CYBER RISKS AND COVERAGE: QUESTIONS TO CONSIDER

Size: px
Start display at page:

Download "CYBER RISKS AND COVERAGE: QUESTIONS TO CONSIDER"

Transcription

1 CYBER RISKS AND COVERAGE: QUESTIONS TO CONSIDER Stephen D. Rosenberg, Esq. John H. Lacey, Esq. THE MCCORMACK FIRM, LLC Boston, Massachusetts

2 CURRENT TRENDS IN DATA PROTECTION (or lack thereof) 2011 Year of the Data Breach Every sector of our economy had their turn: 96% of Healthcare businesses suffered a breach in the last 2 years : US Senate FTC Law Enforcement FBI CIA NATO Sony (Ponemon Institute Survey, Dec. 2011) Epsilon RSA Stratfor Michaels Subway Zappos Citi...

3 CURRENT TRENDS IN DATA PROTECTION (or lack thereof) 46 different state breach notification laws Still no corresponding Federal law (industry specific laws excepted)

4 STATE LAWS: Massachusetts M.G.L. 93H 201 CMR law goes into effect 2010 regulations in effect Not merely a notification statute Requires a WISP and encryption technology 2011 A.G. takes action: Over $100K in fines Briar Group Restaurants: $100K Belmont Saving Bank: $7, Last elements come into effect 3 rd Party Contractual Requirements

5 STATE LAWS: New York N.Y. Gen. Bus. Law 899-aa Notification statute Notable Breaches: Jan New York Utilities Data 3 rd party unauthorized access 1.8 million records Feb 2011 NYC Hospitals 1.7 million records Feb 2011 NASDAQ Director s Desk hacked NYC is the epicenter of financial data!!

6 STATE LAWS: Texas Tex. Bus. & Com. Code Tex. Bus. & Com. Code Ann , Notification Statute recently amended, doesn t just apply to Texas resident s data all U.S. Notable Breaches: Sept Tricare 4.9 million records Lawsuit demands $4.9 Bbbbbbbillion March 2011 Texas comptroller breach 3.5 million records One day after Zappos, Texas woman files suit The civil negligence lawsuit seeks unspecified millions of dollars in compensatory and exemplary damages for emotional distress and loss of privacy, along with a court order for the company to pay for customer credit monitoring and identity theft insurance and periodic audits to ensure customer data is secure.

7 PENDING FEDERAL LEGISLATION House of Representatives: H.R Rep. Mary Bono Mack (R) CA SAFE Data Act (Secure and Fortify Electronic Data Act) H.R Rep. Bobby Rush (D) IL Data Accountability and Trust Act H.R Rep. Cliff Stearns (R) FL Data Accountability and Trust Act of 2011 (DATA)

8 PENDING FEDERAL LEGISLATION United States Senate: S Sen. Patrick Leahy (D) VT Personal Data Privacy and Security Act of 2011 S Sen. Mark Pryor (D) AR Data Security and Breach Notification Act of 2011 S Sen. Dianne Feinstein (D) CA Data Breach Notification Act of 2011

9 PENDING FEDERAL LEGISLATION STATUS House Bills: H.R SAFE Data Act Bono Mack Currently in House Energy and Commerce Committee H.R DATA Act Bobby Rush Currently in House Energy and Commerce Sub-Committee H.R DATA Act of 2011 Stearns Currently in House Energy and Commerce Sub-Committee

10 Senate Bills: PENDING FEDERAL LEGISLATION STATUS S Senator Leahy Sep 22, 2011: Placed on Senate Legislative Calendar under General Orders. Calendar No. 181 S Senator Pryor Sep 22, 2011: Placed on Senate Legislative Calendar under General Orders. Calendar No. 181 S Senator Feinstein Sep 22, 2011: Placed on Senate Legislative Calendar under General Orders. Calendar No. 181

11 What is it? PERSONAL INFORMATION PI or PII or PHI or SPII or??? Inconsistent definitions cause confusion. Where is it? Everywhere. Paper, electronic, scanner, printers, fax. If you have information, then you have responsibilities!

12 POSSIBLE PITFALLS Lost laptop what was on it? Lost USB memory stick what was on it? Misdirected with attachment Improper disposal: paper, old computers and printers Malicious insider can be profitable to steal Government doesn t care if it was a mistake Watch your third-party record holders

13 AWARENESS AND PREPARATION Take a mental note of the places you keep information. Ask yourself If I lost it, what would I do next? Would you know what you lost? Who to tell? Does your company have internal controls for reporting a data breach, even a suspected one? Everyone uses hindsight to analyze a data breach and it can be ugly!

14 LITIGATION Trolls Blunderbuss Approach by Plaintiffs Numerous class actions filed against breaching entities immediately after media reports Most dismissed lack of cognizable harm Some settled BIG numbers Big Data = Big Numbers

15 THE DOWNSIDE TO LOSING INFORMATION Response costs - $214 per record (Ponemon) Brand damage stock price damage Fines Lawsuits Individuals suffering identity theft Credit Card industry fines Business interruption

16 And now, a short story... Ramnicu Valcea, Romania Population 120,000

17 Ramnicu Valcea, Romania A Mercedez-Benz dealership. In a field?

18 Ramnicu Valcea, Romania 24 Western Union locations. In a four block area? As originally reported in WIRED Magazine, Jan 31, 2010 by Yudhijit Bhattacharjee

19 WHAT HAPPENS TO THE STOLEN DATA?

20 YOUR INSUREDS Who are they? What industry? What information do they have? Do they have sufficient internal controls? What is their exposure? What is your exposure? What does the policy cover? Are you sure?

21 Part Two

22 COUNTLESS SCENARIOS There are a broad range of cyber crimes: some directed at customers, while some attempt to disable a company s operations A disgruntled employee, for example, may introduce a virus that shuts down a company computer system Hackers may steal intellectual property or customer s identities Even accidental data releases can lead to substantial liability Multiple sources of insurance coverage for such cyber crimes

23 WHAT TYPES OF POLICIES MAY BE TRIGGERED BY A CYBER RISK? Dedicated cyber risk policies and/or endorsements: LexCyberSecure Specialty Risk Protector NetAdvantage CGL policies Professional Liability D&O Crime & Fidelity First Party Property

24 CYBER RISK POLICIES What risks are actually covered? Chartis Specialty Risk Protector Coverage: Privacy Event : Failure to protect Confidential Information, including identity theft Failure to disclose a breach of Confidential Information in violation of any Security Breach Notice Law Violation of any state or federal privacy statute in connection with a Claim for damages

25 CYBER RISK POLICIES Definition of covered Loss : Compensatory damages, judgments, settlements, pre/post-judgment interest and Defense Costs Money the insured is required by law or has agreed to by settlement to deposit into a consumer redress fund

26 NON-CYBER POLICIES MAY APPLY Although many insurers now offer cyber-coverage, coverage may still lie under other existing common policies and provisions, such as: Personal or Advertising injury clause in CGL policies, D&O policies, and E&O policies

27 NON-CYBER POLICIES MAY APPLY Most companies have first-party property insurance and/or CGL policy to cover third party losses. Both types of policies cover property damage, traditionally defined as physical injury to tangible property. The critical question for such properties is whether technology losses fall within this definition.

28 A COURT S VIEW Courts have been consistent in holding that hardware defects that cause physical injury to computer components are covered. See, e.g.: Retail Sys., Inc. v. CAN Ins. Co., 469 N.W. 2d 735 (Minn. Ct. App. 1991); Lambrect & Associates, Inc. v. State Farm Lloyds, 119 S.W. 3d 16 (Tex. Appt. Ct. 2003)

29 CGL POLICIES AND A QUESTION Is data considered to be tangible property that is subject to covered damage under a standard CGL policy?

30 COURT S VIEW Courts are split on whether an insurer is liable if the damage occurs to software or electronic data Some court have held electronic data are NOT tangible, and thus loss of data is NOT property damage. America Online, Inc. v. St. Paul Mercury Ins. Co., 347 F. 3d 89 (4 th Cir. 2003) (no duty to defend under CGL policy because computer data and software not tangible. ); Eyeblaster, Inc. v. Federal Ins. Co., 613 F.3d 797, 801 (8 th Cir. 2010); Ward General Ins. Services v. Employer s Fire Ins. Co., 114 Cal. App. 4 th 548 (Under first party property policy electronic data do not have material existence. )

31 COURT S VIEW Other courts, however, have found electronic data to constitute tangible property, such that its loss constitutes property damage. Computer Corner v. Fireman s Fund Ins. Co., 46 P. 3d 1264 (N.M. Ct. App. 2002)(CGL policy); American Guar. & Liab. Ins. V. Ingram Micro, Inc., 2000 WL (D. Ariz. 2000) (First party property policy)

32 DEFINITION Recent court decisions have caused insurers to change standard language to exclude electronic data from the definition of tangible property. Post-2001 changes to standard ISO CGL policy form specify that electronic data are not tangible property.

33 NOT SO FAST Personal and Advertising Injury. Some courts have found data breaches to implicate a person s right to privacy, thereby triggering a duty to defend.

34 PROFESSIONAL LIABILITY INSURANCE Architects & Engineers Accounting Professionals Technology Professionals E.g.: A network designer who creates a flawed network which results in data loss, or that has inadequate data security features that allow a breach

35 DIRECTORS & OFFICERS LIABILITY INSURANCE Failure to Disclose Data Breach In re Heartland Payment Systems, Inc. Securities Litigation, (Civ. No , U.S. District Court, District of New Jersey, December 7, 2009) Negligent failure to disclose data breach, resulting in a significant loss of value of shares, can trigger coverage for a derivative suit.

36 OTHER POLICIES Crime & Fidelity First Party Property Insurance e.g., security breach that results in damage to physical equipment, by a malicious virus or other malware

37 SCOPE OF COVERAGE UNDER CYBER RISK POLICIES Response costs Notification of Consumers Data Recovery Data as damages Loss of use of data Economic Loss

38 CASE STUDIES TJX Zurich v. Fieldstone Eyeblaster v. Federal Ins. Zurich v. Sony Netscape v. Federal Ins.

39 TJX SOME DETAILS TJX 2007 Alberto Gonzalez hacked into their retail system and obtained over 45 million customer credit card numbers and PI. In its SEC filing, TJX disclosed they reserved $118 million to cover response costs. 41 State Attorneys General, banks and shareholders filed suits. FTC investigated. Arguably the impetus for MA law 93H.

40 ZURICH V FIELDSTONE One court, at least, has held that data releases are implicated in covered advertising activities. Zurich American Ins. Co. v. Fieldstone Mortgage Co., 2007 U.S. Dist. LEXIS (D. Md. 2007) E&O coverage insures losses resulting from negligence, omissions, mistakes and errors made in course of providing professional services. Depending on factual circumstances and specific policy wording, coverage may be available for technology-related losses under such policies.

41 EYEBLASTER V FEDERAL INS. Eyeblaster, Inc. v. Federal Insurance Company, 613 F.3d 797 (8 th Cir. 2010). Online marketing campaign company allegedly infected a user s computer with a spyware program, causing lost data and temporary loss of use of his computer. Eyeblaster was sued for trespass and invasion of privacy. Although software, data and other electronic information were excluded under the definition of tangible property, the court found a duty to defend, since the complaint alleged loss of use of tangible property (the computer) that is not physically injured.

42 ZURICH V SONY Hackers compromised over 100,000,000 customer accounts connected to Sony s Playstation, causing over $173,000,000 in response costs by Sony Sony seeks defense and indemnity for class action lawsuits and claims Zurich asserts no duty to defend under CGL policies since there was no bodily injury or property damage

43 NETSCAPE V FEDERAL INS. Netscape Communications Corp. v. Federal Insurance Company, 2009 WL (9th Cir. 2009) -- data mining lawsuits against AOL. Duty to defend arose under the CGL policy s Personal Injury provisions oral or written publication, in any manner, of material that violates a person s right of privacy. Internal distribution of collected information violates a person s right of privacy and is a publication because AOL allegedly had intercepted and internally disseminated private online communications.

44 Stephen Rosenberg Author of Boston ERISA and Insurance Litigation Blog John H. Lacey Author of Massachusetts Data Privacy Law Blog

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF October 9, 2013 1 Cyber Insurance Why? United States Department of Commerce: Cyber Insurance

More information

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Using Insurance Coverage to Mitigate Cybersecurity Risks To Warranty and Service Contract Businesses Barry Buchman, Partner

More information

Cloud Coverage. Authors. Introduction. First-Party Coverage Issues. Cloud Computing Purchasers

Cloud Coverage. Authors. Introduction. First-Party Coverage Issues. Cloud Computing Purchasers Cloud Coverage Transcending the Cloud A Legal Guide to the Risk and Rewards of Cloud Computing Cloud Coverage Authors Richard P. Lewis, Partner rlewis@reedsmith.com Carolyn H. Rosenberg, Partner crosenberg@reedsmith.com

More information

Understanding Professional Liability Insurance

Understanding Professional Liability Insurance Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional

More information

Black Hats, Firewalls, and Data Loss: Insurers Confront Data Breach Litigation

Black Hats, Firewalls, and Data Loss: Insurers Confront Data Breach Litigation Thomas W. Curvin Phillip E. Stano Mark Thibodeaux Tracey K. Ledbetter December 9, 2014 Black Hats, Firewalls, and Data Loss: Insurers Confront Data Breach Litigation INSURANCE AND FINANCIAL SERVICES LITIGATION

More information

Insurance Coverage Law Report

Insurance Coverage Law Report September 2013 Insurance Coverage Law Report From the Editor Our Industry News, and Why It Matters By Steven A. Meyerowitz Feature Articles Data Breaches and the General Liability Policy in a Cyber-World

More information

Cyber and CGL Insurance Coverage for Data Breach Claims

Cyber and CGL Insurance Coverage for Data Breach Claims Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013

INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013 Presenters: Roberta D. Anderson John P. Scordo INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013 Presentation to the Association of Corporate Counsel Western Pennsylvania Chapter Copyright

More information

DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL

DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL State AGs have been very active in the leadership of data privacy protection initiatives across the country, and have dedicated considerable

More information

Cyber Liability. What School Districts Need to Know

Cyber Liability. What School Districts Need to Know Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have

More information

6 Commercial General Liability Insurance

6 Commercial General Liability Insurance 6 Commercial General Liability Insurance I. Overview 6.1 Mark D. Willmarth Deborah A. Hebert II. What Is a CGL Policy? A. Scope of a CGL Policy 6.2 B. Parts of a CGL Policy 6.3 III. The CGL Insuring Agreements

More information

Cyberinsurance: Insuring for Data Breach Risk

Cyberinsurance: Insuring for Data Breach Risk View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

The Evolving Legal Framework Regulating Commercial Data Security Standards

The Evolving Legal Framework Regulating Commercial Data Security Standards The Evolving Legal Framework Regulating Commercial Data Security Standards By Bret Cohen Late one evening in December 2010, an employee of a commercial blood bank left his office with four backup tapes

More information

Insurance for Cyber Risks: Coverage Under CGL and Cyber Policies

Insurance for Cyber Risks: Coverage Under CGL and Cyber Policies ABA Section of Litigation 2012 Insurance Coverage Litigation Committee CLE Seminar, March 1-3, 2012: Insurance coverage for data breaches, denial of service attacks, and cybersecurity events Insurance

More information

Insurance Coverage for Data Security Breaches Evaluating Policy Options, Overcoming Coverage Challenges, Analyzing Litigation Trends

Insurance Coverage for Data Security Breaches Evaluating Policy Options, Overcoming Coverage Challenges, Analyzing Litigation Trends presents Insurance Coverage for Data Security Breaches Evaluating Policy Options, Overcoming Coverage Challenges, Analyzing Litigation Trends A Live 90-Minute Teleconference/Webinar with Interactive Q&A

More information

Insurance Coverage for Cyber Attacks

Insurance Coverage for Cyber Attacks May 2013 The text of this article first appeared in the May 2013 issue of The Insurance Coverage Law Bulletin, Vol. 12, No. 4 Insurance Coverage for Cyber Attacks Part One of a Two-Part Article By Roberta

More information

Cyberinsurance for Financial Institutions

Cyberinsurance for Financial Institutions Cyberinsurance for Financial Institutions PRESENTERS Panelists Patrick Cox, CIPP/US, SVP, CPO, LPL Financial Scott Godes, Partner, Barnes and Thornburg LLP Brent Rieth, VP, Team Leader, Financial Services

More information

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches

More information

Laptop Data Breaches: Mitigating Risks Through Encryption and Liability Insurance. By Julie Machal-Fulks and Robert J. Scott

Laptop Data Breaches: Mitigating Risks Through Encryption and Liability Insurance. By Julie Machal-Fulks and Robert J. Scott Laptop Data Breaches: Mitigating Risks Through Encryption and Liability Insurance By Julie Machal-Fulks and Robert J. Scott Laptop Data Breaches: Mitigating Risks Through Encryption And Liability Insurance

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Cloudy With a Chance Of Risk Management

Cloudy With a Chance Of Risk Management Proudly presents Cloudy With a Chance Of Risk Management Toby Merrill, ACE USA John Mullen, Nelson Levine de Luca & Hamilton Shawn Melito, Immersion Ltd. Michael Trendler, ACE INA Canada What is Cloud

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification

More information

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA. v. MEMORANDUM AND ORDER

UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA. v. MEMORANDUM AND ORDER Case 0:10-cv-00772-PAM-RLE Document 33 Filed 07/13/10 Page 1 of 8 UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Ideal Development Corporation, Mike Fogarty, J.W. Sullivan, George Riches, Warren Kleinsasser,

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President

More information

UNITED STATES COURT OF APPEALS FIFTH CIRCUIT. No. 94-11035. (Summary Calendar) GLEN R. GURLEY and JEAN E. GURLEY, AMERICAN STATES INSURANCE COMPANY,

UNITED STATES COURT OF APPEALS FIFTH CIRCUIT. No. 94-11035. (Summary Calendar) GLEN R. GURLEY and JEAN E. GURLEY, AMERICAN STATES INSURANCE COMPANY, UNITED STATES COURT OF APPEALS FIFTH CIRCUIT No. 94-11035 (Summary Calendar) GLEN R. GURLEY and JEAN E. GURLEY, Plaintiffs-Appellants, versus AMERICAN STATES INSURANCE COMPANY, Defendant-Appellee. Appeal

More information

Cyber Liability. AlaHA Annual Meeting 2013

Cyber Liability. AlaHA Annual Meeting 2013 Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

IP Assets and Infringement Claims: Insurance Coverage Considerations What IP Counsel Must Know to Protect Assets and Defend Against Claims

IP Assets and Infringement Claims: Insurance Coverage Considerations What IP Counsel Must Know to Protect Assets and Defend Against Claims Presenting a live 90 minute webinar with interactive Q&A IP Assets and Infringement Claims: Insurance Coverage Considerations What IP Counsel Must Know to Protect Assets and Defend Against Claims TUESDAY,

More information

TRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith

TRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith TRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith Types of Data at Stake Residents, constituents, employees PII Personally Identifiable

More information

THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal

THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Legal Analysis Data Breach Class Action Litigation A Tough Road for Plaintiffs By Timothy H. Madden Introduction With the increased prevalence

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

Data security: A growing liability threat

Data security: A growing liability threat Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars

More information

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insuring Innovation. CyberFirst Coverage for Technology Companies Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is

More information

Insurers Not Obligated to Defend in ZIP Code Coverage Suits

Insurers Not Obligated to Defend in ZIP Code Coverage Suits Insurers Not Obligated to Defend in ZIP Code Coverage Suits By Bryana Blessinger Hill & Lamb LLP Portland, Oregon Insurers are increasingly faced with privacy and data-breach related claims. One of the

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Insurance Coverage Issues Implicated in Data Breach Claims

Insurance Coverage Issues Implicated in Data Breach Claims Insurance Coverage Issues Implicated in Data Breach Claims Alex E. Potente Sedgwick LLP San Francisco, CA (415) 627-3453 Alex.Potente@sedgwicklaw.com James H. Kallianis, Jr. Meckler Bulger Tilson Marick

More information

Cyber Liability & Data Breach Insurance Claims

Cyber Liability & Data Breach Insurance Claims Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This

More information

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

The Age of Data Breaches:

The Age of Data Breaches: The Age of Data Breaches: HOW TO AVOID BEING THE NEXT HEADLINE MARCH 24, 2015 2015 Epstein Becker & Green, P.C. All Rights Reserved. ebglaw.com This presentation has been provided for informational purposes

More information

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

Cyber Exposure for Credit Unions

Cyber Exposure for Credit Unions Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of

More information

What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage?

What is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage? What is Technology, Media and Professional Services (TMPS) Coverage? TMPS is written to: Protect the company from errors and omissions that occur in the company's rendering or failure to render professional

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

CLASS ACTION. Westlaw Journal. Expert Analysis The State of Coverage Disputes Concerning Advertising And Privacy Claims

CLASS ACTION. Westlaw Journal. Expert Analysis The State of Coverage Disputes Concerning Advertising And Privacy Claims Westlaw Journal CLASS ACTION Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 19, ISSUE 8 / SEPTEMBER 2012 Expert Analysis The State of Coverage Disputes Concerning Advertising

More information

Five Steps To Data Breach Coverage For Card Issuer Liability

Five Steps To Data Breach Coverage For Card Issuer Liability 20 April 2015 Practice Groups: Insurance Coverage Cyber Law and Cybersecurity This article was first published by Law360 on April 17, 2015. Five Steps To Data Breach Coverage For Card Issuer By Roberta

More information

Cyber Liability Insurance: It May Surprise You

Cyber Liability Insurance: It May Surprise You Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,

More information

Cyber-Crime Protection

Cyber-Crime Protection Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living

More information

Insurance for Data Breaches in the Hospitality Industry

Insurance for Data Breaches in the Hospitality Industry The Academy of Hospitality Industry Attorneys The Pl Palmer House Hilton Chicago, IL April 25, 2014 Insurance for Data Breaches in the Hospitality Industry Presenters: David P. Bender, Jr. dbender@andersonkill.com

More information

Is CGL insurance coverage tonic for the data breach blues?

Is CGL insurance coverage tonic for the data breach blues? Is CGL insurance coverage tonic for the data breach blues? 1. Introduction There are only two kinds of companies: those who have been breached and those who will be breached. 1 Data breaches in North America

More information

Indemnity and Insurance Provisions in Commercial Contracts

Indemnity and Insurance Provisions in Commercial Contracts Survey Says: The Feud Over Insurance and Indemnity Provisions in Business Contracts Indemnity and Insurance Provisions in Commercial Contracts Kenneth M. Gorenberg Stefan R. Dandelles Indemnity and insurance

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014

More information

Protecting Social Security Numbers

Protecting Social Security Numbers Protecting Social Security Numbers: Federal Legislation in Sight STEVEN C. BENNETT, MAURICIO F. PAEZ, and Gwendolynne Chen Due to an alarming increase in identity theft crimes, a bipartisan bill, Protecting

More information

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s

More information

Recent Developments in Privacy/Security Litigation

Recent Developments in Privacy/Security Litigation Recent Developments in Privacy/Security Litigation Elizabeth F. Hodge February 25, 2015 Privacy & Security Enforcement HIPAA Office for Civil Rights State Attorneys General Federal Trade Commission (FTC)

More information

COVERAGE UNDER A CGL POLICY. A. CGL coverage is Commercial General Liability Coverage.

COVERAGE UNDER A CGL POLICY. A. CGL coverage is Commercial General Liability Coverage. COVERAGE UNDER A CGL POLICY I. Type of coverage provided by CGL coverage. A. CGL coverage is Commercial General Liability Coverage. B. Generally, a CGL policy provides coverage for the insured s liability

More information

HOT TOPICS IN INSURANCE COVERAGE

HOT TOPICS IN INSURANCE COVERAGE HOT TOPICS IN INSURANCE COVERAGE Cassandra S. Franklin Dickstein Shapiro LLP Los Angeles, CA Susan A. Stone Sidley Austin LLP Chicago, IL Lorelie S. Masters Jenner & Block LLP Washington, DC Andrea B.

More information

Privacy Rights Clearing House

Privacy Rights Clearing House 10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights

More information

Understanding. your Cyber Liability coverage

Understanding. your Cyber Liability coverage Understanding your Cyber Liability coverage TEXAS MEDICAL LIABILITY TRUST 901 S. Mopac Expressway Barton Oaks Plaza V, Suite 500 Austin, TX 78746-5942 P.O. Box 160140 Austin, TX 78716-0140 800-580-8658

More information

Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP

Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements July 14, 2015 Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP Program Overview 1. How to Transfer Risk and

More information

NOT DESIGNATED FOR PUBLICATION * * * * * * *

NOT DESIGNATED FOR PUBLICATION * * * * * * * NOT DESIGNATED FOR PUBLICATION JANE M. LEWIS VERSUS PRESTIGE TITLE INCORPORATED, SOUTHERN MORTGAGE FINANCIAL GROUP, L.L.C. D/B/A FIDELITY LENDING (SOUTHERN), FIRST NATIONAL SECURITY CORPORATION N/K/A LITTON

More information

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies

More information

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division

More information

CyberSecurity for Law Firms

CyberSecurity for Law Firms CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a

More information

Data Breach and Insurance Coverage

Data Breach and Insurance Coverage Data Risk, Privacy Breach and Insurance Coverage David R. Mackenzie 416.597.4890 dmackenzie@blaney.com The advent of cloud computing has meant that the data storage capacity available to business and institutions

More information

Case 4:14-cv-01527 Document 39 Filed in TXSD on 07/08/15 Page 1 of 7 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION ORDER

Case 4:14-cv-01527 Document 39 Filed in TXSD on 07/08/15 Page 1 of 7 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION ORDER Case 4:14-cv-01527 Document 39 Filed in TXSD on 07/08/15 Page 1 of 7 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION CHARTIS SPECIALTY INSURANCE CO., Plaintiff, v. CIVIL ACTION

More information

Reverse and Render in part; Affirm in part; Opinion Filed December 29, 2014. In The Court of Appeals Fifth District of Texas at Dallas

Reverse and Render in part; Affirm in part; Opinion Filed December 29, 2014. In The Court of Appeals Fifth District of Texas at Dallas Reverse and Render in part; Affirm in part; Opinion Filed December 29, 2014. S In The Court of Appeals Fifth District of Texas at Dallas No. 05-13-01546-CV OKLAHOMA SURETY COMPANY, Appellant/Cross-Appellee

More information

Understanding the Business Risk

Understanding the Business Risk AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed

More information

Public charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon:

Public charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon: Public charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon: Scale of operation: revenue, assets, staff. Town,

More information

The need for companies to have a predetermined plan in place in the

The need for companies to have a predetermined plan in place in the Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security

More information

Covenants to Insure in Commercial Agreements. In House Training Seminar Presented by Satinder K. Sidhu March 8, 2013

Covenants to Insure in Commercial Agreements. In House Training Seminar Presented by Satinder K. Sidhu March 8, 2013 Covenants to Insure in Commercial Agreements A Review of the CGL Policy In House Training Seminar Presented by Satinder K. Sidhu March 8, 2013 Introduction & Overview Examples of Covenants to Insure in

More information

Cybersecurity y Managing g the Risks

Cybersecurity y Managing g the Risks Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking

More information

Data Breach Law and Litigation

Data Breach Law and Litigation Technological Evolution The Impact of Social Media, Big Data and Privacy on Business Data Security: Before and After a Breach Occurs Archis A. Parasharami Partner Mayer Brown LLP David Hale Chief Privacy

More information

Appellate Case: 12-1186 Document: 01019007431 Date Filed: 02/25/2013 Page: 1 FILED United States Court of Appeals UNITED STATES COURT OF APPEALS

Appellate Case: 12-1186 Document: 01019007431 Date Filed: 02/25/2013 Page: 1 FILED United States Court of Appeals UNITED STATES COURT OF APPEALS Appellate Case: 12-1186 Document: 01019007431 Date Filed: 02/25/2013 Page: 1 FILED United States Court of Appeals UNITED STATES COURT OF APPEALS Tenth Circuit LLOYD LAND; EILEEN LAND, Plaintiffs-Appellants.

More information

FORC QUARTERLY JOURNAL OF INSURANCE LAW AND REGULATION

FORC QUARTERLY JOURNAL OF INSURANCE LAW AND REGULATION The plaintiff in Schmidt filed suit against her employer, Personalized Audio Visual, Inc. ("PAV") and PAV s president, Dennis Smith ("Smith"). 684 A.2d at 68. Her Complaint alleged several causes of action

More information

United States Workers Compensation/Indemnification Overview

United States Workers Compensation/Indemnification Overview United States Workers Compensation/Indemnification Overview January 18, 2012 Jill Kirila jill.kirila@squiresanders.com Kevin Hess kevin.hess@squiresanders.com 36 Offices in 17 Countries Workers Compensation

More information

So You Think the False Claims Act Does Not Apply to You??

So You Think the False Claims Act Does Not Apply to You?? So You Think the False Claims Act Does Not Apply to You?? By: Marilyn Robertson Husch Blackwell LLP Topics for Discussion I. Introduction II. Elements of a False Claim III. Ways in Which a False Claim

More information

A&E Briefings. Indemnification Clauses: Uninsurable Contractual Liability. Structuring risk management solutions

A&E Briefings. Indemnification Clauses: Uninsurable Contractual Liability. Structuring risk management solutions A&E Briefings Structuring risk management solutions Spring 2012 Indemnification Clauses: Uninsurable Contractual Liability J. Kent Holland, J.D. ConstructionRisk, LLC Professional consultants are judged

More information

Case 8:13-cv-00295-EAK-TGW Document 145 Filed 02/12/15 Page 1 of 12 PageID 5551 UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION

Case 8:13-cv-00295-EAK-TGW Document 145 Filed 02/12/15 Page 1 of 12 PageID 5551 UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION Case 8:13-cv-00295-EAK-TGW Document 145 Filed 02/12/15 Page 1 of 12 PageID 5551 SUMMIT CONTRACTORS, INC., Plaintiff, UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION v. CASE NO. 8:13-CV-295-T-17TGW

More information

Beyond Data Breach: Cyber Trends and Exposures

Beyond Data Breach: Cyber Trends and Exposures Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in

More information

What Data? I m A Trucking Company!

What Data? I m A Trucking Company! What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 marc.tucker@smithmoorelaw.com Presented by: Rob D. Moseley, Jr. 2 West

More information

Our specialist insurance services for Professionals risks

Our specialist insurance services for Professionals risks Our specialist insurance services for Professionals risks Price Forbes & Partners is an independent Lloyd s broker based in the heart of London s insurance sector. We trade with all of the major international

More information

Discussion on Network Security & Privacy Liability Exposures and Insurance

Discussion on Network Security & Privacy Liability Exposures and Insurance Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter

More information

Obtaining Indemnity Through Effective Tender Letters

Obtaining Indemnity Through Effective Tender Letters Page 1 of 5 Portfolio Media. Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com Obtaining Indemnity Through Effective

More information

Insurance Coverage for Data Breaches and Unauthorized Privacy Disclosures

Insurance Coverage for Data Breaches and Unauthorized Privacy Disclosures Chapter 17 Insurance Coverage for Data Breaches and Unauthorized Privacy Disclosures Steven R. Gilford* Proskauer Rose LLP 17:1 Overview 17:2 Applicability of Historic Coverages 17:2.1 First- and Third-Party

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

Employment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty

Employment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty Employment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty Michael Conley, Esq. (267) 216-2707 mconley@andersonkill.com AAPA Port Administration and Legal Issues Seminar Baltimore,

More information

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a

More information

Why Buy Cyber and Privacy Liability When You Have a Perfectly Good Commercial General Liability Program?

Why Buy Cyber and Privacy Liability When You Have a Perfectly Good Commercial General Liability Program? Why Buy Cyber and Privacy Liability When You Have a Perfectly Good Commercial General Liability Program? July 2014 Lockton Companies Cyber and Privacy Liability insurance programs have grown in popularity

More information

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Cyber Exposures Joan D Ambrosio Reported data breaches continue

More information