THE RISK OF CYBER-ATTACK TO THE MARITIME SECTOR
|
|
|
- Jodie Moore
- 10 years ago
- Views:
Transcription
1 Global Marine Practice JULY 2014 THE RISK OF CYBER-ATTACK TO THE MARITIME SECTOR CONTENT: 2 INTRODUCTION 2 WHY NOW? 4 WHY IS THE MARITIME SECTOR PARTICULARLY VULNERABLE? 5 THE COVERAGE GAP 6 CLOSING THE COVERAGE GAP 7 CONCLUSION
2 INTRODUCTION Until about 2010, the majority of cyber-attacks were driven by an attempt to obtain personal or financially sensitive data. Today, the nature of the threat is changing, and companies across all business sectors have begun to experience highly sophisticated and complex attacks that attempt to inflict damage to property and operations by seeking to take control of industrial control systems. These systems use data received from remote stations to control processes either automatically or via an operator s commands, and are designed to be closed to the outside world. Highly skilled hackers have demonstrated the ability to penetrate the systems used by the maritime industry, with potentially disastrous consequences. Today, companies have begun to experience highly sophisticated and complex attacks that attempt to inflict damage to property and operations by seeking to take control of a company s industrial control systems (ICS). Vessel navigation and propulsion systems, cargo handling and container tracking systems at ports and on board ships, and shipyard inventories and automated processes, are all controlled using software that is fundamental to smooth-running operations. If, for example, a cyber-attack disabled a vessel transiting the Panama Canal resulting in blockage of the channel, it would have significant economic impact around the globe. Cyber-attacks can also have criminal motivations (as seen in Antwerp between 2011 and 2013) to highjack, divert, or steal cargo. Events over the last four years suggest that these types of systems are growing increasingly vulnerable to attack. WHY NOW? While there have been relatively few reports of successful cyber-attacks on either shipping or on shore-based facilities, they are not unknown, and comparable industries have suffered attacks that suggest, at the very least, that the maritime sector may be vulnerable. PORT OF ANTWERP Hackers working with a drug smuggling gang infiltrated the computerized cargo tracking system of the Port of Antwerp to identify the shipping containers in which consignments of drugs had been hidden. The gang then drove the containers from the port, retrieved the drugs and covered their tracks. The criminal activity continued for a two-year period from June 2011, until it was stopped by joint action by Belgium and Dutch police. Cyber criminals will continue to do the unexpected, and the nature of attacks of this sort will evolve The Risk of Cyber-Attack to the Maritime Sector
3 GPS, AIS, AND ECDIS It has been reported that significant weaknesses have been identified in the cybersecurity of critical technology used for navigation at sea. GPS (Global Positioning System), AIS (Automatic Identification System), and ECDIS (Electronic Chart Display and Information System) are all essential aids to navigation, and each has been identified as potentially vulnerable to attack. The International Maritime Organization (IMO) is the United Nations organization with responsibility for the safety and security of shipping. It has required that AIS be fitted on board all passenger vessels and on cargo vessels of more than 500 gross tonnage (GT), and on vessels of more than 300 GT if engaged in international trade, since The IMO regulations require that AIS will be capable of automatically exchanging information regarding a vessel s identity, type, position, course, speed, navigational status, and other safety-related information with other ships, shore-based facilities, and aircraft. AIS has come to be relied upon as a navigational tool on board ship as an alternative to radar, and is also an integral part of vessel traffic separation systems used by organizations with delegated authority for safety at sea. Because it doesn t have an inbuilt mechanism to encrypt or authenticate signals, AIS is considered to be a soft target for cyber-attack, which was demonstrated in 2013 by cybersecurity firm, Trend Micro 2. The firm was able to show how AIS could be compromised by preventing a ship from providing movement information, by making phantom vessels or structures appear, by staging fake emergencies, and by making it appear to other AIS users that a ship was in a false location. The online services that monitor AIS data to track the position of vessels were also misled by the efforts of Trend Micro. Earlier in 2013, researchers at the University of Texas were able to demonstrate that they could send a superyacht off course by generating a fake GPS signal that overshadows the genuine signal. Like AIS, GPS for civilian use is not encrypted or authenticated, and is therefore, a potentially easy target....significant weaknesses have been identified in the cybersecurity of critical technology used for navigation at sea. 2 Bloomberg.com, Oct 29, 2013 Marsh 3
4 WHY IS THE MARITIME SECTOR PARTICULARLY VULNERABLE? It might be argued that the relatively low public profile of most marine businesses means they are less likely to be the subject of a cyber-attack than financial institutions, energy companies, public utilities, or airlines. That may be the case, but nevertheless, the threat is real, and the results of a successful attack could be catastrophic. Certainly, the lack of any inbuilt encryption or authentication code in the critical systems used for navigation on board ship means that shipping could be seen as a soft target, and that perception alone could be enough to provoke an attack. The MIT Technology Review reported that the devices used by Trend Micro and the University of Texas to identify security gaps in AIS and GPS cost 700 and US$2,000 respectively, which is not out of reach of even an enthusiastic teenager with the necessary skills. At the other end of the scale, it is not hard to imagine the consequences of a nation state indulging in cyber-warfare by targeting the container tracking software used by the ports of its perceived enemy in an attempt to disrupt commerce. Of course, some businesses in the marine sector have a very high profile. A cyber-attack that disrupted the navigation of a large cruise ship would result in enormous media coverage and could, in the worst circumstances, lead to horrific loss of life and significant property damage. A cyber-attack could lead to horrific loss of life and significant property damage. The IMO identified as early as 2004 that the publication of AIS-generated data on the internet and elsewhere could compromise the safety and security of ships and port facilities 3. It has subsequently condemned those that publish this data and encouraged national governments to discourage its publication. However, it was reported in the MIT Technology Review that when Trend Micro raised its concerns with the IMO following its dummy attack on AIS in 2013, the IMO replied that it could only respond to a paper submitted by an IMO member government or by an organization with consultative status. On being asked directly in June 2014, the IMO confirmed to Marsh that the cyberthreat had not been brought forward for discussion by a member and consequently, was not on its work program at this time. In any event, updating the existing protocol and regulations to address the current potential threat would take time, while replacing the equipment on board the world s fleet with sufficiently secure new systems would take considerably longer. In the meantime, the potential threat remains and is undoubtedly increasing The Risk of Cyber-Attack to the Maritime Sector
5 THE COVERAGE GAP The logical response to a threat is to consider the probability of an event that could cause a loss occurring against both the expected and maximum negative outcomes if the event were to occur. Once the likelihood and the potential consequences are understood, informed decisions can be taken on risk mitigation and transfer. However, this conventional approach to risk management is not applicable to the cyber threat as described above because of a specific exclusion in insurance policies. The risk of a cyber-attack has been around for as long as there have been computers, but increased exponentially at the end of the 20th century with the arrival of the internet and the widespread use of closed computer networks as an essential business tool. Insurers recognized that the threat existed, but did not understand it. That meant they were unable to gauge the probability of a loss which, in turn, meant they were unable to put a price on the exposure. Consequently, insurers (and their reinsurers) began excluding losses as a result of a cyber-attack from their policies. In the world of marine insurance, insurance policies that cover ships, shipyards, and cargo-handling facilities have, over the last 10 years, included the Institute Cyber Attack Exclusion Clause (CL 380) 10/11/2003, or a variant of that clause that has the same result. CL 380 is a paramount clause, which means it should currently be included on all marine insurance policies. The clause states: 1.1 Subject only to Clause 1.2 below, in no case shall this insurance cover loss damage liability or expense directly or indirectly caused by or contributed to by or arising from the use or operation, as a means for inflicting harm, of any computer, computer system, computer software program, malicious code, computer virus or process or any other electronic system. 1.2 Where this Clause is endorsed on policies covering risks of war, civil war, revolution, rebellion, insurrection, or civil strife arising therefrom, or any hostile act by or against a belligerent power, or terrorism or any person acting from a political motive, Clause 1.1. shall not operate to exclude losses (which would otherwise be covered) arising from the use of any computer, computer system or computer software program or any other electronic system in the launch and/or guidance system and/or firing mechanism of any weapon or missile. The risk of a cyber-attack increased exponentially at the end of the 20th century with the arrival of the internet and the widespread use of closed computer networks. In practical terms, therefore, and to the extent that it would be covered by the applicable insurance, any loss or damage (including consequential loss and business interruption) or liabilities attributable to a breakdown of a computer system would prima facie be recoverable from insurers. However, if the loss, damage, or liability was caused either directly or indirectly by the use of a computer and its associated systems and software as a means of inflicting harm, such loss, damage, or liability would be excluded from coverage. Marsh 5
6 As is often the case, protection and indemnity (P&I) cover is an exception. P&I clubs that are members of the International Group cover P&I claims that result from a cyberattack unless the attack is an act of war or, more likely, the work of terrorists. In those circumstances the clubs exclude cover for liability directly or indirectly caused by the use or operation as a means of inflicting harm of any computer virus. However, the clubs have partially reinstated that exclusion by establishing a special pooling facility with a limit of US$30 million per ship in the aggregate. This facility will cover the P&I liability of their members to pay damages, compensation, or expenses in consequence of personal injury to or illness or death of any seaman, and for the legal costs and expenses incurred solely for the purpose of avoiding or minimizing any liability or risk insured by the club. Other than the limited cover provided by the P&I clubs pooling facility, the CL 380 type exclusion of losses that are the result of a cyber-attack is applied universally by the marine insurance industry in its coverage of vessels and of shore-based facilities. CLOSING THE COVERAGE GAP From an insurance buyer s point of view, the ideal solution would be for any cyberattack exclusion clause to be deleted from all applicable insurance policies. That will not happen, at least in the short term, because insurers themselves rely on reinsurance programs for protection, and these reinsurance programs also incorporate CL 380 or an equivalent exclusion provision. Until recently, that left businesses with a clearlydefined risk exposure that they could not either avoid or transfer. The insurance industry can be creative in response to evolving risk exposures and now there are a small number of major insurers that are prepared to consider offering significant underwriting capacity to cover those risks excluded by reason of a cyber-attack exclusion clause. This is a rapidly evolving development, but we anticipate that before the end of 2014 it will be possible for a company to buy as much as US$200 million to US$300 million of cover against the risk of loss, damage, or liability as a result of a cyber-attack. 6 The Risk of Cyber-Attack to the Maritime Sector
7 CONCLUSION The computerized systems that the maritime sector now relies upon were designed to meet the needs of the 20th century, but are not equipped to meet the threats of the 21st century. The vulnerabilities within these essential systems present an open door and it is probably only a matter of time before an attacker walks through, with potentially devastating consequences. The Institute Cyber Attack Exclusion Clause (CL 380) 10/11/2003, or a variant of that clause, has appeared on marine policies for the past 10 years, excluding any loss, damage, or liability caused either directly or indirectly by the use of a computer and its associated systems and software as a means of inflicting harm. While there appears to be no suggestion from the industry that this clause will be withdrawn any time soon, there are now a small number of major insurers that are prepared to consider offering significant underwriting capacity to cover the risks that have been excluded since Marsh 7
8 For further information, please contact your local Marsh office or visit our website at marsh.com NICK RIDDLE Senior Vice President Global Marine Practice +44 (0) STEPHEN WARES EMEA Leader Marsh Cyber Risk Practice +44 (0) Marsh is one of the Marsh & McLennan Companies, together with Guy Carpenter, Mercer and Oliver Wyman. This document is not intended to be taken as advice regarding any individual situation and should not be relied upon as such. The information contained herein is based on sources we believe reliable, but we make no representation or warranty as to its accuracy. Marsh shall have no obligation to update this publication and shall have no liability to you or any other party arising out of this publication or any matter contained herein. Any statements concerning actuarial, tax, accounting or legal matters are based solely on our experience as insurance brokers and risk consultants and are not to be relied upon as actuarial, tax, accounting or legal advice, for which you should consult your own professional advisors. Any modeling, analytics, or projections are subject to inherent uncertainty, and the Marsh Analysis could be materially affected if any underlying assumptions, conditions, information, or factors are inaccurate or incomplete or should change. Marsh makes no representation or warranty concerning the application of policy wording or the financial condition or solvency of insurers or re-insurers. Marsh makes no assurances regarding the availability, cost, or terms of insurance coverage. Although Marsh may provide advice and recommendations, all decisions regarding the amount, type or terms of coverage are the ultimate responsibility of the insurance purchaser, who must decide on the specific coverage that is appropriate to its particular circumstances and financial position. In the United Kingdom, Marsh Ltd is authorised and regulated by the Financial Conduct Authority. Copyright 2014 Marsh LLC All rights reserved [MA ]
Global Energy Practice CYBER GAP INSURANCE CYBER RISK: FILLING THE COVERAGE GAP
Global Energy Practice CYBER GAP INSURANCE CYBER RISK: FILLING THE COVERAGE GAP 1 Cyber Gap Insurance CYBER RISK: A GROWING CONCERN For the last quarter of a century, the global energy sector has relied
Protection & Indemnity Insurance 2016/2017 Part 2 final
P&I 2608/2016 15 January 2016 Protection & Indemnity Insurance 2016/2017 Part 2 final This is the second circular letter in respect of 2016/2017 policy year including updated information. The information
HOW TO REIN IN WORKERS COMPENSATION COSTS. October 2013
HOW TO REIN IN WORKERS COMPENSATION COSTS October 2013 COST DRIVERS: PREMIUMS AND CLAIMS COSTS Insurers pushing for workers compensation rate increases. Especially risks with unfavorable loss experience
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
WAR RISKS P&I EXCESS COVER DIRECTORS RESOLUTION OF 26TH JANUARY 2015
JANUARY 2015 WAR RISKS P&I EXCESS COVER SPECIAL COVER UNDER PROVISO TO RULE 5E DIRECTORS RESOLUTION OF 26TH JANUARY 2015 WHEREAS, in accordance with Rule 5E of the Association s Rules coverage for certain
Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act
Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act JULY 17, 2014 2013 Venable LLP 1 Agenda 1. Security Risks affecting the Maritime Transportation System (MTS) 2. The
MARINE CARGO CLAIMS GUIDEBOOK
Marsh Canada Limited MARINE CARGO CLAIMS GUIDEBOOK TO REPORT A CLAIM PLEASE GO TO WWW.MARSHCARGO.COM MARINE CARGO CLAIMS GUIDEBOOK i Marine Cargo Claims Guidebook This booklet has been prepared as a guide
INSURANCE MARKETS AND RISK TRENDS IN 2014 JANUARY 2014
JANUARY 2014 UNITED STATES INSURANCE MARKET REPORT 2014 For a copy of Marsh s US Insurance Market Report 2014, please visit marsh.com or ask your Marsh representative. AVERAGE PROPERTY RATE CHANGES ALL
ISO General Liability Form Revisions
ISO General Liability Practice ISO General Liability Form Revisions Effective April 1, 2013 Content: caveats page 2 background page 2 exclusion c: liquor liability page 2 exclusion G: Aircraft, auto, or
ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY
E FACILITATION COMMITTEE 39th session Agenda item 7 FAL 39/7 10 July 2014 Original: ENGLISH ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE Measures toward enhancing maritime cybersecurity Submitted
Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies
Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan
U.S. Casualty Practice U.S. Construction Practice. November 2012. NY Labor Law 240
U.S. Casualty Practice U.S. Construction Practice November 2012 NY Labor Law 240 NOVEMBER 2012 Scaffold Law Pressures Contractors in New York New York s so-called Scaffold Law Labor Law 240 has created
PROCUREMENT AND THE INSURANCE INDUSTRY WHAT YOU NEED TO KNOW NOVEMBER 2015
PROCUREMENT AND THE INSURANCE INDUSTRY WHAT YOU NEED TO KNOW NOVEMBER 2015 National Practice Leader Public Entity Corporate Insurance Topics to be discussed: Corporate Insurance understanding the difference
War Insurance Conditions for Vessels of 1st January 2006
War Insurance Conditions for Vessels of 1st January 2006 These Conditions are approved by the Swedish Transport Insurance Pool and The Swedish Shipowner s Association and are only intended as a guidance.
Captive Solutions Practice. Next Generation Captives Retail Benchmark
Captive Solutions Practice Next Generation Captives Retail Benchmark Contents Introduction 1 Domicile 2 Lines of Business 2 Exposure Levels 3 Capitalization 4 Retail Benchmark Next Generation Captives
MARINE HULL INSURANCE CONDITIONS COVERING WAR, PIRACY, TERRORISM AND SIMILAR RISKS
These clauses are for illustrative purposes only and different terms and conditions may be agreed in particular where any clause excludes losses or makes cover subject to certain conditions. MARINE HULL
OHIO ASSOCIATION OF COMMUNITY COLLEGES
OHIO ASSOCIATION OF COMMUNITY COLLEGES RISK MANAGEMENT AND INSURANCE PROGRAM Launched November 1, 2011 OACC is right for you if: You want to lower your total cost of risk; You want broader coverages, loss
APPENDIX / ANHANG (as per 01.04.2014)
APPENDIX / ANHANG (as per 01.04.2014) to the General Insurance Conditions of Hanseatic P&I - Shipowner s Liability (as per 15.01.2010), Charterer s Liability (as per 01.05.2005) and Inland Craft Liability
USING DATA DISCOVERY TO MANAGE AND MITIGATE RISK: INSIGHT IS EVERYONE S JOB
USING DATA DISCOVERY TO MANAGE AND MITIGATE RISK: INSIGHT IS EVERYONE S JOB If you manage risk in your organization, you re probably surrounded by paper right now. After all, you need reports to help mitigate
COMPENSATION GUIDE FOR US CLIENTS
COMPENSATION GUIDE FOR US CLIENTS ABOUT MARSH Marsh is a global leader in insurance broking and risk management. Marsh helps clients succeed by defining, designing, and delivering innovative industry-specific
Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh
Navigating Cyber Risk Exposure and Insurance Stephen Wares EMEA Cyber Risk Practice Leader Marsh Presentation Format Four Key Questions How important is cyber risk and how should we view the cyber threat?
CYBER SECURITY INDUSTRY GUIDELINES
CYBER SECURITY INDUSTRY GUIDELINES Aron Sorensen, Chief Marine Technical Officer, BIMCO 1 BIMCO Founded in 1905-2,300 members in around 130 countries Membership includes shipowners, operators, managers,
Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015
Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine
8TH ANNUAL EMPLOYEE HEALTH AND BENEFITS STUDY EMPLOYEE CHOICE IN BENEFITS - INSIGHTS FROM INDIA & ASIA
8TH ANNUAL EMPLOYEE HEALTH AND BENEFITS STUDY EMPLOYEE CHOICE IN BENEFITS - INSIGHTS FROM INDIA & ASIA INTRODUCTION EMPLOYEE CHOICE IN BENEFITS - INSIGHTS FROM INDIA AND ASIA The IMF and the World Bank
MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO
E MARITIME SAFETY COMMITTEE 95th session Agenda item 4 MSC 95/4/1 5 March 2015 Original: ENGLISH MEASURES TO ENHANCE MARITIME SECURITY Industry guidelines on cyber security on board ships Submitted by
PRACTICAL APPLICATIONS FOR BUSINESS CONTINUITY MANAGEMENT
Karl D Bryant, MBCP, MBCI, CBCLA, PMP Senior Vice President PRACTICAL APPLICATIONS FOR BUSINESS CONTINUITY MANAGEMENT WWW.CHICAGOLANDRISKFORUM.ORG BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS
Airmic review of the supply chain insurance market Review of recent developments in the supply chain insurance market
REPORT Airmic review of the supply chain insurance market Review of recent developments in the supply chain insurance market 1. Executive summary Increasingly complex supply chains, together with greater
A Contribution to the Analysis of Maritime Accidents with Catastrophic Consequence
A Contribution to the Analysis of Maritime Accidents with Catastrophic Consequence Lusic Zvonimir M. Sc., Erceg Tonci Faculty of Maritime Studies Split, Croatia Zrinsko-Frankopanska 38, 21000 Split Phone:
RISK MANAGEMENT 101 WEBCAST SERIES
RISK MANAGEMENT 101 WEBCAST SERIES BASICS OF CASUALTY INSURANCE March 19, 2014 BASICS OF CASUALTY INSURANCE INTRODUCTIONS STEVE KERR Managing Director ROBERT GARCIA Senior Vice President BRIAN COYLE Senior
MEASURING AND MITIGATING REPUTATIONAL RISK SEPTEMBER 2014
SEPTEMBER 2014 DEFINING REPUTATIONAL RISK WHAT DO WE MEAN BY AN ORGANIZATION S REPUTATION? Everything an organization does or says creates an indelible impression in the minds of its key stakeholders senior
Presentation by. Nigel Carden (UK P&I Club) Chairman, IGP&I Maritime Security Subcommittee
International Group of P&I Clubs Piracy and Armed Robbery at Sea How Best to Protect Seafarers PIRACY and P&I INSURANCE Presentation by Nigel Carden (UK P&I Club) Chairman, IGP&I Maritime Security Subcommittee
The promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?
EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND? ABOUT JLT SPECIALTY JLT Specialty Insurance Services is the U.S. platform of JLT Group, the leading specialty business adivsory
War Risk Insurance 2015
Marine 405/2014 18 December 2014 War Risk Insurance 2015 The terms for War Risk Insurance for 2015 are outlined in this circular. The Association will continue the process of streamlining the cover to
GUY CARPENTER S EIGHTH ANNUAL SPECIALTY INSURANCE PROGRAM ISSUING CARRIER SURVEY, 2012
An update from Program Managers Solutions March 31, 2013 POISED FOR GROWTH GUY CARPENTER S EIGHTH ANNUAL SPECIALTY INSURANCE PROGRAM ISSUING CARRIER SURVEY, 2012 As a result of, or in some cases in spite
INSTITUTE TIME CLAUSES - HULLS DISBURSEMENTS AND INCREASED VALUE (Total Loss only, including Excess Liabilities)
INSTITUTE TIME CLAUSES - HULLS DISBURSEMENTS AND INCREASED VALUE (Total Loss only, including Excess Liabilities) This insurance is subject to English law and practice 1. NAVIGATION 1.1 The subject-matter
PROTECTION & INDEMNITY INSURANCE
PROTECTION & INDEMNITY INSURANCE Whereas Hull & Machinery insurance covers shipowners against loss of or damage to their own ship, Protection & Indemnity Insurance (P&I) protects the Owner for his / her
MANAGEMENT AND PROFESSIONAL LIABILITY INSURANCE
U.S. FINPRO MANAGEMENT AND PROFESSIONAL LIABILITY INSURANCE ALTERNATIVE INVESTMENT FUNDS/HEDGE FUNDS In turbulent economic times, the importance of a well designed management and professional liability
PERSONAL WATERCRAFT INSURANCE CERTIFICATE
PERSONAL WATERCRAFT INSURANCE CERTIFICATE Thank you for choosing the RJP Marine Personal Watercraft Policy. This policy is issued under a binding authority agreement B6839N08004 issued to RJP Marine Insurance
Allianz Global Corporate & Specialty Hull, Protection & Indemnity and Marine Liability Insurance
Allianz Global Corporate & Specialty Hull, Protection & Indemnity and Marine Liability Insurance Comprehensive cover, flexible solutions Allianz Global Corporate & Specialty at a glance Full range of products
Carriers Cargo Liability Insurance. Policy Wording
Carriers Cargo Liability Insurance Policy Wording Contents ZU10587 - V5 05/13 - CGEL-007554-2013 Welcome to Zurich About Zurich... 2 Duty of Disclosure... 2 Non-disclosure or Misrepresentation... 2 Our
ACCIDENTAL DEATH. Policy Wording. Together, all the way.
ACCIDENTAL DEATH Policy Wording Together, all the way. Accidental Death Policy Wording 1. About the Policy 2. Definitions 3. What you are insured for 4. Other terms and conditions 5. Policy exclusions
UNITED KINGDOM TERRORISM RISK INSURANCE PROGRAMME
UNITED KINGDOM TERRORISM RISK INSURANCE PROGRAMME Name of programme Pool Reinsurance Company Ltd (Pool Re) Date of establishment 1993 Basic structure Pool Re is a mutual reinsurance company authorized
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached
AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES
AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES INTRODUCTION Cybersecurity has become an increasing concern in the medical device
Zurich Insurance Middle East S.A.L. Commercial Insurance to protect your business
Zurich Insurance Middle East S.A.L Commercial Insurance to protect your business 2 Each business is unique and understanding your needs is at the heart of what we do. We appreciate that one size doesn
Hardware, Software & Network Requirements
Hardware, & Network Requirements System requirements for the Enterprise application, including Business Objects, are provided in this document. These requirements include hardware, software, and network
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
Hull and Associated Risks
Hull and Machinery Insurance Who buys this insurance? qüçëé=êéëéçåëáääé=ñçê=íüé=éüóëáå~ä=ïéää=äéáåö çñ=~=îéëëéä=äé=íüéó=püáéçïåéêëi _~êéäç~í=`ü~êíéêéêë=çê=qüáêç=m~êíó j~å~öéêë Costs of repairing physical
MOTOR TRADE INSURANCE POLICY
MOTOR TRADE INSURANCE POLICY WHEREAS the Insured by a proposal and declaration which shall be the basis of this contract and is deemed to be incorporated herein has applied to the Company for the insurance
UK Healthcare Team RISK AND INSURANCE SOLUTIONS FOR THE HEALTHCARE INDUSTRY
UK Healthcare Team RISK AND INSURANCE SOLUTIONS FOR THE HEALTHCARE INDUSTRY Healthcare providers need a strategic partner with an in-depth understanding of the complexities of the healthcare industry.
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
ISO COVERAGE FORM & ENDORSEMENT CHANGES DIGGING THROUGH THE DETAILS APRIL 9, 2013
ISO COVERAGE FORM & ENDORSEMENT CHANGES DIGGING THROUGH THE DETAILS APRIL 9, 2013 INTRODUCTIONS CHRISTINE J. WILLIAMS U.S. Casualty Client Management Leader +1 212 345 6636 [email protected]
UK Healthcare Team RISK AND INSURANCE SOLUTIONS FOR THE HEALTHCARE INDUSTRY
UK Healthcare Team RISK AND INSURANCE SOLUTIONS FOR THE HEALTHCARE INDUSTRY As a healthcare provider, you need a risk and insurance adviser with an in-depth understanding of the complexities of the healthcare
Household Goods & Personal Effects Proposal Form B (iii) Insurance of Personal Effects in Barrels
Household Goods & Personal Effects Proposal Form B (iii) Insurance of Personal Effects in Barrels Restricted Cover This Insurance is restricted and covers only risks of loss and/or damage as a result of
OECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.
London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments
London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012
Personal Accident Policy Document
Personal Accident Policy Document www.greeninsurancecompany.co.uk Drivers Personal Accident Insurance Policy Summary This policy summary is to help you understand the insurance by setting out the significant
SPECIMEN COPY OF KEY CLAUSES/CONDITIONS OF PUBLIC LIABILITY POLICY
SPECIMEN COPY OF KEY CLAUSES/CONDITIONS OF PUBLIC LIABILITY POLICY WHEREAS the Insured by a proposal which shall be the basis of this insurance policy and be held as incorporated herein, has applied to
About Insurance Europe Insurance Europe is the European insurance and reinsurance federation. Through its 34 member bodies the national insurance
How insurance works About Insurance Europe Insurance Europe is the European insurance and reinsurance federation. Through its 34 member bodies the national insurance associations Insurance Europe represents
Carriers Cargo Liability Insurance. Policy Wording
Carriers Cargo Liability Insurance Policy Wording Effective date: 1 December 2011 Page 2 of 6 Schedule Contents About our Carriers Cargo Liability Insurance About Zurich... 2 How to apply for this insurance...
ARSENAL INSURANCE COMPANY MARINE INSURANCE
ARSENAL INSURANCE COMPANY MARINE INSURANCE ABOUT US ARSENAL Insurance Company was founded in 1997 (license No. 3193 FSSN 77 allowing to carry out 17 types of insurance). Equity capital of the company amounts
INSTITUTE CARGO CLAUSES (A)
Bajaj Allianz General Insurance Company Limited Issuing Office MARINE INSURANCE POLICY INSTITUTE CARGO CLAUSES (A) RISKS COVERED 1. Risks Clause This insurance covers all risks of loss of or damage to
CYBER & PRIVACY LIABILITY INSURANCE GUIDE
CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them
National Corporate Practice Cyber risks explained what they are, what they could cost and how to protect against them what this briefing covers ff Introduction ff Section 1: What are the risks and the
Managing your professional risks with insurance
Managing your professional risks with insurance A guide for CPA Australia Public Practice Certificate holders As professionals and business people you are subjected to many risks. The risks you can eliminate
CGI Cyber Risk Advisory and Management Services for Insurers
CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their
Travel Accident Policy Document Statement of demands and needs
Travel Accident Policy Document Statement of demands and needs This product meets the demands and needs of those who are aged over 18 but under 65 and fulfil the eligibility criteria and who wish to benefit
SPECIMEN COPY OF KEY CLAUSES/CONDITIONS OF PUBLIC LIABILITY POLICY
SPECIMEN COPY OF KEY CLAUSES/CONDITIONS OF PUBLIC LIABILITY POLICY Appendix 7b 1 WHEREAS the Insured by a proposal which shall be the basis of this Contract and be held as incorporated herein has applied
PART A. .3 to ensure the early and efficient collection and exchange of security-related information;
Page 4 PART A MANDATORY REQUIREMENTS REGARDING THE PROVISIONS OF CHAPTER XI-2 OF THE INTERNATIONAL CONVENTION FOR THE SAFETY OF LIFE AT SEA, 1974, AS AMENDED 1 GENERAL 1.1 Introduction This part of the
QUEST - QBE COMPREHENSIVE MOTOR INSURANCE MASTER POLICY
QUEST - QBE COMPREHENSIVE MOTOR INSURANCE MASTER POLICY CONTENTS PAGE SECTION 1: LOSS OR DAMAGE TO VEHICLE 1 INSURING CLAUSE 1 AUTOMATIC EXTENSION 1 LIMIT OF INDEMNITY 1 EXCLUSIONS 1 EXCESS FOR SECTION
Energy Practice. Feasibility Study for a Renewable Energy Insurance Facility for the People s Republic of China
Energy Practice Feasibility Study for a Renewable Energy Insurance Facility for the People s Republic of China Draft Analysis Report United Nations Environment Programme September 2008 Fig 3.1 Number
An introduction to insurance cover for businesses
An introduction to insurance cover for businesses All businesses need to be insured against potential risks such as contractual disputes, accidental damage, fire, flood or theft and claims for negligence.
Cyber Risk Management
Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also
