Coverage Made Simple(r)
|
|
|
- Matthew Farmer
- 10 years ago
- Views:
Transcription
1 Cyber & Privacy Insurance Coverage Made Simple(r) Bob Bregman, CPCU, MLIS, RPLU Senior Research Analyst International Risk Management Institute, Inc.
2 The Policies Are Both COMPLEX and DIFFER from Insurer to Insurer! In fact, they are so different that insurers use different names for what are essentially (but not exactly!) the same type of coverage: Information Security & Privacy Insurance (Beazley) CyberEdge (Chartis) CyberRisk (Travelers) Security and Privacy Protection (Zurich) CyberSecurity (Chubb) PrivaSure (AXIS Pro) Enterprise Professional Solutions (CNA) ClickStream 2.0 (Euclid Managers) after which, I stopped counting
3 Today s Road Map Part I: The 10 Basic Cyber & Privacy Policy Insuring Agreements Brief Interlude: A Word about Technology E&O Insurance Part II: Selling Cyber & Privacy Coverage: Tips for Risk Managers, Insurance Agents/Brokers, and Underwriters Part III: Materials for Further Study: Becoming a Cyber & Privacy Insurance Coverage Expert
4 Part I: The 10 Basic Insuring Agreements Cyber & Privacy Liability Coverages: the Core Coverages Privacy Notification and Crisis Management Expense Regulatory Defense and Penalties Information Security & Privacy Liability Website Media Liability Cyber-Related Time Element Coverages Business Interruption Extra Expense Cyber-Related Theft of Property Coverages Data Assets Cyber Extortion Computer Fraud Funds Transfer
5 Information Security and Privacy Liability Coverage Covers the pure liability component of the loss including the cost of defending the claims Regulatory Defense and Penalties Coverage Covers the cost of dealing with regulators and paying applicable fines/penalties; another loss component unique to data breaches. Regulatory Defense and Penalties Coverage Covers the cost of dealing with the regulators and paying applicable fines/penalties; another component of loss that is unique to data breaches Privacy Notification and Crisis Management Expense Coverage Covers the costs of services that are unique to a data breach. This is the loss containment component of cyber & privacy liability coverage Conceptualizing the 3 Core Cyber & Privacy Coverages
6 A Loss Scenario Involving the 3 Core Cyber & Privacy Liability Coverages A hacker gains access to a retailer s computer system and obtains Names, Addresses, Social Security #s, and Driver s License #s of 100,000 customers, all of which constitute PII or personally identifiable information. A class action lawsuit is eventually brought by 5,000 of the customers against the retailer.
7 Privacy Notification and Crisis Management Expense: Loss Containment Coverage Covers the direct expenses required to: Hire a forensics expert to determine the cause of the breach and suggest measures to secure the site and prevent future breaches Hire a PR agency to assist the insured in dealing with the crisis Set up a post-breach call center Notify individuals whose PII has been compromised Monitor these individuals credit (usually for 1 year) Pay costs needed to restore stolen identity (e.g., costs to notify banks and credit card companies)
8 Privacy Notification and Crisis Management Expense Coverage: Key Points Some insurers SPLIT: (1) Notification, (2) PR, and (3) Forensics into separate insuring agreements! This coverage affords the insured access to the insurer s cadre of experts who can provide the hands-on expertise to work an insured through a data breach. (Rick Betterley calls this breach coaching. ) Immediately after a data breach, an insured will benefit immensely by having an insurance company partner. If a business is able to purchase just ONE of the 10 Insuring Agreements this is the one to buy. It is the core of the 3 core coverages.
9 Regulatory Defense and Penalties Coverage: Regulatory Headache Coverage Covers the costs of dealing with regulatory agencies who oversee state and federal data breach laws and regulations: Costs of hiring attorneys to deal with regulators during investigations. Costs of fines and penalties that are levied against the insured as a result of the breach Regulatory defense means that only the legal costs of dealing with regulators not claimants are covered by this insuring agreement
10 Regulatory Defense and Penalties Coverage: Key Points One of the rare types of insurance policies that pays fines and penalties; items otherwise considered uninsurable under most coverages. BUT: some insurers DO NOT COVER fines and penalties. Others cover these items BY ENDORSEMENT. Especially valuable when dealing with regulators in multiple states. The laws are varied, complex, and downright byzantine (one of my favorite words!). Anyone who works in the D&O arena knows how expensive it is to respond to regulatory investigations. Navigating the post-breach regulatory maze requires the kind of specialized legal expertise to which most insureds do not have ready access even if an insured has the funds to hire experienced counsel.
11 Information Security and Privacy Liability: Traditional Liability Coverage Covers the insured s liability for damages resulting from a data breach, arising from: Loss, theft, or unauthorized disclosure of PII in the insured s care, custody & control Damage to data stored in insured s computer systems belonging to a 3rd party Transmission of malicious code or denial of service to a 3rd party s computer system Failure to timely disclose a data breach Failure of insured to comply with own privacy policy prohibiting disclosure/sharing of PII Failure to administer an identity theft program required by governmental regulation or to take necessary actions to prevent identity theft Defense costs associated with all of the above items
12 Information Security and Privacy Liability Coverage: Key Points This is the true liability coverage element of a cyber & privacy policy Pays actual liability losses sustained by various claimants (UNLIKE the first two insuring agreements) Contrast with Privacy Notification and Crisis Management Coverage, which pays without admission of liability (like medical payments coverage under a homeowners or personal auto policy) Pays actual defense costs required to defend claims alleging loss by claimants (but NOT legal costs required to deal with regulators)
13 Where It Gets Even Trickier Some insurers combine 2 of these core coverages into a single insuring agreement with a single limit (e.g., Regulatory Defense + Information Security and Privacy Notification). Some insurers offer privacy notification and crisis management expenses as separate insuring agreements (with separate limits): THIS IS NOT GOOD. Several insurers provide liability coverage only when there is a THEFT of data (i.e., a Target-type data breach) but NOT when there is merely an INTRUSION without theft, as in the case of WEBSITE VANDALISM. And of course, insurers often refer to the 3 core insuring agreements by different names. (e.g., one insurer uses the term Information Security and Privacy Liability and another calls it Network and Information Security Liability.
14 Website Media Content Liability Coverage Covers insured s liability for material published on its website (only) for claims alleging: Personal Injury: (e.g., invasion of privacy, libel, slander, defamation) Claim Scenario: a health insurance company posts pictures of its subscribers w/o obtaining permission, violating their privacy Commercial Violations: (e.g., plagiarism, infringement of: copyright, trademark, logo) Claim Scenarios: an online publisher publishes an article that does not attribute material appearing in the article, from its original, actual source; an online retailer introduces its new logo that is very similar to that of another company Other Improper Web-Based Acts: (e.g., improper deep linking) Claim Scenario: a publishing firm publishes model HR policies and procedures, including links to an HR consulting firm. The consulting firm sues, alleging that the links enhance the publisher s website BUT WITHOUT BENEFIT TO the consulting firm
15 Website Media Content Liability Coverage: Key Points Covers Losses NOT caused by data breaches/intrusions why I don t consider it one of the 3 core coverages Much like a traditional, stand-alone media liability policy, but with one big difference: it ONLY covers media-type liability incurred from website activities Provides no coverage for non-website-based media activities (e.g., paper publishing, broadcast media) Many cyber insurers do not offer such coverage because it is available under traditional, stand-alone media policies Best solution: buy a comprehensive media liability policy that includes liability incurred for website activity, under a traditional (i.e., ALL media forms) media policy
16 Cyber-Related Time Element Loss Coverages: Business Interruption and Extra Expense Business Interruption (BI): covers losses incurred during the period of recovery resulting from a computer system disruption 3 Types of Covered Losses and Loss Scenarios Income Loss (e.g., income lost when an insured cannot take online orders for its products) Dependent Business Interruption (e.g., loss sustained when an insured retailer s wholesale supplier is unable to receive orders because the wholesaler s website is shut down and can t ship products to the retailer) Extended Business Interruption (e.g., even after restoration following a shut down, it will require some period of time for the volume of business to return to normal covers loss sustained until business returns to normal )
17 Extra Expense Coverage Extra Expense (EE): covers additional costs required to expedite recovery, such as: overtime labor, express parts shipping, hiring special experts Under some policies, EE coverage applies only if the extra expense reduces the loss Both BI and EE Coverage are triggered ONLY by an electronic disruption (as defined by the policy), but NOT by other types of physical damage such as: fire, windstorm, flood, etc., as under standard property insurance policies Both BI and EE coverages are usually (but not always) subject to a time deductible (rather than a dollar deductible) before coverage applies Standard property insurance won t cover data breach-related BI or EE loss because the policies require physical damage to trigger a covered loss
18 Complications, Caveats, and a Recommendation Many insurers do not offer cyber-related property coverage because, philosophically, they view cyber & privacy insurance as a liability coverage ONLY. Others offer it but by endorsement not within their standard form. Under some forms, a covered computer system disruption MUST be a data breach; under others, this is not required (e.g., can be introduction of a virus). Some insurers bundle BI and EE under a single insuring agreement; others separate them; still others offer BI but not EE. Some insurers do not offer Dependent BI coverage OR Extended BI coverage within their BI coverage wording. If insured has purchased BI coverage, insurer has added incentive to handle the privacy notification and crisis management aspects of a data breach MORE EXPEDITIOUSLY! So consider buying BI coverage for that reason.
19 Cyber-Related Theft of Property Coverages Data Asset Coverage Cyber Extortion Computer Fraud Funds Transfer Fraud IRMI.com
20 Data Asset Coverage Covers the cost of restoring and recovering the data lost from the failure of an insured s computer system Loss Scenarios: (a) A hacker gains access to an insured s customer database and erases it from the company s computer system. (b) An employee accidentally erases the company s customer database. In both instances, this insuring agreement pays the cost of restoring the customer database.
21 Restrictions: Data Asset Coverage (continued) Coverage usually does not apply when loss of data assets caused by intentional employee acts No coverage for upgrading software or other programs during restoration process No coverage for the cost of research to recover lost data (only coverage for electronic recovery methods) Insurer must (usually) pre-approve costs for all expenditures Some policies only provide coverage for loss caused by a data breach (but not from other causes, such as accidental erasure)
22 K&R Coverage for Cyber Events (AKA E-Commerce Extortion ) Cyber Extortion Coverage Loss Scenario: insured receives an from an individual who threatens to: shut down/damage/introduce a virus into/disclose confidential information from/block access to/attack the company s website in some other way UNLESS the insured pays $10 million. What s Covered: (1) Monies paid to meet the extortion demands (2) Monies paid to computer security experts on how to prevent future extortion attempts (3) Cost of expert assistance to deal/negotiate with cyber extortionists (perhaps more important than #1 and #2)
23 Computer Fraud Coverage Covers loss from fraudulent, unauthorized entry into a computer system resulting in a theft of money or data. Loss Scenario: a cyber thief accesses a bank customer s savings account number and password, then uses this data to withdraw $25,000 from various ATMs. Key Points: NO COVERAGE for: (1) employee acts (it s NOT a fidelity cover), (2) independent contractor acts, or (3) acts of persons under insured s supervision. In effect, insurers won t cover inside jobs.
24 Funds Transfer Fraud Coverage Covers loss sustained when funds are fraudulently transferred from one financial institution to another Loss Scenario: stock brokerage firm receives appearing to be from a U.S. bank (but is not). The broker s employee opens the , which activates a virus, allowing the thief to access the brokerage account number and password, which she uses to transfer funds to her bank in Eastern Europe. ( Girl With the Dragon Tattoo, by Stieg Larsson) Funds Transfer Fraud vs. Computer Fraud: the previous scenario (i.e., the computer fraud ) did not involve the transfer of monies between financial institutions, whereas funds transfer fraud does.
25 IRMI.com Cyber-Related Theft of Property Coverages: A Wrap-Up A substantial minority of insurers DO NOT offer such coverages They philosophically view Cyber & Privacy Insurance as DATA BREACHdriven, producing third-party liability loss, rather than first-party property loss BUT a number of these losses can be covered elsewhere (K&R policies, crime policies) so insurers seek to avoid duplicating coverage in cyber forms Many insurers seek to avoid such losses because they are often fidelitylinked and don t want to provide such coverage I:\Temporary\MichelleS
26 A Last Look at the 10 Insuring Agreements Cyber & Privacy Liability Coverages: the Core Coverages Privacy Notification and Crisis Management Expense Regulatory Defense and Penalties Information Security & Privacy Liability Website Media Liability Cyber-Related Time Element Coverages Business Interruption Extra Expense Cyber-Related Theft of Property Coverages Data Assets Cyber Extortion Computer Fraud Funds Transfer
27 27 Each of the 10 Insuring Agreements Contains Both a Separate Per Claim Limit and a Separate Per Claim Deductible Cyber policies are ALSO written with an Annual Aggregate Limit for claims covered by ALL insuring agreements that have been purchased This approach has several effects: 1. Insured must make multiple DECISIONS 2. The true extent of coverage is CONSTRICTED 3. It adds overall COMPLEXITY to the buying process Limits and Deductibles: Distinctive Features, Special Challenges
28 28 Selecting Limits and Deductibles: No Easy Answers The application process sheds light on the nature of the insured s exposure Expert broker advice is essential Expert brokers can use other clients with similar: 1. business type 2. # of electronic records 3. size (sales, # of customers, # of transactions) 4. location 5. other factors, to make recommendations Insured s cash position a key to deductible/retention choices
29 Brief Interlude: A Word about Technology E&O Insurance Technology E&O and Cyber & Privacy Insurance are similar but NOT synonymous Technology E&O = Cyber & Privacy Insurance + (the 3 core insuring agreements + some/all of the other 7) Miscellaneous E&O Insurance (coverage for errors & and omissions in delivering Technology PRODUCTS and SERVICES)
30 IRMI buys Cyber & Privacy Insurance because IRMI uses technology to deliver products. We don t sell technology PRODUCTS or SERVICES. Rather, we use technology to deliver products and services. In contrast Cyber & Privacy vs. Technology E&O The company that stores IRMI s data on an off-site basis buys Technology E&O because it is providing IRMI with technology products and services (i.e., data storage) Coverage Cyber & Privacy Insurance Technology E&O Insurance Buyer Users of Technology Sellers of Technology
31 Part II: Selling Cyber & Privacy Insurance Tips for Risk Managers, Agents/Brokers, Insurers The penetration rate for cyber & privacy insurance is still relatively low. In fact, according to an estimate by Marsh, the coverage is purchased by only 25 to 35 percent of all companies (see "Making Sense of Cyber Insurance," PropertyCasualty360.com, January 13, 2014). Here s how to change that
32 Risk Managers It s Not Just Your Employer s Survival That s on the Line It s Yours! If your company s systems are breached, and you haven t at least obtained a quotation for cyber & privacy coverage, don t let the door hit you on the way out. Sell the Nonindemnification Aspects of the Coverage to Sr. Management Reimbursement from an insurer is only half the story (or maybe even less) No Matter How Much Opposition: Undergo the Application Process Even if the deciders reject the opportunity to buy coverage at least YOU will be covered!
33 The Value of an Insurance Company Partner when Managing Specialized Claims Companies Covered by a D&O Policy paid an average of $129,625 per claim Companies Not Covered by a D&O Policy paid an average of $408,469 per claim Source: Chubb Insurance Co (Private Company D&O Survey) Defending a D&O claim is NOT a do-it-yourself project! Nor is the process of managing a data breach!
34 Benefits of the Application Process Compels a business to comprehensively (and honestly) assess its risks and vulnerabilities Assists in quantifying potential losses (which will help in selecting limits!) because apps ask about: # s of customer records, sales volumes, locations, etc. Focuses senior management s attention on the importance of cybersecurity. Remember: a Sr. Executive must SIGN the application! Increases support for having an independent audit without which a business will never receive an objective assessment of its cybersecurity program
35 Trust, but verify (Russian Proverb): The Need for Cyber Audits Insurers don t generally require them as a condition of providing coverage but they do encourage them Insurers will be happy to recommend providers yet another benefit of the application process assuring that you will receive a competent evaluation BUT audits are not submitted with coverage applications, to avoid the findings of the audit being discoverable in the event of a loss Expect internal resistance to an audit from your company s IT department, but this is one battle a risk manager should be able to win If there is a weakness or problem in your company s protection systems, better to find out during an audit than after a data breach!
36 Agents & Brokers Consider the E&O Possibilities: YOURS! You will be sued if a client suffers an otherwise insurable breach-related loss Sell the Nonindemnification Aspects of the Coverage Reimbursement from an insurer is only half the story (or maybe even less) View It as a Chance To Stand Out from the Crowd True expertise in cyber & privacy coverages is at a premium now
37 Insurers Sell Cyber & Privacy Insurance as a Management Liability Cover View cyber as the 4 th component of the management liability insurance trio (along with D&O, EPL, and fiduciary). A breach often comes back to D s & O s as a derivative claim. Yet, insurers websites treat cyber & privacy insurance as either: (a) a professional/e&o coverage OR (2) as a separate, stand-alone product
38 Kevin LaCroix on Cyber & Privacy Risks to D s & O s These two lawsuits (against Target and Wyndham Hotels) highlight the fact that the risks and exposures companies face in connection with cybersecurity issues include potential liability exposures for companies corporate boards. (emphasis added) Source: What to Watch in the World of D&O, Fall 2014; Vol. IX, Issue Three Fall 2014; RT ProExec InSights
39 Standardize Your Policies They Won t Buy What They Don t Understand! The lack of uniformity in both coverage and terminology between the various insurers policies is a substantial barrier to greater levels of market penetration. If buyers struggle to understand cyber & privacy insurance policies, they won t buy them. Product differentiation is a good thing, but in my opinion, too much differentiation has hampered market penetration. Start by combining the 3 Core Coverages under ONE INSURING AGREEMENT.
40 Lose the Bunker Mentality (At Some Point) Reduce the Number of Insuring Agreement Specific Limits and Deductibles Imposing (a) a per loss limit for each insuring agreement, (b) a per loss deductible, and (c) an aggregate limit for all insuring agreements is really shrinking the extent of actual coverage being provided. Consider offering either a single, aggregate limit for all of the insuring agreements being purchased OR a per loss limit for each insuring agreement but NOT both.
41 Part III: Materials for Further Study: Becoming a Cyber & Privacy Insurance Expert (5 Great IRMI Resources) A Journey of 1,000 Miles Begins With a Single Step Lao-tzu Chinese philosopher ( BC) The Way of Lao-Tzu
42 IRMI s Online CE Course on Cyber & Privacy Exposures and Insurance Coverage An in-depth, yet easy-to-follow 14-chapter course Includes frequent examples and numerous review questions Delivered online through a user-friendly online interface Study the course material at your own pace Take the multiple choice final exam when you're ready You can take the IRMI Cyber & Privacy Exposures and Insurance Coverage course at any time, from any computer with access to the Internet.
43 Professional Liability Insurance (PLI) IRMI s 3,500 page reference manual dealing with all types of Professional (medical and nonmedical), EPL, E&O, and D&O liability exposures and insurance coverages. Contains detailed (150+ pages) discussions of Cyber & Privacy and Technology E&O Insurance Coverages and Exposures IRMI Online Cyber and Privacy Loss Exposures Cyber and Privacy Liability Insurance Coverage Technology Errors and Omissions Liability Exposures Technology Errors and Omissions Liability Insurance Coverage ReferenceConnect Cyber and Privacy Loss Exposures Cyber and Privacy Liability Insurance Coverage Technology Errors and Omissions Liability Exposures Technology Errors and Omissions Liability Insurance Coverage
44 The Betterley Report An authoritative series of Market Survey Reports providing concise market insight and detailed policy comparisons for 6 specialty lines of coverage. Each report is pages. Cyber & Privacy Insurance and Technology E&O Insurance are among the 6 lines covered. IRMI Online Cyber/Privacy Insurance Market Survey 2014 Technology Errors & Omissions Market Survey 2014 ReferenceConnect Cyber/Privacy Insurance Market Survey 2014 Technology Errors & Omissions Market Survey 2014
45 The Risk Report The Risk Report is a monthly, in-depth (8 to 12 pages) report on an important aspect of commercial insurance/risk management. Recent cyber & privacy insurance articles include: IRMI Online Top 10 Tips for Insuring Cyber Risks (12/13) Cyber Endorsements for Traditional Insurance Policies (05/13) Cyber, Tech, Media, and Privacy E&O Insurance (01/12) Digital Risk Management (11/11) ReferenceConnect Top 10 Tips for Insuring Cyber Risks (12/13) Cyber Endorsements for Traditional Insurance Policies (05/13) Cyber, Tech, Media, and Privacy E&O Insurance (01/12) Digital Risk Management (11/11)
46 IRMI.com: This Is Free! Contains 1,600+ FREE articles in the Expert Commentary section, on various insurance and risk management topics, including 50 articles on Privacy/Cyber/Technology E&O Topics. Most recently: Changes in State Breach Notification Laws (08/14) Guidance for Managing Cybersecurity Risks (5/14) Revisiting Privacy Policies in Light of California Law (10/13) Yawning in the Face of Privacy Risks (05/12) Hacking, Malware, and Social Engineering Definitions of and Statistics about Cyber Threats Contributing to Breaches (01/12)
47 Please Feel Free To Contact Me Bob Bregman (972)
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
Joe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
ISO? ISO? ISO? LTD ISO?
Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet
CYBER & PRIVACY LIABILITY INSURANCE GUIDE
CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
Understanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 [email protected] Disclaimer The views expressed
Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President [email protected] 2 What s at Risk? $300 billion in
Cyber Liability Insurance: It May Surprise You
Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,
CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America
CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
Insuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited
Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial
THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill
THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
How To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE
Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
Insurance basics for nonprofit organizations
Insurance basics for nonprofit organizations Updated: July 2012 This document is intended as general and abbreviated guidance for nonprofit organizations. Because every organization s insurance needs are
Cyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
Insurance implications for Cyber Threats
Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of
cyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
(1) Commercial Crime Insurance or Employee Fidelity Bond
INSURANCE (A) GENERAL CONSIDERATIONS This document presents the minimum insurance requirements as set forth by the United States Trustee Program (USTP). A standing trustee must purchase property insurance
Cyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029
Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a
Cyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
NZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage?
What is Technology, Media and Professional Services (TMPS) Coverage? TMPS is written to: Protect the company from errors and omissions that occur in the company's rendering or failure to render professional
Managing Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Managing Cyber & Privacy Risks
Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past
Understanding the Cyber Risk Insurance and Remediation Services Marketplace:
Understanding the Cyber Risk Insurance and Remediation Services Marketplace: A Report on the Experiences and Opinions of Middle Market CFOs September 2010 Betterley Risk Research Insight for the Insurance
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?
Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations
NonProfit 101. Notes: Session 1B: Insurance, What you do not know can hurt you! From Survivability to Sustainability. June 10, 2015 Session 1B page 1
Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 1 Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 2 June 10,
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
What would you do if your agency had a data breach?
What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the
Cyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
Enterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
GALLAGHER CYBER LIABILITY PRACTICE. Cyber Risk Exposures and Solutions
GALLAGHER CYBER LIABILITY PRACTICE Cyber Risk Exposures and Solutions Cyber Risk Exposures and Solutions Arthur J. Gallagher & Co. s Cyber Liability Practice has the expertise and the desire to deliver
Cyber Risk Insurance for Agents. Frequently Asked Questions
Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship
CYBER/ NETWORK SECURITY
CYBER/ NETWORK SECURITY FINEX AUSTRALIA ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
Cyber Insurance as one element of the Cyber risk management strategy
Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,
TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2016:
February 2016 TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2016: A Growing Line with Significant Rate Competition Cybersecurity Providers Will Be Challenged Richard S. Betterley, CMC President Betterley
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
Privacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS
PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,
Cyberinsurance: Insuring for Data Breach Risk
View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL
How To Insure An Investment Advisor
SPOTLIGHT ON Insurance and Bonding Considerations for Registered Investment Advisors The contents of this Spotlight have been prepared for informational purposes only, and should not be construed as legal
DATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
Cyber Liability. What School Districts Need to Know
Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have
Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance
Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance
Cyber/Information Security Insurance. Pros / Cons and Facts to Consider
1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner
CYBER SECURITY SPECIALREPORT
CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber
Zurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
Understanding Professional Liability Insurance
Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional
2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage
2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and
Data Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
Privacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
ACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
Cyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
Business Insurance. AKD Consultants Adam Dworkin CPA 188 Whiting Street Suite 10 Hingham, MA 02043 781-556-5554 Adam@AKDConsultants.
AKD Consultants Adam Dworkin CPA 188 Whiting Street Suite 10 Hingham, MA 02043 781-556-5554 [email protected] Business Insurance Page 1 of 6, see disclaimer on final page Business Insurance What
DATA BREACH, NETWORK SECURITY, CYBER LIABILITY, PRIVACY PROTECTION: ARE YOU INSURED?
DATA BREACH, NETWORK SECURITY, CYBER LIABILITY, PRIVACY PROTECTION: ARE YOU INSURED? February 3, 2012 Steve Brown, Agency Manager West Virginia Medical Insurance Agency How many in the audience today will
Application for NetProtect 360 Information Risk Insurance (for General Industry)
Application for NetProtect 360 Information Risk Insurance (for General Industry) THIS APPLICATION IS NEITHER AN OFFERING NOR A BINDER OF COVERAGE. ALSO, YOUR COMPLETION OF THIS APPLICATION DOES NOT OBLIGATE
