September Sincerely, David Schwaner Agency Director, Coverys Insurance Services. In This Issue...

Size: px
Start display at page:

Download "September Sincerely, David Schwaner Agency Director, Coverys Insurance Services. In This Issue..."

Transcription

1 September 2014 Greetings! I hope this edition of CIS News finds you enjoying the beginning of the fall season. The Coverys Insurance Services staff always appreciates this time of year when we can support our clients at their community golf outings and events around the state. Our sponsorship and attendance at these events are a highlight for us and I want to thank you for including Coverys Insurance Services. The theme of this newsletter is Cyber Liability. We ve put together some useful information to educate you about the threats of data breaches and to also explain the many ways Coverys Insurance Services provides protection against these threats. If you weren t already aware, all Coverys policyholders automatically receive Regulatory Liability and Information Security and Privacy Coverage. This edition also includes a helpful article detailing the basic limits of coverage we provide to you as well as information on receiving additional limits, should your organization require those. If you have any questions about cyber liability, your current coverage, or would like more information on obtaining additional coverage, please do not hesitate to contact us! Sincerely, David Schwaner Agency Director, Coverys Insurance Services In This Issue... Cyber Liability and Data Breaches - A Growing Threat in Healthcare Getting To Know Coverys Regulatory Liability and Information Security and Privacy Coverage

2 CYBER LIABILITY AND DATA BREACHES - A GROWING THREAT IN HEALTHCARE By Richard J. Suhrheinrich and Kimberly M. Babcock, Kitch Drutchas Wagner Valitutti & Sherbrook The information age has brought about unparalleled threats to companies in the area of cyber attacks. A cyber attack also called a data breach occurs when sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual not authorized to do so. Such threats have become prominent in the news, with several well publicized attacks occurring to global companies and major retailers, such as Sony, Target and ebay. Since 2011, cyber attacks and data breaches are consistently included among the top global risks to watch for, according to the world s top business leaders, politicians and policy advisers assembled at the World Economic Forum (WEF). 1 The healthcare community is particularly vulnerable to cyber security threats. Hospitals, healthcare organizations and physician practices are faced with the daunting task of operating EMR and EMH systems and complex internal networks, while protecting highly sensitive patient data from inadvertent disclosure or theft. The increased use of technology, with telemedicine, laptops, tablets and mobile devices being used to store and transmit patient information, leads to more opportunities for data breaches to occur. The Identity Theft Resource Center, a non-profit organization that tracks data theft, found the healthcare sector experienced the highest number of cyber attacks in 2013, overtaking the business sector for the top spot. The healthcare sector suffered 267 breaches in 2013, constituting 43 percent of all cyber attacks that year. 2 Interestingly, most of these breaches are not due to a malicious attack from a third party according to a 2013 global study conducted by the Ponemon Institute, human errors and system glitches caused approximately two-thirds of data breaches. 3 Data breaches can occur in multiple ways. Stolen or lost laptops or hard drives, disclosures by third-party vendors, and unsecure websites top the list. The following are some examples of the notable breaches by hospitals or healthcare organizations occurring to date: Advocate Medical Group (2013): Four laptops were stolen containing more than 4 million patient records. This was the second largest breach to be reported to HHS. 4 AHMC Healthcare (2013): Two laptops were stolen containing patient data from six AHMC hospitals in California. Approximately 729,000 patients were affected with about 70,000 having their Social Security numbers compromised. 4 Cogent Healthcare, Inc. (2013): A transcription company stored medical data on a non-secure website, making the private website accessible to all Internet users; some records were indexed by Google. PHI of over 32,000 individuals was affected. 4 Emory Healthcare (2012): The Atlanta-based hospital system misplaced 10 backup disks containing information for more than 315,000 patients. Some 228,000 of the files included patient Social Security numbers and other medical information. 5 UCLA Health System (2011): Unauthorized employees looked at electronic protected health information of numerous celebrity patients. UCLA had to pay $865,000 to settle HIPAA investigations and charges. 6 Less than a year later, UCLA was faced with another data breach when a former employee s house was broken into, and an external hard drive was stolen containing encrypted personal information of 16,288 patients. 7 Sutter Health (2011): Nearly 1 million patients of the California health system had their PHI compromised after the theft of an unencrypted company desktop computer. Sutter Health faces 11 different lawsuits with potential liability of up to $4.25 billion. 8 Eisenhower Medical Center (2011): An unencrypted computer was stolen containing patient data; over 514,000 individuals were affected. 9 TRICARE Management Activity (2011): Lost back-up tapes contained PHI of over 4.9 million individuals, making it the largest breach in history. $4.9 billion was sought in the class action lawsuit, or $1,000 per patient. Importantly, a federal court recently dismissed the majority of the lawsuit on the basis that a data breach alone did not demonstrate damages and the plaintiffs had to prove actual harm. 9

3 North Bronx Healthcare Network (2010): Back-up tapes from two computer systems were stolen from a vendor truck, containing 20 years of PHI of an estimated 1.7 million individuals. 9 New York Presbyterian Hospital and Columbia University (2010): A physician attempted to deactivate a personal computer server on the hospital network, resulting in 6,800 patients PHI being exposed on the Internet. In the largest HIPAA settlement to date, the two hospitals paid a total of $4.8 million to settle the claims. 10 What Are the Consequences of a Data Breach? The recently enacted HIPAA Omnibus Rule, found in the HITECH Act s Breach Notification Rule, requires entities to notify the U.S. Department of Health and Human Services (HHS) following a data breach of protected health information. If the PHI of 500 or more individuals is compromised, HHS posts the breach to the public in 2013 alone, 248 such violations were posted. 11 According to the 2013 Ponemon study, the average total organizational cost of a data breach in the United States was $5,403,644. Healthcare, as the most heavily regulated industry, led the pack as the U.S. industry with the highest per capita cost of a data breach. 3 When a data breach occurs, a hospital or healthcare system may face all or some of these expenses and consequences: Legal Defense: the cost can vary widely. A 2013 study of actual claim payouts found the average cost for legal defense for a cyber liability/data breach claim was $574,984, and the average legal settlement was $258, Regulatory Proceedings, Fines, and Penalties: the Omnibus rule allows for hefty penalties for data breaches up to $1,500,000 per incident. In 2013, HHS handed out penalties ranging from $150,000 to $1,700, Notification of Third Parties: most states require notification to individuals with potentially compromised information. HHS must be notified if the PHI of over 500 individuals are affected. 14 In-House Investigations: including response plans, and repair and/or improvement of security technology. Forensic Examination and Experts: hiring a third party to investigate the data breach; average fees are from $200 to $1,500 per hour. 14 Hotline/Call Center: to provide support for patients/ affected individuals. Credit or Identity Monitoring: many hospitals voluntarily provide this for patients who are victims of a breach; typical credit monitoring costs can range from $10-$30 per individual per year. 14 Public Relations: damage control is necessary and may be extensive, depending on the seriousness of the breach and the number of people affected. Hiring an external party may be necessary. Various intangible consequences, such as harm to the organization s reputation and loss of trust between the organization and the patient. 4 For the healthcare community, cyber liability is a real and growing threat. It has become a must for hospitals, healthcare organizations and physician practices to be aware of the cyber liability risks, and take affirmative steps to reduce these risks. Steps need to be taken to safeguard against disclosure as well as protect the provider, should a breach happen. References: 1. Global Risks 2014: Ninth Edition. Published by the World Economic Forum, WEF_GlobalRisks_Report_2014.pdf. Cybersecurity named one of top five global threats. Published February 10, 2011,

4 2. Cyberattacks are on the rise. And health-care data is the biggest target. Published February 5, 2014, wp/2014/02/05/cyberattacks-are-on-the-rise-and-healthcare-data-is-the-biggest-target/ Cost of Data Breach Study: Global Analysis. Ponemon Institute, May 2013, library/2013-cost-of-data-breach-global-analysis. 4. Top 10 HIPAA Data Breaches of Layered Tech, published January 7, 2014, blog/top-10hipaa-data-breaches-of largest HIPAA breaches of Healthcare IT News, published January 1, 2013, news/ 10-largest-hipaa-breaches UCLA Health System Pays $865,000 Over Privacy Charges. InformationWeek, published July 8, 2011, ucla-health-system-pays-$ over-privacycharges/d/d-id/ UCLA Patient Data Breached (Again). Fierce Healthcare, published November 7, 2011, 8. Patients Sue Sutter Health After Largest Data Breach. Fierce Healthcare, published November 28, 2011, Another data breach for Sutter Health. Healthcare IT News, published June 10, 2013, biggest HIPAA data breaches in the U.S. Healthcare IT News, published September 10, 2012, slideshow-top-10-biggest-hipaa-breaches-united-states. 10. Data breach results in $4.8 million HIPAA settlements. U.S. Department of Health & Human Services Press Release dated May 7, 2014, CFR ; see also Health Information Privacy Breaches Affecting 500 or More Individuals. 12. Cyber Liability & Data Breach Insurance Claims: A Study of Actual Claim Payouts. NetDiligence HHS raises the stakes for patient data breaches. Healthcare IT News, published November 25, 2013, Data Breach Cost: Risks, costs and mitigation strategies for data breaches. Zurich, internet/zna/sitecollectiondocuments/en/products/ securityandprivacy/data%20breach%20costs. %20wp%20part%201%20(risks,%20costs %20and%20mitigation%20strategies).pdf.

5 GETTING TO KNOW COVERYS REGULATORY LIABILITY AND INFORMATION SECURITY AND PRIVACY COVERAGE Since 2009, more than 804 breaches of protected health information were reported to the HHS Office of Civil Rights. As a result, more than 29 million patient records were affected. 1 Healthcare facilities have been charged with protecting not only their patient s well-being, but also their protected health information. Through member company MHA Insurance Company ( MHAIC ), Coverys provides facilities with the extra coverage you may need, above and beyond your original professional liability policy. All MHAIC policies now include Regulatory Liability and Information Security and Privacy Coverage. Coverys offers the coverage for policyholders for no extra cost at basic limits and also offers the ability to purchase additional limits with flexible deductible options. The following information will help you get a more in-depth understanding of this coverage. Who is eligible for Coverys Regulatory Liability and Information Security and Privacy Coverage? Is there a limit of liability buy-up option? Individual, group and facility professional liability policyholders are provided the coverage at basic limits. They are also given the option of purchasing additional limits with flexible retentions. What are the basic limits of liability and deductibles? Does MHAIC bear the underwriting exposure for these coverages? No. MHAIC fronts this coverage on behalf of Beazley, 2 a specialty insurance company that manages five international Lloyd s of London syndicates. Beazley is a market leader in cyber liability, professional indemnity, property, marine, reinsurance, accident and life, and political risks and contingency business. Will Coverys underwriters be given a loss report for each insured? Beazley shares claim-specific loss reports to Coverys for each of its applicable underwriting entities. Coverys underwriters have access to these reports. Will coverage be available in claims-made and occurrence? No. Coverage is written solely on a claims-made basis. However, the coverage will be attached to both claims-made and occurrence professional liability policies. Will there be an extended reporting period endorsement option? Yes, there is a one-year, 3 non-renewable reporting endorsement option available. Provider Coverage Coverage Provider Limits*** Retention*** Facility Limits Facility Retention Information Security A $50,000 $1,000 $100,000 $5,000 and Privacy Liability Privacy Breach Response Services B**** 5,000 individuals $100,000 Computer Forensics B.1.a Sublimit $50,000 Computer Forensics and B.1.a&b Sublimit $1,000 $50,000 $5,000 Notification Service Credit Monitoring Service B.1.c 50 individuals 250 individuals Regulatory Defense and Penalties C $50,000 $1,000 $50,000 $5,000 Website Media Content Liability D $50,000 $1,000 $50,000 $5,000 Providers Regulatory Liability E $50,000 $1,000 $100,000 $25,000 Disciplinary Proceedings E (Disciplinary) $25,000 - $25,000 - Sublimit Cyber Extortion F $50,000 $1,000 $50,000 $5,000 First Party Data Protection G $50,000 $1,000 $50,000 $5,000 Crisis Management and H $25,000 $1,000 $25,000 $5,000 Public Relations Combined $50,000 $100,000 Aggregate * The Coverys MPL provider policy includes the basic limits and deductibles noted above, at no additional charge. ** Limit buy-up options, up to $5 million per coverage with flexible retentions, are available upon request. *** The Limit of Liability shown for Coverage B and the Aggregate as well as all Retentions may vary by Group size (this table displays amounts for a Group Size of 5). Please see the Regulatory Liability and Information Security and Privacy Coverage Schedule for further details. ****For Provider policies, this limit does not apply to the aggregate.

6 3100 West Road Building 1, Suite 200 East Lansing, MI NOTE: For claims-made policies, insureds must purchase a reporting endorsement for their professional liability policy in order to purchase the cyber/regulatory reporting endorsement. Why is coverage provided for Cyber Extortion? Isn t extortion a criminal act? The insured is covered to protect against the criminal act of someone else. It is similar to a homeowner s insurance policy protecting the homeowner against robbery. The act of the robber is criminal, but the homeowner needs coverage for the act. Is extortion committed by an employee excluded? Yes, the coverage explicitly excludes cyber extortion by an employee or owner of the practice. How does the notifications deductible apply? An individual practitioner is responsible to pay for the first 50 notifications. After that, the coverage will pay for 5,000 notifications. For a group of two to 20 practitioners, the group will pay for the first 100 notifications. After that, the coverage will pay for 50,000 notifications. For a group of 21 or more, the group pays for the first 5,000 notifications. After that, the coverage will pay for 100,000 notifications. For a facility, the facility pays for the first 250 notifications. After that, the coverage will pay for $100,000 worth of notifications. Who chooses the attorneys, experts and service providers? Beazley has attorneys, computer experts and service providers that they can contract with to provide these services to their insureds. However, Beazley is willing to work with insureds to expand their panel of providers given the right circumstances. What if the insured already has this coverage through another policy? There is an other insurance clause written into the coverage language which states that the cyber/regulatory coverage is excess over any other coverage available. References: 1. Redspin s Breach Report 2013 Protected Health Information (PHI), Redspin, resources/whitepapers-datasheets/request-2013-breach- Report-Protected-Health-Information-PHI-Redspin.php. 2. Beazley has authority to enter into contracts of insurance on behalf of the Lloyd s underwriting members of Lloyd s syndicates 623 and 2623 which are managed by Beazley Furlonge Limited. Beazley Furlonge Limited is authorized by the Prudential Regulation Authority and regulated by the Financial Conduct Authority in the UK (ref ) in its capacity as an insurer. 3. Contingent upon state regulations.

Cyber Liability. AlaHA Annual Meeting 2013

Cyber Liability. AlaHA Annual Meeting 2013 Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages

More information

Discussion on Network Security & Privacy Liability Exposures and Insurance

Discussion on Network Security & Privacy Liability Exposures and Insurance Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter

More information

Network Security and Data Privacy Insurance for Physician Groups

Network Security and Data Privacy Insurance for Physician Groups Network Security and Data Privacy Insurance for Physician Groups February 2014 Lockton Companies While exposure to medical malpractice remains a principal risk MIKE EGAN, CPCU Senior Vice President Unit

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Cyber Liability & Data Breach Insurance Claims

Cyber Liability & Data Breach Insurance Claims Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This

More information

Proofpoint HIPAA Breach Report:

Proofpoint HIPAA Breach Report: Proofpoint HIPAA Breach Report: An Analysis of HITECH Breach Notifications and Settlements, Q1 2013 Healthcare Industry Update threat protection compliance archiving & governance secure communication Contents

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance

More information

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,

More information

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection

More information

Understanding. your Cyber Liability coverage

Understanding. your Cyber Liability coverage Understanding your Cyber Liability coverage TEXAS MEDICAL LIABILITY TRUST 901 S. Mopac Expressway Barton Oaks Plaza V, Suite 500 Austin, TX 78746-5942 P.O. Box 160140 Austin, TX 78716-0140 800-580-8658

More information

9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability.

9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability. Miscellaneous Current Topics in Healthcare Professional Liability Josh Zirin, FCAS, MAAA Antitrust Notice The Casualty Actuarial Society is committed to adhering strictly to the letter and spirit of the

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Thank you for joining us. We have a great many participants in today s call. Your phone is currently

More information

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? 1 DEFINITIONS HIPAA Health Insurance Portability and Accountability Act of 1996 Primarily designed

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Cyber Insurance Presentation

Cyber Insurance Presentation Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance

More information

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA Violations Incur Multi-Million Dollar Penalties HIPAA Violations Incur Multi-Million Dollar Penalties Whitepaper HIPAA Violations Incur Multi-Million Dollar Penalties Have you noticed how many expensive Health Insurance Portability and Accountability

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

Cyber Risks in Italian market

Cyber Risks in Italian market Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends

More information

Law Firm Cyber Security & Compliance Risks

Law Firm Cyber Security & Compliance Risks ALA WEBINAR Law Firm Cyber Security & Compliance Risks James Harrison CEO, INVISUS Breach Risks & Trends 27.5% increase in breaches in 2014 (ITRC) Over 500 million personal records lost or stolen in 2014

More information

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics

More information

Cyber-Crime Protection

Cyber-Crime Protection Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living

More information

My Docs Online HIPAA Compliance

My Docs Online HIPAA Compliance My Docs Online HIPAA Compliance Updated 10/02/2013 Using My Docs Online in a HIPAA compliant fashion depends on following proper usage guidelines, which can vary based on a particular use, but have several

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

Can Your Diocese Afford to Fail a HIPAA Audit?

Can Your Diocese Afford to Fail a HIPAA Audit? Can Your Diocese Afford to Fail a HIPAA Audit? PETULA WORKMAN & PHIL BUSHNELL MAY 2016 2016 ARTHUR J. GALLAGHER & CO. BUSINESS WITHOUT BARRIERS Agenda Overview Privacy Security Breach Notification Miscellaneous

More information

Understanding Professional Liability Insurance

Understanding Professional Liability Insurance Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

Is Cyber Insurance the Next Big Think? 2nd Digital Payments Summit - May 2016. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Is Cyber Insurance the Next Big Think? 2nd Digital Payments Summit - May 2016. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor Is Cyber Insurance the Next Big Think? 2nd Digital Payments Summit - May 2016 Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Cromar Insurance Brokers Historical Development of Cyber (Re)Insurance

More information

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013 Updates on HIPAA, Data, IT and Security Technology June 25, 2013 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind, including,

More information

BOARD OF GOVERNORS MEETING JUNE 25, 2014

BOARD OF GOVERNORS MEETING JUNE 25, 2014 CYBER RISK UPDATE BOARD OF GOVERNORS MEETING JUNE 25, 2014 EXECUTIVE SUMMARY Cyber risk has become a major threat to organizations around the world, as highlighted in several well-publicized data breaches

More information

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations? Am I a Business Associate? Do I want to be a Business Associate? What are my obligations? Brought to you by Winston & Strawn s Health Care Practice Group 2013 Winston & Strawn LLP Today s elunch Presenters

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable Steven J. Fox (sjfox@postschell.com) Peter D. Hardy (phardy@postschell.com) Robert Brandfass (BrandfassR@wvuh.com) (Mr. Brandfass

More information

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach

More information

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone

More information

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,

More information

CYBER SECURITY SPECIALREPORT

CYBER SECURITY SPECIALREPORT CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised

Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised ACE USA Podcast Released February 3, 2010 Preparing for the Inevitable Data Breach: What to Do Before Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior

More information

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance

Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance By Shawn Tuma & Katti Smith Data breaches have become far more common than most people realize.

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Beazley Group Beazley Breach Response. A data breach isn t always a disaster Mishandling it is.

Beazley Group Beazley Breach Response. A data breach isn t always a disaster Mishandling it is. Beazley Group Beazley Breach Response A data breach isn t always a disaster Mishandling it is. A world of risk 932.7m Personal records breached in the U.S. since 2005 3 51% The proportion of breaches attributable

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS HIPAA PRIVACY AND SECURITY FOR EMPLOYERS Agenda Background and Enforcement HIPAA Privacy and Security Rules Breach Notification Rules HPID Number Why Does it Matter HIPAA History HIPAA Title II Administrative

More information

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing

More information

Cyber-insurance: Understanding Your Risks

Cyber-insurance: Understanding Your Risks Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some

More information

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider 1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner

More information

erisks Policyholder s Guide to Privacy & Security Breach Response Planning

erisks Policyholder s Guide to Privacy & Security Breach Response Planning erisks Policyholder s Guide to Privacy & Security Breach Response Planning Professional Indemnity Financial Institutions Directors & Officers Management Liability Medical Malpractice Media Liability Level

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security

2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security 2009 HIMSS Analytics Report: Evaluating HITECH s Impact on Healthcare Privacy and Security Commissioned by ID Experts November 2009 INTRODUCTION Healthcare breaches are on the rise; according to the 2009

More information

FACT SHEET: Ransomware and HIPAA

FACT SHEET: Ransomware and HIPAA FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000

More information

HIPAA Cyber Security: Your Vendor is a Back Door to Your Server

HIPAA Cyber Security: Your Vendor is a Back Door to Your Server HIPAA Cyber Security: Your Vendor is a Back Door to Your Server Prepared for the American Health Lawyers Association s Fraud and Compliance Forum held October 6, 2014 John E. Kelly, Esq. Member Bass, Berry

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance

CAGNY Spring 2015 Meeting Fundamentals of Cyber Risk. Brad Gow June 9th, 2015 Endurance Fundamentals of Cyber Risk Brad Gow June 9th, 2015 Endurance But consider the kickoff chuckle to a speech given to the Wharton School in March 1977 by Sidney Homer of Salomon Brothers, the leading bond

More information

HIPAA In The Workplace. What Every Employee Should Know and Remember

HIPAA In The Workplace. What Every Employee Should Know and Remember HIPAA In The Workplace What Every Employee Should Know and Remember What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 Portable Accountable Rules for Privacy Rules for Security

More information

Cyber Exposure for Credit Unions

Cyber Exposure for Credit Unions Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of

More information

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...

More information

Medical Information Breaches: Are Your Records Safe?

Medical Information Breaches: Are Your Records Safe? Medical Information Breaches: Are Your Records Safe? Learning Objectives At the conclusion of this presentation the learner will be able to: Recognize the growing risk of data breaches Assess the potential

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano

The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments. Robin B. Campbell Ethan P. Schulman Jennifer S. Romano The Dish on Data and Disks HIPAAPrivacy and Security Breach Developments Robin B. Campbell Ethan P. Schulman Jennifer S. Romano HIPAAPrivacy and Security Breach Overview of the Laws Developments Incident

More information

Making Memories Matter

Making Memories Matter Making Memories Matter 2015 WALA Spring Conference A Real World Approach on How to Achieve HIPAA Compliance Jeff Grady, David Hosack, Curtis Urlakis, Holly Schlenvogt, Barbara Zabawa Friday, March 20 10:30

More information

Coverage is subject to a Deductible

Coverage is subject to a Deductible Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:

More information

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014 HIPAA Update Presented by: Melissa M. Zambri June 25, 2014 Timeline of New Rules 2/17/09 - Stimulus Package Enacted 8/24/09 - Interim Final Rule on Breach Notification 10/7/09 - Proposed Rule Regarding

More information

Nine Network Considerations in the New HIPAA Landscape

Nine Network Considerations in the New HIPAA Landscape Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant

More information

Am I a Business Associate?

Am I a Business Associate? Am I a Business Associate? Now What? JENNIFER L. RATHBURN Quarles & Brady LLP KATEA M. RAVEGA Quarles & Brady LLP agenda» Overview of HIPAA / HITECH» Business Associate ( BA ) Basics» What Do BAs Have

More information

BUSINESS ASSOCIATE AGREEMENT. Recitals

BUSINESS ASSOCIATE AGREEMENT. Recitals BUSINESS ASSOCIATE AGREEMENT This Agreement is executed this 8 th day of February, 2013, by BETA Healthcare Group. Recitals BETA Healthcare Group consists of BETA Risk Management Authority (BETARMA) and

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

OCR HIPAA Audit Readiness. ISACA - North Texas Chapter April 11, 2013

OCR HIPAA Audit Readiness. ISACA - North Texas Chapter April 11, 2013 ISACA - North Texas Chapter April 11, 2013 Introduction 1 2 Basic components of HIPAA and HITECH legislation HITECH and rising breaches 3 4 OCR HIPAA audits Key findings of the pilot audits 5 Approaches

More information

What would you do if your agency had a data breach?

What would you do if your agency had a data breach? What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the

More information

Anatomy of a Privacy and Data Breach

Anatomy of a Privacy and Data Breach Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions

More information

Cyber Risk Insurance for Agents. Frequently Asked Questions

Cyber Risk Insurance for Agents. Frequently Asked Questions Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship

More information

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

Cyberinsurance: Insuring for Data Breach Risk

Cyberinsurance: Insuring for Data Breach Risk View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL

More information

Legal Issues in Medical Office Use of Social Media. James F. Doherty, Jr. Pecore & Doherty, LLC Columbia, Maryland

Legal Issues in Medical Office Use of Social Media. James F. Doherty, Jr. Pecore & Doherty, LLC Columbia, Maryland Legal Issues in Medical Office Use of Social Media James F. Doherty, Jr. Pecore & Doherty, LLC Columbia, Maryland Legal Issues in Social Media for Physician Practices HIPAA/State Confidentiality laws State

More information

CYBER BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIM & LEGAL GROUP

CYBER BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIM & LEGAL GROUP www.willis.com CYBER BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIM & LEGAL GROUP INSIDE THIS EDITION... CYBER CLAIMS LANDSCAPE A SAMPLING OF LARGE CYBER SETTLEMENTS LEGAL SPOTLIGHT, PRIVILEGE

More information

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July 2012. Tex Med. 2012;108(7):33-37.

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July 2012. Tex Med. 2012;108(7):33-37. Zip It! Feds, State Strengthen Privacy Protection Practice Management Feature July 2012 Tex Med. 2012;108(7):33-37. By Crystal Conde Associate Editor When it comes to enforcing HIPAA data security and

More information

Updates within Network Security and Privacy Risk Management

Updates within Network Security and Privacy Risk Management Updates within Network Security and Privacy Risk Management RIMS Minneapolis Meeting Melissa Krasnow, Partner, Dorsey & Whitney LLP (Minneapolis, MN) Mario Paez, Midwest Practice Leader for Tech., Privacy,

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

Policy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium

Policy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Policy Considerations for Covering Special Exposures Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Special exposures Coverage that targets a loss with

More information

Anatomy of a Healthcare Data Breach

Anatomy of a Healthcare Data Breach BUSINESS WHITE PAPER Anatomy of a Healthcare Data Breach Prevention and remediation strategies Anatomy of a Healthcare Data Breach Table of Contents 2 Increased risk 3 Mitigation costs 3 An Industry unprepared

More information

Cybersecurity and the Threat to Your Company

Cybersecurity and the Threat to Your Company Why is BIG Data Important? March 2012 1 Cybersecurity and the Threat to Your Company A Navint Partners White Paper September 2014 www.navint.com Cyber Security and the threat to your company September

More information

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 HIPAA and the HITECH Act Privacy and Security of Health Information in 2009 What is HIPAA? Health Insurance Portability & Accountability Act of 1996 Effective April 13, 2003 Federal Law HIPAA Purpose:

More information