CLAIMS MADE AND REPORTED COVERAGE ENDORSEMENT MISCELLANEOUS MEDICAL PROFESSIONAL AND GENERAL LIABILITY INSURANCE POLICY CLAIMS MADE AND REPORTED COVERAGE ENDORSEMENT e-md E1857BA-0712 In consideration of the premium charged, it is understood and agreed

More information

Anatomy of a Privacy and Data Breach

Anatomy of a Privacy and Data Breach Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions

More information

Cyber Risk Insurance for Agents. Frequently Asked Questions

Cyber Risk Insurance for Agents. Frequently Asked Questions Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship

More information

ANATOMY of a DATA BREACH DISASTER. Avoiding a Cyber Catastrophe. June, 2011. Sponsored by:

ANATOMY of a DATA BREACH DISASTER. Avoiding a Cyber Catastrophe. June, 2011. Sponsored by: ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe June, 2011 Sponsored by: ANATOMY of a DATA BREACH DISASTER Avoiding a Cyber Catastrophe An Advisen Special Report Sponsored by Chartis Security

More information

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,

More information

TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application

TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application IRONSHORE INSURANCE COMPANIES One State Street Plaza New York, NY 10004 Tel: 646-826-6600 Toll Free: 877-IRON411 TechDefender SM Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division

More information

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident.

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident. THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident. September 22, 2015 Erica Ouellette Beazley Technology, Media & Business Services Alyson Newton, Executive

More information

What A Nonprofit Organization Needs To Know About Insurance. Susan R. Smith. Beehive Insurance Agency, Inc.

What A Nonprofit Organization Needs To Know About Insurance. Susan R. Smith. Beehive Insurance Agency, Inc. the the the GOOD UGLY BAD& What A Nonprofit Organization Needs To Know About Insurance Susan R. Smith Beehive Insurance Agency, Inc. c o n t e n t s Introduction 1 General Liability 2 Professional Liability

More information

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks

Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data

More information

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in

More information

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

Managing Cyber Risk through Insurance

Managing Cyber Risk through Insurance Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes

More information

What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage?

What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage? What is Technology, Media and Professional Services (TMPS) Coverage? TMPS is written to: Protect the company from errors and omissions that occur in the company's rendering or failure to render professional

More information

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance Fundamentals of Cyber Risk Brad Gow June 9th, 2015 Endurance But consider the kickoff chuckle to a speech given to the Wharton School in March 1977 by Sidney Homer of Salomon Brothers, the leading bond

More information

Cyber Liability & Data Breach Insurance Claims

Cyber Liability & Data Breach Insurance Claims Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This

More information

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name: INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST MADE

More information

What Data? I m A Trucking Company!

What Data? I m A Trucking Company! What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 marc.tucker@smithmoorelaw.com Presented by: Rob D. Moseley, Jr. 2 West

More information

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider 1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner

More information

Cyberinsurance: Insuring for Data Breach Risk

Cyberinsurance: Insuring for Data Breach Risk View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL

More information

NonProfit 101. Notes: Session 1B: Insurance, What you do not know can hurt you! From Survivability to Sustainability. June 10, 2015 Session 1B page 1

NonProfit 101. Notes: Session 1B: Insurance, What you do not know can hurt you! From Survivability to Sustainability. June 10, 2015 Session 1B page 1 Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 1 Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 2 June 10,

More information

Personal Information Protection Act Information Sheet 11

Personal Information Protection Act Information Sheet 11 Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores

More information

Cyber Risks in Italian market

Cyber Risks in Italian market Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends

More information

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES

INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY

More information

Data security: A growing liability threat

Data security: A growing liability threat Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars

More information

What would you do if your agency had a data breach?

What would you do if your agency had a data breach? What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the

More information

MedGuard. Peace of Mind for Maryland Doctors. Coverage for the Legal Expenses of Defending Against Administrative Proceedings

MedGuard. Peace of Mind for Maryland Doctors. Coverage for the Legal Expenses of Defending Against Administrative Proceedings MedGuard Peace of Mind for Maryland Doctors Coverage for the Legal Expenses of Defending Against Administrative Proceedings The Coverage You Need About Medguard coverage MedGuard is a defense coverage

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com Data Security 101 A Lawyer s Guide to Ethical Issues in the Digital Age Christopher M. Brubaker cbrubaker@clarkhill.com November 4-5, 2015 Pennsylvania Bar Institute 21 st Annual Business Lawyers Institute

More information