CYBER LIABILITY Why The Need? Robin Federici, CPCU, AAI, ARM, AINS, AIS, CPIW
|
|
- Neil Clyde Barton
- 7 years ago
- Views:
Transcription
1 CYBER LIABILITY Why The Need? Robin Federici, CPCU, AAI, ARM, AINS, AIS, CPIW
2 AND IT STARTS Morgan Stanley 1/5/15 Roughly 350,000 names, numbers and transaction details were stolen with 900 posted to the internet by an employee 2
3 EXPOSURE According to Javelin Strategy t & Research, on average almost 15,000,000 Americans are victims of identity theft annually Individuals The Federal Trade Commission (FTC) states that the average victims spends more than $1,200 in the quest to clear his/her name Businesses Often, the lion's share of response costs comes from the duty to notify those whose data has been breached or potentially breached. Small businesses can face an estimated $200,000 in associated costs 3
4 EXPOSURE Even with strict breach reporting laws many breaches are still not reported Cyber criminals are becoming more adept at hiding their tracks 2012 experienced the highest number of breaches with some large breaches by well- known companies 4
5 STATISTICS DataLossDB.org: Data Breaches 2006: : : : : : : : :
6 What is Cyber Liability Coverage? Cyber Liability addresses risks associated with e-business, the internet, networks and informational assets. Cyber Liability Insurance coverage offers cutting edge protection for exposures arising out of Internet communications. The concept of Cyber Liability takes into account first- and third-party risks. 6
7 What is Cyber Liability Coverage? The risk category includes: privacy issues theinfringement of intellectual property virus transmission, or any other serious trouble that may be passed from first to third parties via the Web 7
8 Why the Need? Anyone with a Web site now has the legal l liabilities of a publisher: These include conventional publishing exposures such as copyright infringement, defamation and invasion i of privacy Also includes emerging exposures related to operating on the Web 8
9 Why the Need? The Internet - has spun a whole new web of liability exposures. Creating a Web site is simple. The exposures that come with it are not. Commercial companies that disseminate information to the public via Web sites face the same legal exposures as publishers, yet most have little or no concept of their resulting legal responsibilities. New legislation continues to create potential liabilities 9
10 Why the Need? Traditional liability products do not address Internet exposures The universe of potential plaintiffs is staggering 10
11 NORTON REPORT IN THE PAST 12 MONTHS The number of cyber-crime crime victims: Globally 556m USA 71m On-line adults that have experienced cyber-crime: crime: Globally 46% USA 49% The net cost of cyber-crime: crime: Globally $110 billion USA $20.7 billion 11
12 PONEMON INSTITUTE Cost of Data Breach Study: Global Analysis Company data breach average costs are $3.5 million The cost incurred for each lost or stolen record is a consolidated average of $145. Companies that said they have a strong security posture were able to reduce the cost by as much as $14 per record. The appointment of a Chief Information Security Officer to lead the response team reduced the cost of a breach by more than $6. 12
13 PONEMON INSTITUTE Cost of Data Breach Study: Global Analysis The most common cause of a data breach is a malicious insider or criminal attack. The most costly data breaches were those caused by malicious and criminal attacks. Companies in the U.S. and Germany paid the most at $246 and $215 per compromised record, respectively. 13
14 CARNEGIE MELON CYLAB GOVERNANCE SURVEY Boards and senior management still are not exercising appropriate p governance over the privacy and security of their digital assets. 14
15 HISTORY EARLY DAYS Intellectual property (media) exposures such as trademark and copyright infringement were the driving decision-maker for most smaller companies that purchased coverage. For larger technology and e-commerce companies, business interruption was a major reason behind the decision to purchase coverage. 15
16 MATURATION OF THE WWW Similarly, as the Web matured and new U.S. laws such as the Digital Millennium Copyright Act came into effect, the uncertainty of trademark and copyright infringement on the Web subsided. On May 22, 2001, the European Union passed the Copyright Directive (EUCD) 16
17 MEDIA EXPOSURES Today, media exposures are still a concern. With the explosion of social media and interactive websites that include usergenerated content, personal injury litigation has risen. However, coverage in these traditional cyber liabilities has matured as actuarial data and case law have developed 17
18 PRIVACY EXPOSURE The newest and fastest growing exposure in the cyber world is now privacy liability. The pace of business may not allow companies to fully develop data management and security procedures with proper technical and legal review They lack the economic ability and legal and technical expertise to keep up to date 18
19 PRIVACY Business Solutions SOLUTIONS Strong risk management of information technology - such as network security (i.e., intrusion prevention, encryption) and data retention policy Insurance policies - When a data breach occurs, legal, technical, & business consequences arise. The insurance industry has evolved to address all 3 of these. 19
20 PRIVACY Business Solutions Insurance A policy covering only one s network is not broad enough to cover two (2) of the three (3) most prolific causes of a data privacy breach: 1. loss of a portable data-bearing device 2. loss of paper records 20
21 PRIVACY BUSINESSES Privacy laws address protection of individual s non-public information Businesses have no right to privacy; however, they are granted property p rights such as protection of trade secrets, formulas, etc., which are analogous to personal property rights. 21
22 PRIVACY BUSINESSES The exposure to privacy liability risk varies for every entity All entities of every size and structure face privacy risks 22
23 Security Breach Notification Law Laws PRIVACY 47 states, D.C., Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring notification of security breaches involving personal information 23
24 Security Breach Notification Law PRIVACY Several relevant federal statutes pertain to privacy. This patchwork of laws and regulations can make it nearly impossible for most business owners and risk managers to keep up, particularly for those who do business in multiple states. 24
25 Privacy - Jurisdiction: The jurisdiction of the state laws is based on both: The consumer s state of residence The home state of the business. Compliance, especially for those in highly regulated industries, such as health care, legal, educational, and financial i services, can be a difficult task 25
26 STATE LAWS It All Started in CA! In 2001, California became the first state to have an agency dedicated to promoting the protection of consumer privacy rights when the Office of Privacy Protection was created. In 2002, California became the first state to pass privacy breach notification requirements which became operative on July 1,
27 STATE LAW EXAMPLES Massachusetts - applies to any entity doing business with a MA resident Texas residents & those residents with no state notification law New Jersey breaches are reported to the state police Connecticut t special note for insurance professionals Nevada PCI compliant 27
28 OTHER INFLUENCES ON EXPOSURE Private Sector PCI DSS: The various payment card companies require all merchants, no matter how small or large, to be PCI compliant. PCI DSS is a comprehensive set of security standards PCI Security Standards Council periodically updates these standards PCI Compliance consists of four merchant provider levels Level requirements are based on total transactional volume Failure to comply could result in fines and loss of 28 one s contract with the card brands.
29 OTHER INFLUENCES ON International: EXPOSURE European Union Data Protection Directive (EUDPD) - broad definition of personal data The directive applies even when the controller does not reside in the EU but uses equipment located in the EU Criminal - many European countries have criminal laws protecting privacy rights. 29
30 INSURANCE When a privacy breach occurs, there are two victims: 1. The individual whose personal information is exposed, and 2. The entity that was breached 30
31 INSURANCE - Traditional While limited coverage for some privacy, media, or data breach exposures may be included in traditional insurance programs Most underwriters of traditional types of insurance DO NOT intend to pick up cyber exposures 31
32 TRADITIONAL INSURANCE CGL CG Definitions Property Damage Definition of "property damage" - "data" is not "tangible property Coverage A Exclusion p. Electronic Data Damages arising out of the loss of,, loss of use of,, damage to, corruption of, inability to access or inability to manipulate electronic data. However, this exclusion does not apply to liability for damages because of "bodily injury". 32
33 INSURANCE - BTW The CGL Professional Exclusion: For businesses that t provide computer- related products and services, the CGL policy customarily excludes damage to another party's electronic data as part of one or more professional services exclusion endorsements 33
34 CGL Coverage A & B Restrictions In addition to the PD Definition change: 1. Lack of Coverage for Errors and Omissions 2. Restrictive Policy Territory 3. Lack of Coverage for Security Breaches 4. Limited Coverage for Copyright/Trademark Infringement under Coverage B Coverage B exclusion: 5. k. Electronic Chatrooms or Bulletin Boards 34
35 What is Cyber Liability Insurance? Cyber Liability is an insurance term for a policy that includes one or more of the following 35
36 What is Cyber Liability Insurance? Multimedia Liability - Allegations from your internet site or printed media which cause defamation. Libel, slander, trade libel, product disparagement or torts relation to harm the reputation of others. Security and Privacy Liability - Failing to prevent or hinder unauthorized access or use of your computer system and the confidential material thereon such as loss of employee information, theft or loss of customer personal identifiable data and transmissions of malicious codes to others. First and Third party coverage is available. 36
37 What is Cyber Liability Insurance? Privacy Regulatory Defense and Penalties - Regulatory Compensatory Awards or fines and penalties and related claims expenses in regards to Billing Errors Proceedings, STARK proceedings and EMTALA proceedings. Privacy Breach Response Costs, Customer notification and Customer Support and Credit Monitoring Expenses. Network Asset Protection - Restoring, updating or replacing digital assets to a level beyond that which existed prior to your Covered Cyber Loss including Business Interruption and Extra Expense Coverage. 37
38 What is Cyber Liability Insurance? Cyber Extortion - Covers expenses and monies as applicable in the event of a cyber-extortion extortion threat or series of threats. Cyber Terrorism - expenses such as income loss, interruption expenses during the period of restoration as a result of a total or partial loss or degradation in service which is directly caused by an act of terrorism. Regulatory claim expenses and shadow audit expenses - Covered claim expenses, shadow audit expenses and regulatory fines and penalties from certain regulatory proceedings 38
39 Specialty Policies ISO has developed a form called the Internet liability and network protection policy. It is rarely used. There is no standard cyber liability form There is not even agreed-upon nomenclature Coverage and terminology varies greatly Forms must be carefully reviewed to determine which insurer s policy form best matches up with an organization s loss exposures. 39
40 Specialty Policies Cyber Liability Insurance Cyber policies may be broken into two coverage types: Third-party liability, whichisis liability to others, and First-party liability, which is coverage for the insured s own losses. 40
41 CYBER 3 RD PARTY Cover liability arising from violations of privacy and data breach notification laws. These exposures also require some first-party coverage Can include coverage for a number of other types of liability: liability from transmitting a computer virus to another party or from copy-right infringement i included d in the insured s website 41
42 CYBER 3 RD PARTY TYPES OF COVERAGE: Wide variance in the type of information covered Coverage should: be provided for BOTH electronic and physical breaches include BOTH personal and corporate information should apply to employee data as well as customer information apply to accidental losses/leaks and not just breaches perpetrated by criminals
43 CYBER Avoid PCI Compliant Requirement Encryption Requirements Insider Exclusions 43
44 3 RD PARTY LIABILITY Virus/Malware/Hacking Coverage Coverage should apply to liability to others for unintentionally sending them a virus or malware. This should apply if the transmission is by or through malicious code placed on the insured s website. Some policies limit the coverage for viruses and hacking to direct intentional attacks that target the insured specifically Look for coverage that includes wild viruses that are not specifically targeting the insured. 44
45 3 RD PARTY LIABILITY Media Liability/Content Injury: Intellectual Property Infringement and Personal Injury Avoid policy language that limits coverage to only claims made in the U.S. & its territories Look for coverage that extends beyond the insured s website to also include social networking sites Coverage for user-generated content is particularly important because user posts are oftentimes opinionated and inflammatory 45
46 3 RD PARTY LIABILITY E&O or Professional Liability There are policies tailored to address the specific needs of entities operating in various industry classes such as technology services providers, healthcare providers, and vendors. 46
47 1 st 1 PARTY COVERAGE Fines, Penalties, Contract Obligations Coverage should include 1. Regulatory fines and penalties 2. Contractual obligations such as charge-backs from credit card companies and the cost of replacing customers credit cards 47
48 1 st 1 PARTY COVERAGE Business Interruption Coverage Coverage should: Respond when an interruption occurs as a result of the insured s own systems and failure on a third party system Carefully review the policy language. Some forms limit coverage resulting only from network breach to the Named Insured s computer system. 48
49 1 st 1 PARTY COVERAGE Crisis Management This coverage varies generally includes: Data breach notification expenses Public relations expenses Costs associated with brand protection 49
50 1 st 1 PARTY COVERAGE Crisis Management - Questions to Consider: 1. Service Provider 2. Data Breach Notification Expenses 3. Credit Monitoring Expenses 4. Requirements for Notification 5. Coverage Trigger 6. Deductible 7. Pre-Loss and Loss Prevention 50
51 1 st 1 PARTY COVERAGE Crime This coverage may apply to the perils of: Theft Fraudulent communication Extortion, and Vandalism 51
52 LIMITS More of an art than a science. Historical i data is limited it The cumulative average cost per breach is approximately $3,500,000, 52
53
Joe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
More informationAPIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationInsurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
More informationCYBER & PRIVACY LIABILITY INSURANCE GUIDE
CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationISO? ISO? ISO? LTD ISO?
Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet
More informationCyber Exposure for Credit Unions
Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of
More informationReducing Risk. Raising Expectations. CyberRisk and Professional Liability
Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationCyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
More informationManaging Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal
Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies
More informationCYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
More informationCyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
More informationCYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure
CYBER-LIABILITY COVERAGE: The $ 45 Million Dollar Exposure CYBER-LIABILITY COVERAGE: The $ 45Million Dollar Exposure Today s Presenters: Mark J. Camillo, MBA, BS Head of Network Security and Privacy Products
More informationCyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
More informationMANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
More informationData Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
More informationCyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
More informationDemystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
More informationPrivacy Legislation and Industry Security Standards
Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,
More informationManaging Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
More informationAPPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY
APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY GENERAL INFORMATION 1. APPLICANT NAME: 2. PHONE: 3. MAILING ADDRESS: 4. WEB ADDRESS: 5. The following officer of the Applicant is designated
More informationCyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:
Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned
More informationCyber Risk Insurance for Agents. Frequently Asked Questions
Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship
More informationDiscussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
More informationCyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day
Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014
More informationData breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES
INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY
More informationTHE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
More informationPERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS
PERSONAL AND ADVERTISING INJURY COVERAGE FOR PROFESSIONAL ATHLETES, SPORTS LEAGUES AND ASSOCIATIONS By Michelle Worrall Tilton UIA - 55 th Congress, Miami, FL November 2, 2011 Liability Insurance Terms
More informationData breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationRogers Insurance Client Presentation
Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com
More informationPrivacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
More informationINFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:
INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST MADE
More informationCyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
More informationPrivacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec
Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,
More informationCoverage is subject to a Deductible
Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:
More informationEnterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
More informationProtecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks
Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data
More informationCyber and Privacy Risk What Are the Trends? Is Insurance the Answer?
Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information
More informationData security: A growing liability threat
Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars
More informationPractical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance
Practical Cyber Law: Why the Standard of Care Requires Lawyers to Have a Basic Understanding of Cyber Insurance By Shawn Tuma & Katti Smith Data breaches have become far more common than most people realize.
More informationCyberinsurance: Insuring for Data Breach Risk
View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION
INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST
More informationManaging Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
More informationManaging Cyber & Privacy Risks
Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past
More informationIRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
More informationTHE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill
THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage
More informationAirmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE
Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly
More informationCyber Insurance as one element of the Cyber risk management strategy
Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division
More informationcyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
More informationInsurance for Data Breaches in the Hospitality Industry
The Academy of Hospitality Industry Attorneys The Pl Palmer House Hilton Chicago, IL April 25, 2014 Insurance for Data Breaches in the Hospitality Industry Presenters: David P. Bender, Jr. dbender@andersonkill.com
More informationData Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More information9/13/2011. Miscellaneous Current Topics in Healthcare Professional Liability. Antitrust Notice. Table of Contents. Cyber Liability.
Miscellaneous Current Topics in Healthcare Professional Liability Josh Zirin, FCAS, MAAA Antitrust Notice The Casualty Actuarial Society is committed to adhering strictly to the letter and spirit of the
More informationCyber Risks in Italian market
Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends
More informationCyber Liability. AlaHA Annual Meeting 2013
Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages
More informationCYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America
CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification
More informationAn Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter
An Introduction to Cyber Liability Insurance Catherine Berry Senior Underwriter What is cyber risk? Exposures emanating from computer networks and the internet The Cyber Risk Phenomenon The incredible
More informationTools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited
Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationUnderstanding. your Cyber Liability coverage
Understanding your Cyber Liability coverage TEXAS MEDICAL LIABILITY TRUST 901 S. Mopac Expressway Barton Oaks Plaza V, Suite 500 Austin, TX 78746-5942 P.O. Box 160140 Austin, TX 78716-0140 800-580-8658
More informationCyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
More informationCYBER 3.0. CUTTING-EDGE ADVANCEMENTS IN INSURANCE COVERAGE FOR CYBER RISK AND REALITY SFOR005 Speakers:
CYBER 3.0 CUTTING-EDGE ADVANCEMENTS IN INSURANCE COVERAGE FOR CYBER RISK AND REALITY SFOR005 Speakers: Roberta D. Anderson, Partner, K&L Gates LLP Timothy Flaherty, Manager, Insurance Risk Management,
More informationDATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
More informationSpecialty Risk Protector
Specialty Professional Liability and Data and Network Security Insurance is a single policy that makes it easy for companies to secure the multi-faceted E&O protection our networked world requires. A simplified,
More informationUnderstanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed
More informationDistributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015
Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Today s Agenda What are we talking about today? What is Risk Evolution of risk management Understand the importance of Risk
More informationCyber Threats and the Insurance Response
Cyber Threats and the Insurance Response Scott Reeves & Laurence Yan Munich Reinsurance Company This presentation has been prepared for the Actuaries Institute 2014 General Insurance Seminar. The Institute
More informationCyber Risk State of the Art
Proudly presents Cyber Risk State of the Art Matthew Davies, Chubb Insurance Catherine Dowdall, Canada Post Mike Petersen, Marsh 1 Agenda 1. Who is At Risk? 2. New/Emerging Risk and Trends 3. Canada Post
More informationZurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
More informationACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
More informationCyber Insurance: An Overview of an Evolving Coverage
October 21, 2015 Cyber Insurance: An Overview of an Evolving Coverage by Russell Cohen Alison Roffi INTRODUCTION Cyber insurance has reached a tipping point. The rising costs faced by data breach victims,
More informationUpdates within Network Security and Privacy Risk Management
Updates within Network Security and Privacy Risk Management RIMS Minneapolis Meeting Melissa Krasnow, Partner, Dorsey & Whitney LLP (Minneapolis, MN) Mario Paez, Midwest Practice Leader for Tech., Privacy,
More informationInsuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
More informationHow To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
More informationCYBER LIABILITY INSURANCE
CYBER LIABILITY INSURANCE CONTINUING EDUCATION CLASS MARCH 6, 2013 PRESENTED BY COUSINO HARRIS STEWART V. NELSON, Senior Risk Advisor Stewart.Nelson@Kapnick.com 734 929 6057 Class Objectives Understand
More informationCyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
More informationCyber/Information Security Insurance. Pros / Cons and Facts to Consider
1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner
More informationCyberSecurity for Law Firms
CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a
More informationCAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President
More informationCyber and CGL Insurance Coverage for Data Breach Claims
Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance
More informationInsurance implications for Cyber Threats
Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of
More informationPolicy Considerations for Covering Special Exposures. Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium
Policy Considerations for Covering Special Exposures Claire Lee Reiss Program Director National League of Cities Risk Information Sharing Consortium Special exposures Coverage that targets a loss with
More informationDATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
More informationBe Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance
Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance Today s agenda Introductions Cyber exposure overview Cyber insurance market and coverages Captive cyber insurance
More information2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage
2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and
More informationCyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationCyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor
Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection
More informationUnderstanding Professional Liability Insurance
Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional
More informationAs with most things, insurance should be
Insurance Buyers News Property & Liability 300 Montgomery Street Suite 450 San Francisco, CA 94104 415-820-2200 www.pennbrookinsurance.com Insurance Buyers News March/April 2012 Volume 23 Number 2 Data
More informationCyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
More informationCyber Liability. What School Districts Need to Know
Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have
More informationHow To Buy Cyber Insurance
10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More information