April Cyber risks: Understanding your insurance protection
|
|
- Lynn Bradford
- 8 years ago
- Views:
Transcription
1 April 2011 Cyber risks: Understanding your insurance protection
2 The information contained in this paper provides only a general overview of subjects covered. It is not intended to be taken as advice regarding any individual situation or policy and should not be relied upon as such. Statements concerning legal matters should be understood to be general observations based solely on our experience as insurance brokers and risk consultants and should not be relied upon as legal advice, which we are not authorized to provide. All such matters should be reviewed with the client s own qualified legal advisors in these areas. 11/0086
3 Introduction Today, information constitutes a significant portion of a company s assets, which is predominately stored electronically and shared over networks 1. What would happen if these vital corporate assets were stolen, disclosed, lost, destroyed or corrupted? How many companies or businesses could function without the information they send and receive on sophisticated information networks? A growing appreciation of the dependency on and importance of e-commerce, coupled with the ever increasing levels of cyber attacks, has sparked debate on the need for and availability of appropriate insurance coverage. The development and evolution of cyber risks mean that traditional insurance policies now have limitations when it comes to responding to these risks, which, at the same time, are increasingly prevalent for businesses. This paper examines some of the areas where cyber risks may fall outside the scope of traditional policies and looks at how businesses can find protection in the current insurance market. Melita Simic Managing Principal Financial & Professional Services April Examples include accounting information, intellectual property, customer/client details, competitive information and supplier information. 1
4 What is cyber risk? Cyber risk in general terms refers to the potential losses and liabilities arising out of the use of e-commerce. E-commerce, broadly speaking, is the application of technology towards the automation of business transactions. It consists of businesses connecting their critical business systems directly to their critical constituencies such as customers, employees, suppliers, vendors and business partners utilising internet based technologies. While the benefits of employing e-commerce strategies and internet based technologies are numerous, so are the risks. Cyber risks can be broadly categorised into the following: 1) Content risks 2) Technical risks 1) Content risks A company is responsible for all and any information posted on its web site. This means that a company may be exposed to liability for: Negligence if information appearing on its website is incorrect and results in an individual suffering loss Breach of contract or for misleading and deceptive conduct if the information appearing on its website is incorrect or misleading and deceptive and induces a party (or is relied on) to enter into a contact with the company online Any defamatory material appearing on its website or which is transmitted from its systems/servers across the internet Intellectual property infringement, encompassing copyright material (text, design and other graphics, photographs, software and the like), trademarks and logos, proprietary information (sales records, marketing plans, customer files), trade secrets and patented inventions False advertising or advertising infringement as a result of over exuberance in advertising Claims for breach of confidential information and/or privacy A company may also potentially be liable (for any of the above) under any given number of acts, codes, rules and regulations, which can result in hefty fines and criminal penalties. Additionally, the web site owner may be subject to different laws of different jurisdictions since web content appears worldwide. The list provided above is by no means exhaustive. The law remains uncertain as it evolves to take account of new cyber realities. 2
5 Content risks Liability under acts, codes, rules and regulations Breach of private and confidential information Intellectual property infringement Negligence Misleading and deceptive conduct WEBSITE INFORMATION Breach of privacy False advertising Different laws of different jurisdiction Breach of contract Defamation 2) Technical risks In addition to exposure to content risks, a company is also constantly open to a number of technical risks, and must consider the following: The transmission of information across the internet brings with it the risk of unauthorised access, human (programming) and/or other technical errors Any company connected to the internet is susceptible to an assortment of viruses, malicious codes or trojan horses, which can result in legal liabilities as well as damage to or destruction of valuable information assets, disruptions to service and financial loss Cyber extortion may occur when hackers steal or threaten to steal company information for the purposes of selling it back to them Information networks give employees unprecedented access to business information. Employees can use a company s computer network to destroy information or steal it to sell. Since most e-theft involves the copying of information and data, a company may not know that its information or data has been stolen until it appears somewhere else Deliberate overloading of web servers can cause a web server to crash, bringing to a halt internet trading and other on line operations The security of proprietary information in electronic form is a major risk area because of the high potential for loss, theft or unauthorised use of electronic data. In part, this is due to the fact that lost or stolen data can result in the violation of privacy rights. If hackers can get into the Pentagon, would it not be easy for them to get into your networks? 3
6 4
7 First party losses and third party liabilities From our examination of the range of cyber risks, it is evident that they can result in both: 1) First party losses 2) Third party liabilities 1) First party losses First party losses refer to direct losses sustained by the company stemming from the use of e-commerce or internet related activities. Examples include: (a) Damage to property consisting of intangible assets namely software (programs) and data (b) Business interruption (c) Theft of proprietary information or consumer data These can all occur as a result of one or more of the following cyber perils: (i) Hackers (external and internal) (ii) Viruses (iii) Extortion (iv) Programming errors (v) Power surges and the like leading to network or system failures 2) Third party liabilities Third party liabilities concern a company s liability to third parties for sustained losses arising out of the company s use (namely wrongful use) of e-commerce or internet related activities. Examples include: (a) Damage to third party property consisting of intangible assets, namely software (programs) and data and or financial losses as a result of: (i) Denial of access (ii) Insufficient measures used to protect third party from computer crime (iii) Spread of a computer virus (iv) Failure of software (v) Programming errors leading to network or system failures or loss of expected goods and services. (b) Intellectual property infringements encompassing software patents, copyrights, trade secrets, trade marks (c) Defamation, libel and slander (d) Invasion of privacy (e) Unfair competition or false and misleading advertising (f) Unauthorised use of confidential information 5
8 Traditional policies and cyber risks More often than not, cyber risks fall outside the realm of traditional insurance policies. The reason for this is twofold. Firstly, traditional insurance policies were developed long before the evolution of cyber risks. Consequently, cyber risks do not fit neatly within existing definitions and exclusions 2. A review of traditional insurance policies indicates that there are several gaps in coverage for cyber risks. Some of the problems with standard policies in relation to cyber risks include the following: There isn t always a trigger that creates an insured event. For instance, general liability and property policies were developed to respond to liabilities and natural perils (e.g. fire, hail, earthquakes) that damaged physical assets. Under property policies, business interruption is generally triggered if there is direct physical damage. Crime policies similarly provide cover to predominantely tangible property. Cyber risks on the other hand are largely intangible, caused by human error, or the result of malicious attacks and crimes. Most general liability policies do not cover economic loss or professional services, precluding most cyber risk damages The theft of intellectual property (given that intellectual property is considered an intangible asset) is not addressed by most policies 3 Crime policies often contain confusing exclusions and limitations when it comes to employee dishonesty and computer fraud Coverage may not exist for third party losses due to computer viruses or unauthorised access to private and confidential information Advertising injury coverage under general liability policies does not completely address intellectual property infringement, content and advertising offences over the internet Many companies do not have errors and omissions policies, and where they do, such policies often contain security breach exclusions Professional liability policies may exclude coverage because the internet related work may go beyond the scope of an insured s current professional services Many insurance policies have geographical limitations; the internet does not Secondly, insurers are attempting to limit their liability for cyber risks by incorporating additional exclusions into traditional policies. There are a number of reasons for this. Insurers do not want to expose themselves to risks they did not intend to cover when they wrote the traditional policies and for which they did not charge a premium, particularly when there is a lack of definition and quantification of these risks and little historical data. As a result, companies are finding that, while their cyber risks are expanding significantly, the coverage available for these exposures under traditional policies is shrinking creating serious coverage gaps for companies looking to safeguard their systems and intangible assets. 2. Some general insurance policies may however provide elements of cyber cover. 3. Specialised insurance cover has become available in recent years. 6
9 Finding a way forward Cyber risks are increasingly viewed by insurers as a distinct category of risk risk not covered by traditional commercial insurance. Whether traditional insurance policies will provide cover is uncertain and would be limited at best. It is therefore important that companies review and continuously update their insurance and risk management procedures to ensure that they can best protect themselves from cyber related losses. Given the current environment, protecting knowledge capital and networks against non-physical perils is critical. It is essential that companies put procedures in place to: Identify cyber risks 4 Qualify and rank them Assess controls and countermeasures in place Identify risk improvement procedures Repeat the process regularly and monitor progress Once cyber risks are identified, an insurance wording gap analysis can be performed and decisions made to negotiate extensions to current wordings or place a specific cyber policy to either supplement existing policies or act as first line policies. New cyber specific insurance policies are emerging to fill the gaps in traditional policies. This has been due in part to a better understanding of cyber risks and risk management issues as well as access to loss information. It is helpful to keep in mind that when underwriting this area of risk underwriters are likely to be examining the following aspects of the company to make a decision about its risk: What is the internet site being used for? Is it passive in that it only offers information with no customer interaction or is it interactive in that it allows customers to interact with the website by requesting or providing information or is it active in that it allows customers to make purchases from the website? 5 Is there a privacy statement? What security measures are in place? Physical security, written security policy, virus detection policies/software, passwords, firewalls, encrypted logins, authentication technology, or intrusion detection systems? Is there any regular testing of the security by internal audit? Is the security tested by an outside party i.e. penetration hacking or ethical hacking? What is the financial status of the company? What is the nature of the company? 6 What is the claims history of the company? Are there satisfactory internal controls and risk management procedures in place? 4. The key to protection lies in the accurate and adequate risk identification. 5. Cyber risks increase the more active the website. 6. Cyber risks vary between industries. Key cyber risk industries include financial institutions, entertainment/media, technology and telecommunications, manufacturing, airlines and travel services, higher education and retail. 7
10 Concluding remarks Cyber risks present new and different challenges and can have serious implications to a company s bottom line 7 both as direct 8 and indirect 9 consequences of the event. Ever growing media interest in cyber crime and various surveys into computer crime conducted over the years now highlight that the first lines of technological defence are no longer impenetrable. Data breaches affect millions of records a year. Media reports of data or network sabotage, virus and Trojan infection, computer fraud and laptop theft, incidents of denial of service and network scanning are ever increasing and it is unlikely that the underlying trends will improve in the short-term. Accordingly, insurance coverage for cyber risks should be a significant and growing concern for companies. Network security breaches can expose companies to class action lawsuits, significant recovery costs and irreversable damage to the corporate brand 10. Undoubtedly, the liabilities will continue to grow and evolve 11 as new perils arise and lawyers develop new causes of action. Policies have been specifically designed to cover a range of cyber risks (including both first party losses and third party liabilities) as well as to afford cover for associated legal expenses, settlements, judgments, regulatory investigations and other related business expenses, for example, privacy notification expenses. Given the enormous and growing participation of all companies in e-commerce isn t it time to consider transferring this risk? 7. Cyber Risks: is your company protected by Dawn Simmons, Senior Underwriter Professional Lines XL Insurance printed in Insight International September For example the actual costs incurred in notifying relevant customers and data protection agencies of the security breach and mitigating further losses 9. For example customer turnover and damage to reputation. 10. Putting Cyber Risks on the Board s Radar Screen by Tracey Vispoli 11. Such as Privacy Notification Expenses. For example obligations to notify third parties of a security breach and mitigate losses 8
11 About Marsh: Marsh, the world s leading insurance broker and risk advisor, teams with its clients to define, design, and deliver innovative industry-specific solutions that help them protect their future and thrive. It has over 24,000 colleagues who collaborate to provide advice and transactional capabilities to clients in over 100 countries. Marsh is a member of Marsh & McLennan Companies, a global professional services firm with 51,000 employees worldwide and annual revenue exceeding $10 billion, which is also the parent company of Guy Carpenter, the risk and reinsurance specialist; Mercer, the provider of HR and related financial advice and services; and Oliver Wyman, the management consultancy. Its stock (ticker symbol: MMC) is listed on the New York, Chicago and London stock exchanges.
12 Marsh (Sydney) Darling Park Tower Sussex Street Sydney NSW 2000 Tel: Fax: Marsh (Melbourne) 555 Lonsdale Street Melbourne VIC 3000 Tel: Fax: Marsh (Brisbane) Level 20, Riverside Plaza 123 Eagle Street Brisbane QLD 4000 Tel: Fax: Marsh (Parramatta) Level 1, 87 Marsden Street Parramatta NSW 1250 Tel: Fax: Marsh (Perth) 2 The Esplanade Perth WA 6000 Tel: Fax: Marsh (Adelaide) Level North Terrace Adelaide SA 5000 Tel: Fax: Marsh (Canberra) Level 5 60 Marcus Clarke Street Canberra ACT 2601 Tel: Fax: Marsh (Hobart) 111 Macquarie Street Hobart TAS 7000 Tel: Fax: Marsh (Darwin) Carpentaria House Level 1, 13 Cavenagh Street Darwin NT 0800 Tel: Fax: Marsh (Launceston) Level 2, 33 George Street Launceston TAS 7250 Tel: Fax: Disclaimer: The information contained herein is based on sources we believe reliable, but we do not guarantee its accuracy. The information contained in this publication provides only a general overview of subjects covered, is not intended to be taken as advice regarding any individual situation, and should not be relied upon as such. Statements concerning legal matters should be understood to be general observations based solely on our experience as insurance brokers and risk consultants and should not be relied upon as legal advice, which we are not authorized to provide. Insureds should consult their own qualified insurance and/or legal advisors regarding specific coverage and other issues. Copyright Marsh Pty Ltd. All rights reserved.
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
More informationOur specialist insurance services for Professionals risks
Our specialist insurance services for Professionals risks Price Forbes & Partners is an independent Lloyd s broker based in the heart of London s insurance sector. We trade with all of the major international
More informationHow To Cover A Data Breach In The European Market
SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to
More informationTHE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
More informationCyber/ Network Security. FINEX Global
Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
More informationData breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
More informationCYBER/ NETWORK SECURITY
CYBER/ NETWORK SECURITY FINEX AUSTRALIA ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over
More informationManaging Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
More informationISO? ISO? ISO? LTD ISO?
Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet
More informationInsurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
More informationNational Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them
National Corporate Practice Cyber risks explained what they are, what they could cost and how to protect against them what this briefing covers ff Introduction ff Section 1: What are the risks and the
More informationFINANCIAL LINES ACE ELITE PLUS MANAGEMENT LIABILITY INSURANCE
FINANCIAL LINES ACE ELITE PLUS MANAGEMENT LIABILITY INSURANCE 00 The ACE Elite Plus Management Liability policy features coverage and benefits designed to address the serious risks confronting private
More informationCyber and data Policy wording
Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationData breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
More informationCoverage is subject to a Deductible
Frank Cowan Company Limited 75 Main Street North, Princeton, ON N0J 1V0 Phone: 519-458-4331 Fax: 519-458-4366 Toll Free: 1-800-265-4000 www.frankcowan.com CYBER RISK INSURANCE DETAILED APPLICATION Notes:
More informationCyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
More informationReducing Risk. Raising Expectations. CyberRisk and Professional Liability
Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today
More informationInsuring Innovation. CyberFirst Coverage for Technology Companies
Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is
More informationEnterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
More informationCyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
More informationAPIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationIMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.
Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full
More informationIRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411
IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
More informationCyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
More informationCyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor
Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection
More informationCyber Liability Insurance Data Security, Privacy and Multimedia Protection
Page 1 of 5 Cyber Liability Insurance Data Security, Privacy and Multimedia Protection What is a Cyber Risk? Technology is advancing at such an alarming rate and business is more and more reliant on IT
More informationNZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationCard Account means your Card account that is in relation to your Visa Wallet maintained and operated by Tune Money Sdn Bhd.
VERIFIED BY VISA TERMS AND CONDITIONS OF USE Important: The Verified by Visa service is designed to provide you with improved security when your BIG Card- Prepaid Visa is used to make purchases online.
More informationDemystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
More informationINFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:
INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST MADE
More informationWhat is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
More informationTECHNOLOGY INSURANCE APPLICATION & SUPPLEMENTS (Claims First Made & Reported Basis)
TECHNOLOGY INSURANCE APPLICATION & SUPPLEMENTS (Claims First Made & Reported Basis) Professional Liability Insurance Services, Inc. - Underwriting Facilities 1.800.761.7547 / (512) 328.0677. FAX (512)
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES
INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY
More informationInsurance implications for Cyber Threats
Lillehammer Energy Claims Conference Lillehammer March 7, 2014 Insurance implications for Cyber Threats How enterprises need to prepare for the inevitable JLT is one of the world s largest providers of
More informationCAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT
CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT INSURANCE COVERAGES FOR TECHNOLOGY COMPANIES This Special Report was written by Daniel P. Hale, J.D., CPCU, ARM, CRM, LIC, AIC, AIS, API. Mr. Hale is Vice President
More informationAirmic Review of Recent Developments in the Cyber Insurance Market. & commentary on the increased availability of cyber insurance products GUIDE
Airmic Review of Recent Developments in the Cyber Insurance Market & commentary on the increased availability of cyber insurance products GUIDE 1. Executive summary Airmic members have become increasingly
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationSecurity & Privacy Current cover and Risk Management Services
Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology
More informationCyber Risk Insurance for Agents. Frequently Asked Questions
Cyber Risk Insurance for Agents Frequently Asked Questions 1 Cyber Risk Insurance About Great American Insurance Great American Insurance Group s roots go back to 1872 with the founding of its flagship
More informationCyber Security Issues - Brief Business Report
Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION
INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST
More informationCyber and Privacy Risk What Are the Trends? Is Insurance the Answer?
Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information
More informationGENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE
GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED
More informationCYBER RISK IN AUSTRALIA IS YOUR DATA SAFE? Academy of Risk
CYBER RISK IN AUSTRALIA IS YOUR DATA SAFE? Academy of Risk Contents P1 p2 p4 p7 Introduction CYBER CRIME ON THE RISE IN AUSTRALIA Businesses are taking notice INSURANCE: MAKE SURE YOU ARE COVERED Introduction
More informationCyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
More informationregion16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
More informationAPPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY
APPLICATION FOR TECHNOLOGY & PRIVACY PROFESSIONAL LIABILITY GENERAL INFORMATION 1. APPLICANT NAME: 2. PHONE: 3. MAILING ADDRESS: 4. WEB ADDRESS: 5. The following officer of the Applicant is designated
More informationTools Conference Toronto November 26, 2014 Insurance for NFP s. Presented by Paul Spark HUB International HKMB Limited
Tools Conference Toronto November 26, 2014 Insurance for NFP s Presented by Paul Spark HUB International HKMB Limited Topics Insurance Policies Basics Directors and Officers Liability Insurance Commercial
More informationFMGateway by FMWebschool
FMGateway by FMWebschool Hosting Service Agreement 1. OVERVIEW This Hosting Service Agreement (this Agreement ) is entered into by and between FMWebschool, LLC, a/an Delaware limited liability company
More informationWEBSITE TERMS OF USE
WEBSITE TERMS OF USE 1. GENERAL 1.1 The Site is operated by Locomote Technologies Trading Pty Ltd (we). We are registered in Australia under company number 160 815 430. For the purposes of these Website
More informationCyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
More informationZurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
More informationApplication for NetProtect 360 Information Risk Insurance (for General Industry)
Application for NetProtect 360 Information Risk Insurance (for General Industry) THIS APPLICATION IS NEITHER AN OFFERING NOR A BINDER OF COVERAGE. ALSO, YOUR COMPLETION OF THIS APPLICATION DOES NOT OBLIGATE
More informationJoe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
More informationDATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem
More informationCYBER RISK INSURANCE. Presented By: Jonathan Healy
CYBER RISK INSURANCE Presented By: Jonathan Healy Contents Cyber Risk Threat Sources Cyber events worldwide What is covered by a Cyber Liability policy Risk Identification The gaps in traditional policies
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationCyber Risk State of the Art
Proudly presents Cyber Risk State of the Art Matthew Davies, Chubb Insurance Catherine Dowdall, Canada Post Mike Petersen, Marsh 1 Agenda 1. Who is At Risk? 2. New/Emerging Risk and Trends 3. Canada Post
More informationinsurance policies can now be easily extended to include the new Section 3 coverage for Professional Indemnity which is a market first
esentry s new Annual Contract Works and Single Project Contract Works insurance policies can now be easily extended to include the new Section 3 coverage for Professional Indemnity which is a market first
More informationSpecialist insurance and risk implications for prepaid an update. Prepaid International Forum Osborne Clarke London Thursday 9 th February 2012
Specialist insurance and risk implications for prepaid an update Prepaid International Forum Osborne Clarke London Thursday 9 th February 2012 Introduction To update our presentation of 24 th February
More informationGENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE
GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of
More informationUnderstanding Professional Liability Insurance
Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationMiscellaneous Professional Indemnity Insurance
Miscellaneous Professional Indemnity Insurance Proposal Form 1. All questions must be answered giving full and complete answers. 2. Please ensure that this Proposal Form is Signed and Dated. 3. All fee
More informationAcceptable Use Policy
Introduction This Acceptable Use Policy (AUP) sets forth the terms and conditions for the use by a Registrant of any domain name registered in the top-level domain (TLD). This Acceptable Use Policy (AUP)
More informationCyber Risks and Insurance Solutions Malaysia, November 2013
Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare
More informationAcceptable Use and Publishing Policy
1. Purpose This Policy outlines the principles, guidelines and requirements of acceptable use of and publishing to ecreators Pty Ltd (ecreators) hosting products and services. The purpose of this Policy
More informationCyber Threats and the Insurance Response
Cyber Threats and the Insurance Response Scott Reeves & Laurence Yan Munich Reinsurance Company This presentation has been prepared for the Actuaries Institute 2014 General Insurance Seminar. The Institute
More informationUnderstanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed
More informationWhat is Technology, Media and Professional Services (TMPS) Coverage? Why Companies Should Consider Buying TMPS Coverage?
What is Technology, Media and Professional Services (TMPS) Coverage? TMPS is written to: Protect the company from errors and omissions that occur in the company's rendering or failure to render professional
More informationCyber threat reality check GLOBAL TECHNOLOGY S RISK ADVISOR SERIES TURN RISK INTO ADVANTAGE THE THREAT IS GROWING IGNORING IT CAN BE COSTLY
GLOBAL TECHNOLOGY S RISK ADVISOR SERIES TURN RISK INTO ADVANTAGE WHY COMPLACENCY IS UNWARRANTED > WHERE CYBER THREATS COME FROM > THREE STEPS TO MANAGING CYBER THREATS > Cyber threat reality check THE
More informationACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationAcceptable Use Policy
Acceptable Use Policy 1. General Interoute reserves the right to modify the Acceptable Use Policy ( AUP ) from time to time. Changes to this Acceptable Use Policy will be notified to Customer in accordance
More informationJLT Mining. Utilising our expert knowledge of the mining industry and through understanding your individual business, JLT Mining can deliver:
Mining Jardine Lloyd Thompson is one of the world s largest providers of insurance, reinsurance and employee benefits related advice, brokerage and associated services. JLT s client proposition is built
More informationCyber Exposure for Credit Unions
Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of
More informationThe potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
More informationWHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
More informationBeyond Data Breach: Cyber Trends and Exposures
Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in
More informationWhat would you do if your agency had a data breach?
What would you do if your agency had a data breach? 80% of businesses fail to recover from a breach because they do not know this answer. Responding to a breach is a complicated process that requires the
More informationAs with most things, insurance should be
Insurance Buyers News Property & Liability 300 Montgomery Street Suite 450 San Francisco, CA 94104 415-820-2200 www.pennbrookinsurance.com Insurance Buyers News March/April 2012 Volume 23 Number 2 Data
More informationProtecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks
Protecting Your Assets: How To Safeguard Your Fund Against Cyber Security Attacks Hacks, breaches, stolen data, trade secrets hijacked, privacy violated, ransom demands made; how can you protect your data
More informationCyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:
Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned
More informationYa-YaOnline Platform ( Service ).
SOFTWARE AS A SERVICE AGREEMENT FOR THE USE OF: Ya-YaOnline Platform ( Service ). NOW IT IS HEREBY AGREED by and between the parties hereto as follows:- Definitions "Agreement" means this Agreement and
More informationData Breach Cost. Risks, costs and mitigation strategies for data breaches
Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,
More informationCyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
More informationCyber Risk Management
Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also
More informationcyber invasions cyber risk insurance AFP Exchange
Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance
More informationTERMS AND CONDITIONS OF USE OF KUWAIT FINANCE HOUSE BAHRAIN S WEBSITE & INTERNET BANKING SERVICES
TERMS AND CONDITIONS OF USE OF KUWAIT FINANCE HOUSE BAHRAIN S WEBSITE & INTERNET BANKING SERVICES Acknowledgement and acceptance of Terms Kuwait Finance House (Bahrain) B.S.C. (the Bank, our, us or we
More informationTerms of Use Mercer BenefitsCentral SM
Terms of Use Mercer BenefitsCentral SM This page provides important information regarding the scope, duration and terms of any insurance or service you may obtain or apply for on this website ( Service
More informationLIGC-ACC Presentation November 9, 2015
Bryan Frank, DDIS Info Sec Corp, panelist Jennifer M. Mone, Deputy General Counsel, Hofstra University, panelist Keith J. Frank, Partner, Forchelli, Curto, Deegan, Schwartz, Mineo & Terrana,. LLP, moderator
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationCyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
More informationViva Energy may from time to time amend, delete or supplement these Terms and Conditions. Any change takes effect from the earlier of:
SHELL CARD ONLINE TERMS AND CONDITIONS VERSION: AUGUST 2014 1. SCOPE 1.1 These Terms and Conditions apply to use of the Shell Card Online (SCOL) web programme accessible via www.vivaenergy.com.au, by a
More informationPCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
More informationTechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application
IRONSHORE INSURANCE COMPANIES One State Street Plaza New York, NY 10004 Tel: 646-826-6600 Toll Free: 877-IRON411 TechDefender SM Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application
More information