Coverage Made Simple(r)

Size: px
Start display at page:

Download "Coverage Made Simple(r)"

Transcription

1 Cyber & Privacy Insurance Coverage Made Simple(r) Bob Bregman, CPCU, MLIS, RPLU Senior Research Analyst International Risk Management Institute, Inc.

2 The Policies Are Both COMPLEX and DIFFER from Insurer to Insurer! In fact, they are so different that insurers use different names for what are essentially (but not exactly!) the same type of coverage: Information Security & Privacy Insurance (Beazley) CyberEdge (Chartis) CyberRisk (Travelers) Security and Privacy Protection (Zurich) CyberSecurity (Chubb) PrivaSure (AXIS Pro) Enterprise Professional Solutions (CNA) ClickStream 2.0 (Euclid Managers) after which, I stopped counting

3 Today s Road Map Part I: The 10 Basic Cyber & Privacy Policy Insuring Agreements Brief Interlude: A Word about Technology E&O Insurance Part II: Selling Cyber & Privacy Coverage: Tips for Risk Managers, Insurance Agents/Brokers, and Underwriters Part III: Materials for Further Study: Becoming a Cyber & Privacy Insurance Coverage Expert

4 Part I: The 10 Basic Insuring Agreements Cyber & Privacy Liability Coverages: the Core Coverages Privacy Notification and Crisis Management Expense Regulatory Defense and Penalties Information Security & Privacy Liability Website Media Liability Cyber-Related Time Element Coverages Business Interruption Extra Expense Cyber-Related Theft of Property Coverages Data Assets Cyber Extortion Computer Fraud Funds Transfer

5 Information Security and Privacy Liability Coverage Covers the pure liability component of the loss including the cost of defending the claims Regulatory Defense and Penalties Coverage Covers the cost of dealing with regulators and paying applicable fines/penalties; another loss component unique to data breaches. Regulatory Defense and Penalties Coverage Covers the cost of dealing with the regulators and paying applicable fines/penalties; another component of loss that is unique to data breaches Privacy Notification and Crisis Management Expense Coverage Covers the costs of services that are unique to a data breach. This is the loss containment component of cyber & privacy liability coverage Conceptualizing the 3 Core Cyber & Privacy Coverages

6 A Loss Scenario Involving the 3 Core Cyber & Privacy Liability Coverages A hacker gains access to a retailer s computer system and obtains Names, Addresses, Social Security #s, and Driver s License #s of 100,000 customers, all of which constitute PII or personally identifiable information. A class action lawsuit is eventually brought by 5,000 of the customers against the retailer.

7 Privacy Notification and Crisis Management Expense: Loss Containment Coverage Covers the direct expenses required to: Hire a forensics expert to determine the cause of the breach and suggest measures to secure the site and prevent future breaches Hire a PR agency to assist the insured in dealing with the crisis Set up a post-breach call center Notify individuals whose PII has been compromised Monitor these individuals credit (usually for 1 year) Pay costs needed to restore stolen identity (e.g., costs to notify banks and credit card companies)

8 Privacy Notification and Crisis Management Expense Coverage: Key Points Some insurers SPLIT: (1) Notification, (2) PR, and (3) Forensics into separate insuring agreements! This coverage affords the insured access to the insurer s cadre of experts who can provide the hands-on expertise to work an insured through a data breach. (Rick Betterley calls this breach coaching. ) Immediately after a data breach, an insured will benefit immensely by having an insurance company partner. If a business is able to purchase just ONE of the 10 Insuring Agreements this is the one to buy. It is the core of the 3 core coverages.

9 Regulatory Defense and Penalties Coverage: Regulatory Headache Coverage Covers the costs of dealing with regulatory agencies who oversee state and federal data breach laws and regulations: Costs of hiring attorneys to deal with regulators during investigations. Costs of fines and penalties that are levied against the insured as a result of the breach Regulatory defense means that only the legal costs of dealing with regulators not claimants are covered by this insuring agreement

10 Regulatory Defense and Penalties Coverage: Key Points One of the rare types of insurance policies that pays fines and penalties; items otherwise considered uninsurable under most coverages. BUT: some insurers DO NOT COVER fines and penalties. Others cover these items BY ENDORSEMENT. Especially valuable when dealing with regulators in multiple states. The laws are varied, complex, and downright byzantine (one of my favorite words!). Anyone who works in the D&O arena knows how expensive it is to respond to regulatory investigations. Navigating the post-breach regulatory maze requires the kind of specialized legal expertise to which most insureds do not have ready access even if an insured has the funds to hire experienced counsel.

11 Information Security and Privacy Liability: Traditional Liability Coverage Covers the insured s liability for damages resulting from a data breach, arising from: Loss, theft, or unauthorized disclosure of PII in the insured s care, custody & control Damage to data stored in insured s computer systems belonging to a 3rd party Transmission of malicious code or denial of service to a 3rd party s computer system Failure to timely disclose a data breach Failure of insured to comply with own privacy policy prohibiting disclosure/sharing of PII Failure to administer an identity theft program required by governmental regulation or to take necessary actions to prevent identity theft Defense costs associated with all of the above items

12 Information Security and Privacy Liability Coverage: Key Points This is the true liability coverage element of a cyber & privacy policy Pays actual liability losses sustained by various claimants (UNLIKE the first two insuring agreements) Contrast with Privacy Notification and Crisis Management Coverage, which pays without admission of liability (like medical payments coverage under a homeowners or personal auto policy) Pays actual defense costs required to defend claims alleging loss by claimants (but NOT legal costs required to deal with regulators)

13 Where It Gets Even Trickier Some insurers combine 2 of these core coverages into a single insuring agreement with a single limit (e.g., Regulatory Defense + Information Security and Privacy Notification). Some insurers offer privacy notification and crisis management expenses as separate insuring agreements (with separate limits): THIS IS NOT GOOD. Several insurers provide liability coverage only when there is a THEFT of data (i.e., a Target-type data breach) but NOT when there is merely an INTRUSION without theft, as in the case of WEBSITE VANDALISM. And of course, insurers often refer to the 3 core insuring agreements by different names. (e.g., one insurer uses the term Information Security and Privacy Liability and another calls it Network and Information Security Liability.

14 Website Media Content Liability Coverage Covers insured s liability for material published on its website (only) for claims alleging: Personal Injury: (e.g., invasion of privacy, libel, slander, defamation) Claim Scenario: a health insurance company posts pictures of its subscribers w/o obtaining permission, violating their privacy Commercial Violations: (e.g., plagiarism, infringement of: copyright, trademark, logo) Claim Scenarios: an online publisher publishes an article that does not attribute material appearing in the article, from its original, actual source; an online retailer introduces its new logo that is very similar to that of another company Other Improper Web-Based Acts: (e.g., improper deep linking) Claim Scenario: a publishing firm publishes model HR policies and procedures, including links to an HR consulting firm. The consulting firm sues, alleging that the links enhance the publisher s website BUT WITHOUT BENEFIT TO the consulting firm

15 Website Media Content Liability Coverage: Key Points Covers Losses NOT caused by data breaches/intrusions why I don t consider it one of the 3 core coverages Much like a traditional, stand-alone media liability policy, but with one big difference: it ONLY covers media-type liability incurred from website activities Provides no coverage for non-website-based media activities (e.g., paper publishing, broadcast media) Many cyber insurers do not offer such coverage because it is available under traditional, stand-alone media policies Best solution: buy a comprehensive media liability policy that includes liability incurred for website activity, under a traditional (i.e., ALL media forms) media policy

16 Cyber-Related Time Element Loss Coverages: Business Interruption and Extra Expense Business Interruption (BI): covers losses incurred during the period of recovery resulting from a computer system disruption 3 Types of Covered Losses and Loss Scenarios Income Loss (e.g., income lost when an insured cannot take online orders for its products) Dependent Business Interruption (e.g., loss sustained when an insured retailer s wholesale supplier is unable to receive orders because the wholesaler s website is shut down and can t ship products to the retailer) Extended Business Interruption (e.g., even after restoration following a shut down, it will require some period of time for the volume of business to return to normal covers loss sustained until business returns to normal )

17 Extra Expense Coverage Extra Expense (EE): covers additional costs required to expedite recovery, such as: overtime labor, express parts shipping, hiring special experts Under some policies, EE coverage applies only if the extra expense reduces the loss Both BI and EE Coverage are triggered ONLY by an electronic disruption (as defined by the policy), but NOT by other types of physical damage such as: fire, windstorm, flood, etc., as under standard property insurance policies Both BI and EE coverages are usually (but not always) subject to a time deductible (rather than a dollar deductible) before coverage applies Standard property insurance won t cover data breach-related BI or EE loss because the policies require physical damage to trigger a covered loss

18 Complications, Caveats, and a Recommendation Many insurers do not offer cyber-related property coverage because, philosophically, they view cyber & privacy insurance as a liability coverage ONLY. Others offer it but by endorsement not within their standard form. Under some forms, a covered computer system disruption MUST be a data breach; under others, this is not required (e.g., can be introduction of a virus). Some insurers bundle BI and EE under a single insuring agreement; others separate them; still others offer BI but not EE. Some insurers do not offer Dependent BI coverage OR Extended BI coverage within their BI coverage wording. If insured has purchased BI coverage, insurer has added incentive to handle the privacy notification and crisis management aspects of a data breach MORE EXPEDITIOUSLY! So consider buying BI coverage for that reason.

19 Cyber-Related Theft of Property Coverages Data Asset Coverage Cyber Extortion Computer Fraud Funds Transfer Fraud IRMI.com

20 Data Asset Coverage Covers the cost of restoring and recovering the data lost from the failure of an insured s computer system Loss Scenarios: (a) A hacker gains access to an insured s customer database and erases it from the company s computer system. (b) An employee accidentally erases the company s customer database. In both instances, this insuring agreement pays the cost of restoring the customer database.

21 Restrictions: Data Asset Coverage (continued) Coverage usually does not apply when loss of data assets caused by intentional employee acts No coverage for upgrading software or other programs during restoration process No coverage for the cost of research to recover lost data (only coverage for electronic recovery methods) Insurer must (usually) pre-approve costs for all expenditures Some policies only provide coverage for loss caused by a data breach (but not from other causes, such as accidental erasure)

22 K&R Coverage for Cyber Events (AKA E-Commerce Extortion ) Cyber Extortion Coverage Loss Scenario: insured receives an from an individual who threatens to: shut down/damage/introduce a virus into/disclose confidential information from/block access to/attack the company s website in some other way UNLESS the insured pays $10 million. What s Covered: (1) Monies paid to meet the extortion demands (2) Monies paid to computer security experts on how to prevent future extortion attempts (3) Cost of expert assistance to deal/negotiate with cyber extortionists (perhaps more important than #1 and #2)

23 Computer Fraud Coverage Covers loss from fraudulent, unauthorized entry into a computer system resulting in a theft of money or data. Loss Scenario: a cyber thief accesses a bank customer s savings account number and password, then uses this data to withdraw $25,000 from various ATMs. Key Points: NO COVERAGE for: (1) employee acts (it s NOT a fidelity cover), (2) independent contractor acts, or (3) acts of persons under insured s supervision. In effect, insurers won t cover inside jobs.

24 Funds Transfer Fraud Coverage Covers loss sustained when funds are fraudulently transferred from one financial institution to another Loss Scenario: stock brokerage firm receives appearing to be from a U.S. bank (but is not). The broker s employee opens the , which activates a virus, allowing the thief to access the brokerage account number and password, which she uses to transfer funds to her bank in Eastern Europe. ( Girl With the Dragon Tattoo, by Stieg Larsson) Funds Transfer Fraud vs. Computer Fraud: the previous scenario (i.e., the computer fraud ) did not involve the transfer of monies between financial institutions, whereas funds transfer fraud does.

25 IRMI.com Cyber-Related Theft of Property Coverages: A Wrap-Up A substantial minority of insurers DO NOT offer such coverages They philosophically view Cyber & Privacy Insurance as DATA BREACHdriven, producing third-party liability loss, rather than first-party property loss BUT a number of these losses can be covered elsewhere (K&R policies, crime policies) so insurers seek to avoid duplicating coverage in cyber forms Many insurers seek to avoid such losses because they are often fidelitylinked and don t want to provide such coverage I:\Temporary\MichelleS

26 A Last Look at the 10 Insuring Agreements Cyber & Privacy Liability Coverages: the Core Coverages Privacy Notification and Crisis Management Expense Regulatory Defense and Penalties Information Security & Privacy Liability Website Media Liability Cyber-Related Time Element Coverages Business Interruption Extra Expense Cyber-Related Theft of Property Coverages Data Assets Cyber Extortion Computer Fraud Funds Transfer

27 27 Each of the 10 Insuring Agreements Contains Both a Separate Per Claim Limit and a Separate Per Claim Deductible Cyber policies are ALSO written with an Annual Aggregate Limit for claims covered by ALL insuring agreements that have been purchased This approach has several effects: 1. Insured must make multiple DECISIONS 2. The true extent of coverage is CONSTRICTED 3. It adds overall COMPLEXITY to the buying process Limits and Deductibles: Distinctive Features, Special Challenges

28 28 Selecting Limits and Deductibles: No Easy Answers The application process sheds light on the nature of the insured s exposure Expert broker advice is essential Expert brokers can use other clients with similar: 1. business type 2. # of electronic records 3. size (sales, # of customers, # of transactions) 4. location 5. other factors, to make recommendations Insured s cash position a key to deductible/retention choices

29 Brief Interlude: A Word about Technology E&O Insurance Technology E&O and Cyber & Privacy Insurance are similar but NOT synonymous Technology E&O = Cyber & Privacy Insurance + (the 3 core insuring agreements + some/all of the other 7) Miscellaneous E&O Insurance (coverage for errors & and omissions in delivering Technology PRODUCTS and SERVICES)

30 IRMI buys Cyber & Privacy Insurance because IRMI uses technology to deliver products. We don t sell technology PRODUCTS or SERVICES. Rather, we use technology to deliver products and services. In contrast Cyber & Privacy vs. Technology E&O The company that stores IRMI s data on an off-site basis buys Technology E&O because it is providing IRMI with technology products and services (i.e., data storage) Coverage Cyber & Privacy Insurance Technology E&O Insurance Buyer Users of Technology Sellers of Technology

31 Part II: Selling Cyber & Privacy Insurance Tips for Risk Managers, Agents/Brokers, Insurers The penetration rate for cyber & privacy insurance is still relatively low. In fact, according to an estimate by Marsh, the coverage is purchased by only 25 to 35 percent of all companies (see "Making Sense of Cyber Insurance," PropertyCasualty360.com, January 13, 2014). Here s how to change that

32 Risk Managers It s Not Just Your Employer s Survival That s on the Line It s Yours! If your company s systems are breached, and you haven t at least obtained a quotation for cyber & privacy coverage, don t let the door hit you on the way out. Sell the Nonindemnification Aspects of the Coverage to Sr. Management Reimbursement from an insurer is only half the story (or maybe even less) No Matter How Much Opposition: Undergo the Application Process Even if the deciders reject the opportunity to buy coverage at least YOU will be covered!

33 The Value of an Insurance Company Partner when Managing Specialized Claims Companies Covered by a D&O Policy paid an average of $129,625 per claim Companies Not Covered by a D&O Policy paid an average of $408,469 per claim Source: Chubb Insurance Co (Private Company D&O Survey) Defending a D&O claim is NOT a do-it-yourself project! Nor is the process of managing a data breach!

34 Benefits of the Application Process Compels a business to comprehensively (and honestly) assess its risks and vulnerabilities Assists in quantifying potential losses (which will help in selecting limits!) because apps ask about: # s of customer records, sales volumes, locations, etc. Focuses senior management s attention on the importance of cybersecurity. Remember: a Sr. Executive must SIGN the application! Increases support for having an independent audit without which a business will never receive an objective assessment of its cybersecurity program

35 Trust, but verify (Russian Proverb): The Need for Cyber Audits Insurers don t generally require them as a condition of providing coverage but they do encourage them Insurers will be happy to recommend providers yet another benefit of the application process assuring that you will receive a competent evaluation BUT audits are not submitted with coverage applications, to avoid the findings of the audit being discoverable in the event of a loss Expect internal resistance to an audit from your company s IT department, but this is one battle a risk manager should be able to win If there is a weakness or problem in your company s protection systems, better to find out during an audit than after a data breach!

36 Agents & Brokers Consider the E&O Possibilities: YOURS! You will be sued if a client suffers an otherwise insurable breach-related loss Sell the Nonindemnification Aspects of the Coverage Reimbursement from an insurer is only half the story (or maybe even less) View It as a Chance To Stand Out from the Crowd True expertise in cyber & privacy coverages is at a premium now

37 Insurers Sell Cyber & Privacy Insurance as a Management Liability Cover View cyber as the 4 th component of the management liability insurance trio (along with D&O, EPL, and fiduciary). A breach often comes back to D s & O s as a derivative claim. Yet, insurers websites treat cyber & privacy insurance as either: (a) a professional/e&o coverage OR (2) as a separate, stand-alone product

38 Kevin LaCroix on Cyber & Privacy Risks to D s & O s These two lawsuits (against Target and Wyndham Hotels) highlight the fact that the risks and exposures companies face in connection with cybersecurity issues include potential liability exposures for companies corporate boards. (emphasis added) Source: What to Watch in the World of D&O, Fall 2014; Vol. IX, Issue Three Fall 2014; RT ProExec InSights

39 Standardize Your Policies They Won t Buy What They Don t Understand! The lack of uniformity in both coverage and terminology between the various insurers policies is a substantial barrier to greater levels of market penetration. If buyers struggle to understand cyber & privacy insurance policies, they won t buy them. Product differentiation is a good thing, but in my opinion, too much differentiation has hampered market penetration. Start by combining the 3 Core Coverages under ONE INSURING AGREEMENT.

40 Lose the Bunker Mentality (At Some Point) Reduce the Number of Insuring Agreement Specific Limits and Deductibles Imposing (a) a per loss limit for each insuring agreement, (b) a per loss deductible, and (c) an aggregate limit for all insuring agreements is really shrinking the extent of actual coverage being provided. Consider offering either a single, aggregate limit for all of the insuring agreements being purchased OR a per loss limit for each insuring agreement but NOT both.

41 Part III: Materials for Further Study: Becoming a Cyber & Privacy Insurance Expert (5 Great IRMI Resources) A Journey of 1,000 Miles Begins With a Single Step Lao-tzu Chinese philosopher ( BC) The Way of Lao-Tzu

42 IRMI s Online CE Course on Cyber & Privacy Exposures and Insurance Coverage An in-depth, yet easy-to-follow 14-chapter course Includes frequent examples and numerous review questions Delivered online through a user-friendly online interface Study the course material at your own pace Take the multiple choice final exam when you're ready You can take the IRMI Cyber & Privacy Exposures and Insurance Coverage course at any time, from any computer with access to the Internet.

43 Professional Liability Insurance (PLI) IRMI s 3,500 page reference manual dealing with all types of Professional (medical and nonmedical), EPL, E&O, and D&O liability exposures and insurance coverages. Contains detailed (150+ pages) discussions of Cyber & Privacy and Technology E&O Insurance Coverages and Exposures IRMI Online Cyber and Privacy Loss Exposures Cyber and Privacy Liability Insurance Coverage Technology Errors and Omissions Liability Exposures Technology Errors and Omissions Liability Insurance Coverage ReferenceConnect Cyber and Privacy Loss Exposures Cyber and Privacy Liability Insurance Coverage Technology Errors and Omissions Liability Exposures Technology Errors and Omissions Liability Insurance Coverage

44 The Betterley Report An authoritative series of Market Survey Reports providing concise market insight and detailed policy comparisons for 6 specialty lines of coverage. Each report is pages. Cyber & Privacy Insurance and Technology E&O Insurance are among the 6 lines covered. IRMI Online Cyber/Privacy Insurance Market Survey 2014 Technology Errors & Omissions Market Survey 2014 ReferenceConnect Cyber/Privacy Insurance Market Survey 2014 Technology Errors & Omissions Market Survey 2014

45 The Risk Report The Risk Report is a monthly, in-depth (8 to 12 pages) report on an important aspect of commercial insurance/risk management. Recent cyber & privacy insurance articles include: IRMI Online Top 10 Tips for Insuring Cyber Risks (12/13) Cyber Endorsements for Traditional Insurance Policies (05/13) Cyber, Tech, Media, and Privacy E&O Insurance (01/12) Digital Risk Management (11/11) ReferenceConnect Top 10 Tips for Insuring Cyber Risks (12/13) Cyber Endorsements for Traditional Insurance Policies (05/13) Cyber, Tech, Media, and Privacy E&O Insurance (01/12) Digital Risk Management (11/11)

46 IRMI.com: This Is Free! Contains 1,600+ FREE articles in the Expert Commentary section, on various insurance and risk management topics, including 50 articles on Privacy/Cyber/Technology E&O Topics. Most recently: Changes in State Breach Notification Laws (08/14) Guidance for Managing Cybersecurity Risks (5/14) Revisiting Privacy Policies in Light of California Law (10/13) Yawning in the Face of Privacy Risks (05/12) Hacking, Malware, and Social Engineering Definitions of and Statistics about Cyber Threats Contributing to Breaches (01/12)

47 Please Feel Free To Contact Me Bob Bregman (972)

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach

More information

Understanding the Business Risk

Understanding the Business Risk AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 [email protected] Disclaimer The views expressed

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President [email protected] 2 What s at Risk? $300 billion in

More information

Cyber Liability Insurance: It May Surprise You

Cyber Liability Insurance: It May Surprise You Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,

More information

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification

More information

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson

More information

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insuring Innovation. CyberFirst Coverage for Technology Companies Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is

More information

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited

Tools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial

More information

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill

THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

How To Cover A Data Breach In The European Market

How To Cover A Data Breach In The European Market SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to

More information

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE

Airmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Insurance basics for nonprofit organizations

Insurance basics for nonprofit organizations Insurance basics for nonprofit organizations Updated: July 2012 This document is intended as general and abbreviated guidance for nonprofit organizations. Because every organization s insurance needs are

More information

Cyber Threats: Exposures and Breach Costs

Cyber Threats: Exposures and Breach Costs Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals

More information

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

Insurance implications for Cyber Threats

Insurance implications for Cyber Threats Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

(1) Commercial Crime Insurance or Employee Fidelity Bond

(1) Commercial Crime Insurance or Employee Fidelity Bond INSURANCE (A) GENERAL CONSIDERATIONS This document presents the minimum insurance requirements as set forth by the United States Trustee Program (USTP). A standing trustee must purchase property insurance

More information

Cyber-Crime Protection

Cyber-Crime Protection Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living

More information

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

NZI LIABILITY CYBER. Are you protected?

NZI LIABILITY CYBER. Are you protected? NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is

More information

What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage?

What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage? What is Technology, Media and Professional Services (TMPS) Coverage? TMPS is written to: Protect the company from errors and omissions that occur in the company's rendering or failure to render professional

More information

Managing Cyber Risk through Insurance

Managing Cyber Risk through Insurance Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes

More information

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in

More information

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

Understanding the Cyber Risk Insurance and Remediation Services Marketplace:

Understanding the Cyber Risk Insurance and Remediation Services Marketplace: Understanding the Cyber Risk Insurance and Remediation Services Marketplace: A Report on the Experiences and Opinions of Middle Market CFOs September 2010 Betterley Risk Research Insight for the Insurance

More information

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations

More information

NonProfit 101. Notes: Session 1B: Insurance, What you do not know can hurt you! From Survivability to Sustainability. June 10, 2015 Session 1B page 1

NonProfit 101. Notes: Session 1B: Insurance, What you do not know can hurt you! From Survivability to Sustainability. June 10, 2015 Session 1B page 1 Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 1 Session 1B: Insurance, What you do not know can hurt you! Notes: June 10, 2015 Session 1B page 2 June 10,

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING

More information

What would you do if your agency had a data breach?

What would you do if your agency had a data breach? What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

Enterprise PrivaProtector 9.0

Enterprise PrivaProtector 9.0 IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS

More information

GALLAGHER CYBER LIABILITY PRACTICE. Cyber Risk Exposures and Solutions

GALLAGHER CYBER LIABILITY PRACTICE. Cyber Risk Exposures and Solutions GALLAGHER CYBER LIABILITY PRACTICE Cyber Risk Exposures and Solutions Cyber Risk Exposures and Solutions Arthur J. Gallagher & Co. s Cyber Liability Practice has the expertise and the desire to deliver

More information

Cyber Risk Insurance for Agents. Frequently Asked Questions

Cyber Risk Insurance for Agents. Frequently Asked Questions Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship

More information

CYBER/ NETWORK SECURITY

CYBER/ NETWORK SECURITY CYBER/ NETWORK SECURITY FINEX AUSTRALIA ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Cyber Insurance as one element of the Cyber risk management strategy

Cyber Insurance as one element of the Cyber risk management strategy Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,

More information

TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2016:

TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2016: February 2016 TECHNOLOGY ERRORS & OMISSIONS MARKET SURVEY 2016: A Growing Line with Significant Rate Competition Cybersecurity Providers Will Be Challenged Richard S. Betterley, CMC President Betterley

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,

More information

Cyberinsurance: Insuring for Data Breach Risk

Cyberinsurance: Insuring for Data Breach Risk View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL

More information

How To Insure An Investment Advisor

How To Insure An Investment Advisor SPOTLIGHT ON Insurance and Bonding Considerations for Registered Investment Advisors The contents of this Spotlight have been prepared for informational purposes only, and should not be construed as legal

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

Cyber Liability. What School Districts Need to Know

Cyber Liability. What School Districts Need to Know Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have

More information

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance

More information

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider 1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner

More information

CYBER SECURITY SPECIALREPORT

CYBER SECURITY SPECIALREPORT CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber

More information

Zurich Security And Privacy Protection Policy Application

Zurich Security And Privacy Protection Policy Application Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

Understanding Professional Liability Insurance

Understanding Professional Liability Insurance Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional

More information

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage 2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

Privacy Rights Clearing House

Privacy Rights Clearing House 10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights

More information

ACE Advantage PRIVACY & NETWORK SECURITY

ACE Advantage PRIVACY & NETWORK SECURITY ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

Business Insurance. AKD Consultants Adam Dworkin CPA 188 Whiting Street Suite 10 Hingham, MA 02043 781-556-5554 Adam@AKDConsultants.

Business Insurance. AKD Consultants Adam Dworkin CPA 188 Whiting Street Suite 10 Hingham, MA 02043 781-556-5554 Adam@AKDConsultants. AKD Consultants Adam Dworkin CPA 188 Whiting Street Suite 10 Hingham, MA 02043 781-556-5554 [email protected] Business Insurance Page 1 of 6, see disclaimer on final page Business Insurance What

More information

DATA BREACH, NETWORK SECURITY, CYBER LIABILITY, PRIVACY PROTECTION: ARE YOU INSURED?

DATA BREACH, NETWORK SECURITY, CYBER LIABILITY, PRIVACY PROTECTION: ARE YOU INSURED? DATA BREACH, NETWORK SECURITY, CYBER LIABILITY, PRIVACY PROTECTION: ARE YOU INSURED? February 3, 2012 Steve Brown, Agency Manager West Virginia Medical Insurance Agency How many in the audience today will

More information

Application for NetProtect 360 Information Risk Insurance (for General Industry)

Application for NetProtect 360 Information Risk Insurance (for General Industry) Application for NetProtect 360 Information Risk Insurance (for General Industry) THIS APPLICATION IS NEITHER AN OFFERING NOR A BINDER OF COVERAGE. ALSO, YOUR COMPLETION OF THIS APPLICATION DOES NOT OBLIGATE

More information