CYBER RISKS AND COVERAGE: QUESTIONS TO CONSIDER
|
|
- Kathlyn Barber
- 8 years ago
- Views:
Transcription
1 CYBER RISKS AND COVERAGE: QUESTIONS TO CONSIDER Stephen D. Rosenberg, Esq. John H. Lacey, Esq. THE MCCORMACK FIRM, LLC Boston, Massachusetts
2 CURRENT TRENDS IN DATA PROTECTION (or lack thereof) 2011 Year of the Data Breach Every sector of our economy had their turn: 96% of Healthcare businesses suffered a breach in the last 2 years : US Senate FTC Law Enforcement FBI CIA NATO Sony (Ponemon Institute Survey, Dec. 2011) Epsilon RSA Stratfor Michaels Subway Zappos Citi...
3 CURRENT TRENDS IN DATA PROTECTION (or lack thereof) 46 different state breach notification laws Still no corresponding Federal law (industry specific laws excepted)
4 STATE LAWS: Massachusetts M.G.L. 93H 201 CMR law goes into effect 2010 regulations in effect Not merely a notification statute Requires a WISP and encryption technology 2011 A.G. takes action: Over $100K in fines Briar Group Restaurants: $100K Belmont Saving Bank: $7, Last elements come into effect 3 rd Party Contractual Requirements
5 STATE LAWS: New York N.Y. Gen. Bus. Law 899-aa Notification statute Notable Breaches: Jan New York Utilities Data 3 rd party unauthorized access 1.8 million records Feb 2011 NYC Hospitals 1.7 million records Feb 2011 NASDAQ Director s Desk hacked NYC is the epicenter of financial data!!
6 STATE LAWS: Texas Tex. Bus. & Com. Code Tex. Bus. & Com. Code Ann , Notification Statute recently amended, doesn t just apply to Texas resident s data all U.S. Notable Breaches: Sept Tricare 4.9 million records Lawsuit demands $4.9 Bbbbbbbillion March 2011 Texas comptroller breach 3.5 million records One day after Zappos, Texas woman files suit The civil negligence lawsuit seeks unspecified millions of dollars in compensatory and exemplary damages for emotional distress and loss of privacy, along with a court order for the company to pay for customer credit monitoring and identity theft insurance and periodic audits to ensure customer data is secure.
7 PENDING FEDERAL LEGISLATION House of Representatives: H.R Rep. Mary Bono Mack (R) CA SAFE Data Act (Secure and Fortify Electronic Data Act) H.R Rep. Bobby Rush (D) IL Data Accountability and Trust Act H.R Rep. Cliff Stearns (R) FL Data Accountability and Trust Act of 2011 (DATA)
8 PENDING FEDERAL LEGISLATION United States Senate: S Sen. Patrick Leahy (D) VT Personal Data Privacy and Security Act of 2011 S Sen. Mark Pryor (D) AR Data Security and Breach Notification Act of 2011 S Sen. Dianne Feinstein (D) CA Data Breach Notification Act of 2011
9 PENDING FEDERAL LEGISLATION STATUS House Bills: H.R SAFE Data Act Bono Mack Currently in House Energy and Commerce Committee H.R DATA Act Bobby Rush Currently in House Energy and Commerce Sub-Committee H.R DATA Act of 2011 Stearns Currently in House Energy and Commerce Sub-Committee
10 Senate Bills: PENDING FEDERAL LEGISLATION STATUS S Senator Leahy Sep 22, 2011: Placed on Senate Legislative Calendar under General Orders. Calendar No. 181 S Senator Pryor Sep 22, 2011: Placed on Senate Legislative Calendar under General Orders. Calendar No. 181 S Senator Feinstein Sep 22, 2011: Placed on Senate Legislative Calendar under General Orders. Calendar No. 181
11 What is it? PERSONAL INFORMATION PI or PII or PHI or SPII or??? Inconsistent definitions cause confusion. Where is it? Everywhere. Paper, electronic, scanner, printers, fax. If you have information, then you have responsibilities!
12 POSSIBLE PITFALLS Lost laptop what was on it? Lost USB memory stick what was on it? Misdirected with attachment Improper disposal: paper, old computers and printers Malicious insider can be profitable to steal Government doesn t care if it was a mistake Watch your third-party record holders
13 AWARENESS AND PREPARATION Take a mental note of the places you keep information. Ask yourself If I lost it, what would I do next? Would you know what you lost? Who to tell? Does your company have internal controls for reporting a data breach, even a suspected one? Everyone uses hindsight to analyze a data breach and it can be ugly!
14 LITIGATION Trolls Blunderbuss Approach by Plaintiffs Numerous class actions filed against breaching entities immediately after media reports Most dismissed lack of cognizable harm Some settled BIG numbers Big Data = Big Numbers
15 THE DOWNSIDE TO LOSING INFORMATION Response costs - $214 per record (Ponemon) Brand damage stock price damage Fines Lawsuits Individuals suffering identity theft Credit Card industry fines Business interruption
16 And now, a short story... Ramnicu Valcea, Romania Population 120,000
17 Ramnicu Valcea, Romania A Mercedez-Benz dealership. In a field?
18 Ramnicu Valcea, Romania 24 Western Union locations. In a four block area? As originally reported in WIRED Magazine, Jan 31, 2010 by Yudhijit Bhattacharjee
19 WHAT HAPPENS TO THE STOLEN DATA?
20 YOUR INSUREDS Who are they? What industry? What information do they have? Do they have sufficient internal controls? What is their exposure? What is your exposure? What does the policy cover? Are you sure?
21 Part Two
22 COUNTLESS SCENARIOS There are a broad range of cyber crimes: some directed at customers, while some attempt to disable a company s operations A disgruntled employee, for example, may introduce a virus that shuts down a company computer system Hackers may steal intellectual property or customer s identities Even accidental data releases can lead to substantial liability Multiple sources of insurance coverage for such cyber crimes
23 WHAT TYPES OF POLICIES MAY BE TRIGGERED BY A CYBER RISK? Dedicated cyber risk policies and/or endorsements: LexCyberSecure Specialty Risk Protector NetAdvantage CGL policies Professional Liability D&O Crime & Fidelity First Party Property
24 CYBER RISK POLICIES What risks are actually covered? Chartis Specialty Risk Protector Coverage: Privacy Event : Failure to protect Confidential Information, including identity theft Failure to disclose a breach of Confidential Information in violation of any Security Breach Notice Law Violation of any state or federal privacy statute in connection with a Claim for damages
25 CYBER RISK POLICIES Definition of covered Loss : Compensatory damages, judgments, settlements, pre/post-judgment interest and Defense Costs Money the insured is required by law or has agreed to by settlement to deposit into a consumer redress fund
26 NON-CYBER POLICIES MAY APPLY Although many insurers now offer cyber-coverage, coverage may still lie under other existing common policies and provisions, such as: Personal or Advertising injury clause in CGL policies, D&O policies, and E&O policies
27 NON-CYBER POLICIES MAY APPLY Most companies have first-party property insurance and/or CGL policy to cover third party losses. Both types of policies cover property damage, traditionally defined as physical injury to tangible property. The critical question for such properties is whether technology losses fall within this definition.
28 A COURT S VIEW Courts have been consistent in holding that hardware defects that cause physical injury to computer components are covered. See, e.g.: Retail Sys., Inc. v. CAN Ins. Co., 469 N.W. 2d 735 (Minn. Ct. App. 1991); Lambrect & Associates, Inc. v. State Farm Lloyds, 119 S.W. 3d 16 (Tex. Appt. Ct. 2003)
29 CGL POLICIES AND A QUESTION Is data considered to be tangible property that is subject to covered damage under a standard CGL policy?
30 COURT S VIEW Courts are split on whether an insurer is liable if the damage occurs to software or electronic data Some court have held electronic data are NOT tangible, and thus loss of data is NOT property damage. America Online, Inc. v. St. Paul Mercury Ins. Co., 347 F. 3d 89 (4 th Cir. 2003) (no duty to defend under CGL policy because computer data and software not tangible. ); Eyeblaster, Inc. v. Federal Ins. Co., 613 F.3d 797, 801 (8 th Cir. 2010); Ward General Ins. Services v. Employer s Fire Ins. Co., 114 Cal. App. 4 th 548 (Under first party property policy electronic data do not have material existence. )
31 COURT S VIEW Other courts, however, have found electronic data to constitute tangible property, such that its loss constitutes property damage. Computer Corner v. Fireman s Fund Ins. Co., 46 P. 3d 1264 (N.M. Ct. App. 2002)(CGL policy); American Guar. & Liab. Ins. V. Ingram Micro, Inc., 2000 WL (D. Ariz. 2000) (First party property policy)
32 DEFINITION Recent court decisions have caused insurers to change standard language to exclude electronic data from the definition of tangible property. Post-2001 changes to standard ISO CGL policy form specify that electronic data are not tangible property.
33 NOT SO FAST Personal and Advertising Injury. Some courts have found data breaches to implicate a person s right to privacy, thereby triggering a duty to defend.
34 PROFESSIONAL LIABILITY INSURANCE Architects & Engineers Accounting Professionals Technology Professionals E.g.: A network designer who creates a flawed network which results in data loss, or that has inadequate data security features that allow a breach
35 DIRECTORS & OFFICERS LIABILITY INSURANCE Failure to Disclose Data Breach In re Heartland Payment Systems, Inc. Securities Litigation, (Civ. No , U.S. District Court, District of New Jersey, December 7, 2009) Negligent failure to disclose data breach, resulting in a significant loss of value of shares, can trigger coverage for a derivative suit.
36 OTHER POLICIES Crime & Fidelity First Party Property Insurance e.g., security breach that results in damage to physical equipment, by a malicious virus or other malware
37 SCOPE OF COVERAGE UNDER CYBER RISK POLICIES Response costs Notification of Consumers Data Recovery Data as damages Loss of use of data Economic Loss
38 CASE STUDIES TJX Zurich v. Fieldstone Eyeblaster v. Federal Ins. Zurich v. Sony Netscape v. Federal Ins.
39 TJX SOME DETAILS TJX 2007 Alberto Gonzalez hacked into their retail system and obtained over 45 million customer credit card numbers and PI. In its SEC filing, TJX disclosed they reserved $118 million to cover response costs. 41 State Attorneys General, banks and shareholders filed suits. FTC investigated. Arguably the impetus for MA law 93H.
40 ZURICH V FIELDSTONE One court, at least, has held that data releases are implicated in covered advertising activities. Zurich American Ins. Co. v. Fieldstone Mortgage Co., 2007 U.S. Dist. LEXIS (D. Md. 2007) E&O coverage insures losses resulting from negligence, omissions, mistakes and errors made in course of providing professional services. Depending on factual circumstances and specific policy wording, coverage may be available for technology-related losses under such policies.
41 EYEBLASTER V FEDERAL INS. Eyeblaster, Inc. v. Federal Insurance Company, 613 F.3d 797 (8 th Cir. 2010). Online marketing campaign company allegedly infected a user s computer with a spyware program, causing lost data and temporary loss of use of his computer. Eyeblaster was sued for trespass and invasion of privacy. Although software, data and other electronic information were excluded under the definition of tangible property, the court found a duty to defend, since the complaint alleged loss of use of tangible property (the computer) that is not physically injured.
42 ZURICH V SONY Hackers compromised over 100,000,000 customer accounts connected to Sony s Playstation, causing over $173,000,000 in response costs by Sony Sony seeks defense and indemnity for class action lawsuits and claims Zurich asserts no duty to defend under CGL policies since there was no bodily injury or property damage
43 NETSCAPE V FEDERAL INS. Netscape Communications Corp. v. Federal Insurance Company, 2009 WL (9th Cir. 2009) -- data mining lawsuits against AOL. Duty to defend arose under the CGL policy s Personal Injury provisions oral or written publication, in any manner, of material that violates a person s right of privacy. Internal distribution of collected information violates a person s right of privacy and is a publication because AOL allegedly had intercepted and internally disseminated private online communications.
44 Stephen Rosenberg Author of Boston ERISA and Insurance Litigation Blog John H. Lacey Author of Massachusetts Data Privacy Law Blog
Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF
Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF October 9, 2013 1 Cyber Insurance Why? United States Department of Commerce: Cyber Insurance
More informationSecond Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL
Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Using Insurance Coverage to Mitigate Cybersecurity Risks To Warranty and Service Contract Businesses Barry Buchman, Partner
More informationCloud Coverage. Authors. Introduction. First-Party Coverage Issues. Cloud Computing Purchasers
Cloud Coverage Transcending the Cloud A Legal Guide to the Risk and Rewards of Cloud Computing Cloud Coverage Authors Richard P. Lewis, Partner rlewis@reedsmith.com Carolyn H. Rosenberg, Partner crosenberg@reedsmith.com
More informationUnderstanding Professional Liability Insurance
Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional
More informationBlack Hats, Firewalls, and Data Loss: Insurers Confront Data Breach Litigation
Thomas W. Curvin Phillip E. Stano Mark Thibodeaux Tracey K. Ledbetter December 9, 2014 Black Hats, Firewalls, and Data Loss: Insurers Confront Data Breach Litigation INSURANCE AND FINANCIAL SERVICES LITIGATION
More informationInsurance Coverage Law Report
September 2013 Insurance Coverage Law Report From the Editor Our Industry News, and Why It Matters By Steven A. Meyerowitz Feature Articles Data Breaches and the General Liability Policy in a Cyber-World
More informationCyber and CGL Insurance Coverage for Data Breach Claims
Cyber and CGL Insurance Coverage for Data Breach Claims Paula Weseman Theisen, Partner Data breach overview Definition of data breach/types Data breach costs Data breach legal claims and damages Cyber-insurance
More informationCyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day
Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014
More informationINSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013
Presenters: Roberta D. Anderson John P. Scordo INSURANCE COVERAGE FOR CYBER RISKS AND REALITIES September 24, 2013 Presentation to the Association of Corporate Counsel Western Pennsylvania Chapter Copyright
More informationDATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL
DATA PRIVACY ENFORCEMENT EFFORTS BY STATE ATTORNEYS GENERAL State AGs have been very active in the leadership of data privacy protection initiatives across the country, and have dedicated considerable
More informationCyber Liability. What School Districts Need to Know
Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have
More information6 Commercial General Liability Insurance
6 Commercial General Liability Insurance I. Overview 6.1 Mark D. Willmarth Deborah A. Hebert II. What Is a CGL Policy? A. Scope of a CGL Policy 6.2 B. Parts of a CGL Policy 6.3 III. The CGL Insuring Agreements
More informationCyberinsurance: Insuring for Data Breach Risk
View the online version at http://us.practicallaw.com/2-588-8785 Cyberinsurance: Insuring for Data Breach Risk JUDY SELBY AND C. ZACHARY ROSENBERG, BAKER HOSTETLER LLP, WITH PRACTICAL LAW INTELLECTUAL
More informationReducing Risk. Raising Expectations. CyberRisk and Professional Liability
Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationThe Evolving Legal Framework Regulating Commercial Data Security Standards
The Evolving Legal Framework Regulating Commercial Data Security Standards By Bret Cohen Late one evening in December 2010, an employee of a commercial blood bank left his office with four backup tapes
More informationInsurance for Cyber Risks: Coverage Under CGL and Cyber Policies
ABA Section of Litigation 2012 Insurance Coverage Litigation Committee CLE Seminar, March 1-3, 2012: Insurance coverage for data breaches, denial of service attacks, and cybersecurity events Insurance
More informationInsurance Coverage for Data Security Breaches Evaluating Policy Options, Overcoming Coverage Challenges, Analyzing Litigation Trends
presents Insurance Coverage for Data Security Breaches Evaluating Policy Options, Overcoming Coverage Challenges, Analyzing Litigation Trends A Live 90-Minute Teleconference/Webinar with Interactive Q&A
More informationInsurance Coverage for Cyber Attacks
May 2013 The text of this article first appeared in the May 2013 issue of The Insurance Coverage Law Bulletin, Vol. 12, No. 4 Insurance Coverage for Cyber Attacks Part One of a Two-Part Article By Roberta
More informationCyberinsurance for Financial Institutions
Cyberinsurance for Financial Institutions PRESENTERS Panelists Patrick Cox, CIPP/US, SVP, CPO, LPL Financial Scott Godes, Partner, Barnes and Thornburg LLP Brent Rieth, VP, Team Leader, Financial Services
More informationData Security Breaches: Learn more about two new regulations and how to help reduce your risks
Data Security Breaches: Learn more about two new regulations and how to help reduce your risks By Susan Salpeter, Vice President, Zurich Healthcare Risk Management News stories about data security breaches
More informationLaptop Data Breaches: Mitigating Risks Through Encryption and Liability Insurance. By Julie Machal-Fulks and Robert J. Scott
Laptop Data Breaches: Mitigating Risks Through Encryption and Liability Insurance By Julie Machal-Fulks and Robert J. Scott Laptop Data Breaches: Mitigating Risks Through Encryption And Liability Insurance
More informationData breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
More informationCloudy With a Chance Of Risk Management
Proudly presents Cloudy With a Chance Of Risk Management Toby Merrill, ACE USA John Mullen, Nelson Levine de Luca & Hamilton Shawn Melito, Immersion Ltd. Michael Trendler, ACE INA Canada What is Cloud
More informationData breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
More informationCYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America
CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification
More informationUNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA. v. MEMORANDUM AND ORDER
Case 0:10-cv-00772-PAM-RLE Document 33 Filed 07/13/10 Page 1 of 8 UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA Ideal Development Corporation, Mike Fogarty, J.W. Sullivan, George Riches, Warren Kleinsasser,
More informationJoe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
More informationCAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President
More informationUNITED STATES COURT OF APPEALS FIFTH CIRCUIT. No. 94-11035. (Summary Calendar) GLEN R. GURLEY and JEAN E. GURLEY, AMERICAN STATES INSURANCE COMPANY,
UNITED STATES COURT OF APPEALS FIFTH CIRCUIT No. 94-11035 (Summary Calendar) GLEN R. GURLEY and JEAN E. GURLEY, Plaintiffs-Appellants, versus AMERICAN STATES INSURANCE COMPANY, Defendant-Appellee. Appeal
More informationCyber Liability. AlaHA Annual Meeting 2013
Cyber Liability AlaHA Annual Meeting 2013 Disclaimer We are not providing legal advise. This Presentation is a broad overview of health care cyber loss exposures, the process in the event of loss and coverages
More informationCyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationIP Assets and Infringement Claims: Insurance Coverage Considerations What IP Counsel Must Know to Protect Assets and Defend Against Claims
Presenting a live 90 minute webinar with interactive Q&A IP Assets and Infringement Claims: Insurance Coverage Considerations What IP Counsel Must Know to Protect Assets and Defend Against Claims TUESDAY,
More informationTRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith
TRENDS IN CYBER LIABILITY Presented by Chris DiIenno Data Privacy and Network Security Group Lewis Brisbois Bisgaard & Smith Types of Data at Stake Residents, constituents, employees PII Personally Identifiable
More informationTHE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal
THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Legal Analysis Data Breach Class Action Litigation A Tough Road for Plaintiffs By Timothy H. Madden Introduction With the increased prevalence
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationCyber and Privacy Risk What Are the Trends? Is Insurance the Answer?
Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information
More informationData security: A growing liability threat
Data security: A growing liability threat Data security breaches occur with alarming frequency in today s technology-laden world. Even a comparatively moderate breach can cost a company millions of dollars
More informationInsuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
More informationInsurers Not Obligated to Defend in ZIP Code Coverage Suits
Insurers Not Obligated to Defend in ZIP Code Coverage Suits By Bryana Blessinger Hill & Lamb LLP Portland, Oregon Insurers are increasingly faced with privacy and data-breach related claims. One of the
More informationInsurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
More informationInsurance Coverage Issues Implicated in Data Breach Claims
Insurance Coverage Issues Implicated in Data Breach Claims Alex E. Potente Sedgwick LLP San Francisco, CA (415) 627-3453 Alex.Potente@sedgwicklaw.com James H. Kallianis, Jr. Meckler Bulger Tilson Marick
More informationCyber Liability & Data Breach Insurance Claims
Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This
More informationThe Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor
The Matrix Reloaded: Cybersecurity and Data Protection for Employers Jodi D. Taylor Why Talk About This Now? Landscape is changing Enforcement by federal and state governments on the rise Legislation on
More informationcyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
More informationThe Age of Data Breaches:
The Age of Data Breaches: HOW TO AVOID BEING THE NEXT HEADLINE MARCH 24, 2015 2015 Epstein Becker & Green, P.C. All Rights Reserved. ebglaw.com This presentation has been provided for informational purposes
More informationManaging Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
More informationManaging Cyber & Privacy Risks
Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past
More informationCyber Exposure for Credit Unions
Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of
More informationWhat is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage?
What is Technology, Media and Professional Services (TMPS) Coverage? TMPS is written to: Protect the company from errors and omissions that occur in the company's rendering or failure to render professional
More informationDATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
More informationCLASS ACTION. Westlaw Journal. Expert Analysis The State of Coverage Disputes Concerning Advertising And Privacy Claims
Westlaw Journal CLASS ACTION Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 19, ISSUE 8 / SEPTEMBER 2012 Expert Analysis The State of Coverage Disputes Concerning Advertising
More informationFive Steps To Data Breach Coverage For Card Issuer Liability
20 April 2015 Practice Groups: Insurance Coverage Cyber Law and Cybersecurity This article was first published by Law360 on April 17, 2015. Five Steps To Data Breach Coverage For Card Issuer By Roberta
More informationCyber Liability Insurance: It May Surprise You
Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,
More informationCyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
More informationInsurance for Data Breaches in the Hospitality Industry
The Academy of Hospitality Industry Attorneys The Pl Palmer House Hilton Chicago, IL April 25, 2014 Insurance for Data Breaches in the Hospitality Industry Presenters: David P. Bender, Jr. dbender@andersonkill.com
More informationIs CGL insurance coverage tonic for the data breach blues?
Is CGL insurance coverage tonic for the data breach blues? 1. Introduction There are only two kinds of companies: those who have been breached and those who will be breached. 1 Data breaches in North America
More informationIndemnity and Insurance Provisions in Commercial Contracts
Survey Says: The Feud Over Insurance and Indemnity Provisions in Business Contracts Indemnity and Insurance Provisions in Commercial Contracts Kenneth M. Gorenberg Stefan R. Dandelles Indemnity and insurance
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
More informationProtecting Social Security Numbers
Protecting Social Security Numbers: Federal Legislation in Sight STEVEN C. BENNETT, MAURICIO F. PAEZ, and Gwendolynne Chen Due to an alarming increase in identity theft crimes, a bipartisan bill, Protecting
More informationSummary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum
Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s
More informationRecent Developments in Privacy/Security Litigation
Recent Developments in Privacy/Security Litigation Elizabeth F. Hodge February 25, 2015 Privacy & Security Enforcement HIPAA Office for Civil Rights State Attorneys General Federal Trade Commission (FTC)
More informationCOVERAGE UNDER A CGL POLICY. A. CGL coverage is Commercial General Liability Coverage.
COVERAGE UNDER A CGL POLICY I. Type of coverage provided by CGL coverage. A. CGL coverage is Commercial General Liability Coverage. B. Generally, a CGL policy provides coverage for the insured s liability
More informationHOT TOPICS IN INSURANCE COVERAGE
HOT TOPICS IN INSURANCE COVERAGE Cassandra S. Franklin Dickstein Shapiro LLP Los Angeles, CA Susan A. Stone Sidley Austin LLP Chicago, IL Lorelie S. Masters Jenner & Block LLP Washington, DC Andrea B.
More informationPrivacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
More informationUnderstanding. your Cyber Liability coverage
Understanding your Cyber Liability coverage TEXAS MEDICAL LIABILITY TRUST 901 S. Mopac Expressway Barton Oaks Plaza V, Suite 500 Austin, TX 78746-5942 P.O. Box 160140 Austin, TX 78716-0140 800-580-8658
More informationAre You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements. Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP
Are You Covered? Understanding Vendor Endorsements and Harmonizing Risk Transfer Arrangements July 14, 2015 Kevin B. Dreher & Jennifer D. Katz Reed Smith LLP Program Overview 1. How to Transfer Risk and
More informationNOT DESIGNATED FOR PUBLICATION * * * * * * *
NOT DESIGNATED FOR PUBLICATION JANE M. LEWIS VERSUS PRESTIGE TITLE INCORPORATED, SOUTHERN MORTGAGE FINANCIAL GROUP, L.L.C. D/B/A FIDELITY LENDING (SOUTHERN), FIRST NATIONAL SECURITY CORPORATION N/K/A LITTON
More informationManaging Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal
Managing Cyber Threats Risk Management & Insurance Solutions Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal Overview Recent Trends and Loss Exposures Risk Management Strategies
More informationData Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division
More informationCyberSecurity for Law Firms
CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a
More informationData Breach and Insurance Coverage
Data Risk, Privacy Breach and Insurance Coverage David R. Mackenzie 416.597.4890 dmackenzie@blaney.com The advent of cloud computing has meant that the data storage capacity available to business and institutions
More informationCase 4:14-cv-01527 Document 39 Filed in TXSD on 07/08/15 Page 1 of 7 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION ORDER
Case 4:14-cv-01527 Document 39 Filed in TXSD on 07/08/15 Page 1 of 7 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF TEXAS HOUSTON DIVISION CHARTIS SPECIALTY INSURANCE CO., Plaintiff, v. CIVIL ACTION
More informationReverse and Render in part; Affirm in part; Opinion Filed December 29, 2014. In The Court of Appeals Fifth District of Texas at Dallas
Reverse and Render in part; Affirm in part; Opinion Filed December 29, 2014. S In The Court of Appeals Fifth District of Texas at Dallas No. 05-13-01546-CV OKLAHOMA SURETY COMPANY, Appellant/Cross-Appellee
More informationUnderstanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed
More informationPublic charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon:
Public charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon: Scale of operation: revenue, assets, staff. Town,
More informationThe need for companies to have a predetermined plan in place in the
Companies Must Prepare for Data Theft TIMOTHY J. CARROLL, BRUCE A. RADKE, AND MICHAEL J. WATERS The authors discuss steps that companies can take to mitigate the risks of, or damages caused by, a security
More informationCovenants to Insure in Commercial Agreements. In House Training Seminar Presented by Satinder K. Sidhu March 8, 2013
Covenants to Insure in Commercial Agreements A Review of the CGL Policy In House Training Seminar Presented by Satinder K. Sidhu March 8, 2013 Introduction & Overview Examples of Covenants to Insure in
More informationCybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
More informationData Breach Law and Litigation
Technological Evolution The Impact of Social Media, Big Data and Privacy on Business Data Security: Before and After a Breach Occurs Archis A. Parasharami Partner Mayer Brown LLP David Hale Chief Privacy
More informationAppellate Case: 12-1186 Document: 01019007431 Date Filed: 02/25/2013 Page: 1 FILED United States Court of Appeals UNITED STATES COURT OF APPEALS
Appellate Case: 12-1186 Document: 01019007431 Date Filed: 02/25/2013 Page: 1 FILED United States Court of Appeals UNITED STATES COURT OF APPEALS Tenth Circuit LLOYD LAND; EILEEN LAND, Plaintiffs-Appellants.
More informationFORC QUARTERLY JOURNAL OF INSURANCE LAW AND REGULATION
The plaintiff in Schmidt filed suit against her employer, Personalized Audio Visual, Inc. ("PAV") and PAV s president, Dennis Smith ("Smith"). 684 A.2d at 68. Her Complaint alleged several causes of action
More informationUnited States Workers Compensation/Indemnification Overview
United States Workers Compensation/Indemnification Overview January 18, 2012 Jill Kirila jill.kirila@squiresanders.com Kevin Hess kevin.hess@squiresanders.com 36 Offices in 17 Countries Workers Compensation
More informationSo You Think the False Claims Act Does Not Apply to You??
So You Think the False Claims Act Does Not Apply to You?? By: Marilyn Robertson Husch Blackwell LLP Topics for Discussion I. Introduction II. Elements of a False Claim III. Ways in Which a False Claim
More informationA&E Briefings. Indemnification Clauses: Uninsurable Contractual Liability. Structuring risk management solutions
A&E Briefings Structuring risk management solutions Spring 2012 Indemnification Clauses: Uninsurable Contractual Liability J. Kent Holland, J.D. ConstructionRisk, LLC Professional consultants are judged
More informationCase 8:13-cv-00295-EAK-TGW Document 145 Filed 02/12/15 Page 1 of 12 PageID 5551 UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION
Case 8:13-cv-00295-EAK-TGW Document 145 Filed 02/12/15 Page 1 of 12 PageID 5551 SUMMIT CONTRACTORS, INC., Plaintiff, UNITED STATES DISTRICT COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION v. CASE NO. 8:13-CV-295-T-17TGW
More informationBeyond Data Breach: Cyber Trends and Exposures
Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in
More informationWhat Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 marc.tucker@smithmoorelaw.com Presented by: Rob D. Moseley, Jr. 2 West
More informationOur specialist insurance services for Professionals risks
Our specialist insurance services for Professionals risks Price Forbes & Partners is an independent Lloyd s broker based in the heart of London s insurance sector. We trade with all of the major international
More informationDiscussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
More informationObtaining Indemnity Through Effective Tender Letters
Page 1 of 5 Portfolio Media. Inc. 648 Broadway, Suite 200 New York, NY 10012 www.law360.com Phone: +1 212 537 6331 Fax: +1 212 537 6371 customerservice@portfoliomedia.com Obtaining Indemnity Through Effective
More informationInsurance Coverage for Data Breaches and Unauthorized Privacy Disclosures
Chapter 17 Insurance Coverage for Data Breaches and Unauthorized Privacy Disclosures Steven R. Gilford* Proskauer Rose LLP 17:1 Overview 17:2 Applicability of Historic Coverages 17:2.1 First- and Third-Party
More informationWritten Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
More informationEmployment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty
Employment Practices Liability Insurance and Insurance Coverage for Employee Dishonesty Michael Conley, Esq. (267) 216-2707 mconley@andersonkill.com AAPA Port Administration and Legal Issues Seminar Baltimore,
More informationCyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029
Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a
More informationWhy Buy Cyber and Privacy Liability When You Have a Perfectly Good Commercial General Liability Program?
Why Buy Cyber and Privacy Liability When You Have a Perfectly Good Commercial General Liability Program? July 2014 Lockton Companies Cyber and Privacy Liability insurance programs have grown in popularity
More informationIs Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014
Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Cyber Exposures Joan D Ambrosio Reported data breaches continue
More information